Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://epicgames-download1.akamaized.net/Builds/UnrealEngineLauncher/Installers/Win32/EpicInstaller-15.17.1.msi?launcherfilename=EpicInstaller-15.17.1-unrealEngine.msi

Overview

General Information

Sample URL:https://epicgames-download1.akamaized.net/Builds/UnrealEngineLauncher/Installers/Win32/EpicInstaller-15.17.1.msi?launcherfilename=EpicInstaller-15.17.1-unrealEngine.msi
Analysis ID:1462579
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

System process connects to network (likely due to code injection or exploit)
Installs new ROOT certificates
Adds / modifies Windows certificates
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks for available system drives (often done to infect USB drives)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files to the windows directory (C:\Windows)
Drops certificate files (DER)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
Modifies existing windows services
PE file contains an invalid checksum
PE file contains sections with non-standard names
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Usage Of Web Request Commands And Cmdlets
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • cmd.exe (PID: 2228 cmdline: C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://epicgames-download1.akamaized.net/Builds/UnrealEngineLauncher/Installers/Win32/EpicInstaller-15.17.1.msi?launcherfilename=EpicInstaller-15.17.1-unrealEngine.msi" > cmdline.out 2>&1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
    • conhost.exe (PID: 2520 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • wget.exe (PID: 3812 cmdline: wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://epicgames-download1.akamaized.net/Builds/UnrealEngineLauncher/Installers/Win32/EpicInstaller-15.17.1.msi?launcherfilename=EpicInstaller-15.17.1-unrealEngine.msi" MD5: 3DADB6E2ECE9C4B3E1E322E617658B60)
  • msiexec.exe (PID: 6996 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\download\EpicInstaller-15.17.1-unrealEngine.msi" MD5: E5DA170027542E25EDE42FC54C929077)
  • msiexec.exe (PID: 2148 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 5168 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 58A23805EF6FEF63BB0D3241077B6055 C MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • rundll32.exe (PID: 2372 cmdline: rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI7BA8.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5637875 5 CustomActionManaged!CustomActionManaged.CustomActions.ValidatePathLength MD5: 889B99C52A60DD49227C5E485A016679)
    • msiexec.exe (PID: 3408 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 3A9E928A23721413ED58A57A3ED0EE78 MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • rundll32.exe (PID: 6544 cmdline: rundll32.exe "C:\Windows\Installer\MSI1EC1.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5644000 10 CustomActionManaged!CustomActionManaged.CustomActions.TelemetrySendStart MD5: 889B99C52A60DD49227C5E485A016679)
      • rundll32.exe (PID: 2700 cmdline: rundll32.exe "C:\Windows\Installer\MSI2BC2.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5647328 16 CustomActionManaged!CustomActionManaged.CustomActions.SetStartupCmdlineArgs MD5: 889B99C52A60DD49227C5E485A016679)
      • rundll32.exe (PID: 5520 cmdline: rundll32.exe "C:\Windows\Installer\MSI328B.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5649046 22 CustomActionManaged!CustomActionManaged.CustomActions.CheckReparsePoints MD5: 889B99C52A60DD49227C5E485A016679)
      • rundll32.exe (PID: 5588 cmdline: rundll32.exe "C:\Windows\Installer\MSI7793.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5732234 50 CustomActionManaged!CustomActionManaged.CustomActions.TelemetrySendEnd MD5: 889B99C52A60DD49227C5E485A016679)
      • rundll32.exe (PID: 1408 cmdline: rundll32.exe "C:\Windows\Installer\MSI90CA.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5738687 59 CustomActionManaged!CustomActionManaged.CustomActions.SetLauncherEpicGamesDirLoc MD5: 889B99C52A60DD49227C5E485A016679)
      • rundll32.exe (PID: 516 cmdline: rundll32.exe "C:\Windows\Installer\MSI95CC.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5739984 65 CustomActionManaged!CustomActionManaged.CustomActions.SetLauncherInstallDirLoc MD5: 889B99C52A60DD49227C5E485A016679)
      • rundll32.exe (PID: 6828 cmdline: rundll32.exe "C:\Windows\Installer\MSI988C.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5740671 71 CustomActionManaged!CustomActionManaged.CustomActions.SetServiceWrapperDirLoc MD5: 889B99C52A60DD49227C5E485A016679)
      • rundll32.exe (PID: 652 cmdline: rundll32.exe "C:\Windows\Installer\MSIA08C.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5742718 77 CustomActionManaged!CustomActionManaged.TelemetryActions.TelemetrySendStart MD5: 889B99C52A60DD49227C5E485A016679)
    • msiexec.exe (PID: 4720 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding ADCB3C50BD4A94372326895BA9237D2A E Global\MSI0000 MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • rundll32.exe (PID: 652 cmdline: rundll32.exe "C:\Windows\Installer\MSIE11B.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5693781 31 CustomActionManaged!CustomActionManaged.CustomActions.MoveChainerToFolder MD5: 889B99C52A60DD49227C5E485A016679)
      • icacls.exe (PID: 2276 cmdline: "icacls.exe" "C:\Program Files (x86)\Epic Games\Launcher" /grant "BUILTIN\Users":(OI)(CI)F MD5: 2E49585E4E08565F52090B144062F97E)
        • conhost.exe (PID: 4404 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • icacls.exe (PID: 6668 cmdline: "icacls.exe" "C:\ProgramData\Epic" /grant "BUILTIN\Users":(OI)(CI)F MD5: 2E49585E4E08565F52090B144062F97E)
        • conhost.exe (PID: 6800 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • rundll32.exe (PID: 6784 cmdline: rundll32.exe "C:\Windows\Installer\MSIB774.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5748578 99 CustomActionManaged!CustomActionManaged.CustomActions.RegisterProductID MD5: 889B99C52A60DD49227C5E485A016679)
    • DXSETUP.exe (PID: 4708 cmdline: "C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe" /silent MD5: BF3F290275C21BDD3951955C9C3CF32C)
    • InstallChainer.exe (PID: 4800 cmdline: "C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exe" 44 "C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\EpicOnlineServices.msi" "EOSPRODUCTID=EpicGamesLauncher" "C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\EpicGamesLauncher.exe" com.epicgames.launcher://unrealEngine MD5: 4A3181A2E93579124799A9B81263768E)
  • SrTasks.exe (PID: 6208 cmdline: C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:1 MD5: 2694D2D28C368B921686FE567BD319EB)
    • conhost.exe (PID: 1292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://epicgames-download1.akamaized.net/Builds/UnrealEngineLauncher/Installers/Win32/EpicInstaller-15.17.1.msi?launcherfilename=EpicInstaller-15.17.1-unrealEngine.msi" > cmdline.out 2>&1, CommandLine: C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://epicgames-download1.akamaized.net/Builds/UnrealEngineLauncher/Installers/Win32/EpicInstaller-15.17.1.msi?launcherfilename=EpicInstaller-15.17.1-unrealEngine.msi" > cmdline.out 2>&1, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 5752, ProcessCommandLine: C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://epicgames-download1.akamaized.net/Builds/UnrealEngineLauncher/Installers/Win32/EpicInstaller-15.17.1.msi?launcherfilename=EpicInstaller-15.17.1-unrealEngine.msi" > cmdline.out 2>&1, ProcessId: 2228, ProcessName: cmd.exe
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore SRInitDone
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Content\Font\Noto_License.txtJump to behavior
Source: Binary string: DSETUP.pdb source: DXSETUP.exe, DXSETUP.exe, 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp
Source: Binary string: DSETUP.pdb0 source: DXSETUP.exe, 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp
Source: Binary string: d:\build\++Portal\Sync\Portal\Source\Installers\EpicOnlineServicesHelper\CustomActionManaged\obj\x86\Release\CustomActionManaged.pdb source: rundll32.exe, 00000021.00000003.4486279959.0000000004383000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.0000000004597000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4501842414.0000000004750000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4521802675.0000000004D24000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.4581136611.00000000043D0000.00000004.00000020.00020000.00000000.sdmp, CustomActionManaged.dll.36.dr
Source: Binary string: dsetup32.pdb source: DXSETUP.exe, DXSETUP.exe, 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp
Source: Binary string: api-ms-win-core-string-l1-1-0.pdb source: api-ms-win-core-string-l1-1-0.dll.9.dr
Source: Binary string: XInput1_3.pdb source: DXSETUP.exe, 00000013.00000003.4360454414.0000000000C6C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: XInput1_3.pdb@ source: DXSETUP.exe, 00000013.00000003.4360454414.0000000000C6C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: d:\build\++Portal\Sync\Engine\Restricted\NotForLicensees\Source\Programs\UnrealEngineLauncherInstaller\CustomActionManaged\obj\x86\Release\CustomActionManaged.pdb source: rundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, CustomActionManaged.dll.17.dr
Source: Binary string: C:\agent\_work\66\s\build\ship\x86\wixca.pdb source: rundll32.exe, 00000011.00000003.4037619149.0000000007402000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\agent\_work\66\s\build\ship\x86\SfxCA.pdb source: MSI7BA8.tmp.8.dr
Source: Binary string: d:\build\++Portal\Sync\Engine\Source\Programs\NotForLicensees\UnrealEngineLauncherInstallChainer\InstallChainer\InstallChainer\obj\x86\Release\InstallChainer.pdb source: InstallChainer.exe, 00000020.00000000.4441421814.0000000000F52000.00000002.00000001.01000000.0000001E.sdmp
Source: Binary string: d:\agent\_work\3\s\\binaries\x86ret\bin\i386\\concrt140.i386.pdb source: concrt140.dll0.9.dr
Source: Binary string: C:\agent\_work\66\s\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdbP source: rundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000003.3472891647.000000000284F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534430652.000000000332C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567268404.0000000002B1C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585400435.0000000002DEC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4032094467.000000000326C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4033511562.00000000032BF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416914644.000000000271F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, InstallChainer.exe, 00000020.00000002.4619396490.00000000031D2000.00000002.00000001.01000000.00000020.sdmp, rundll32.exe, 00000021.00000003.4486279959.0000000004383000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486593475.00000000028FC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494431417.0000000002B4D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.0000000004597000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4501842414.0000000004750000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4502100417.0000000002CDC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4521802675.0000000004D24000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4522417398.00000000032EC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.4581136611.00000000043D0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.4581582974.00000000027FF000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.36.dr
Source: Binary string: DXSETUP.pdb source: DXSETUP.exe, DXSETUP.exe, 00000013.00000000.4128120904.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, DXSETUP.exe, 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp
Source: Binary string: dxupdate.pdb source: dxupdate.dll.19.dr
Source: Binary string: C:\agent\_work\66\s\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdb source: rundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000003.3472891647.000000000284F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534430652.000000000332C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567268404.0000000002B1C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585400435.0000000002DEC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4032094467.000000000326C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4033511562.00000000032BF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416914644.000000000271F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, InstallChainer.exe, InstallChainer.exe, 00000020.00000002.4619396490.00000000031D2000.00000002.00000001.01000000.00000020.sdmp, rundll32.exe, 00000021.00000003.4486279959.0000000004383000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486593475.00000000028FC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494431417.0000000002B4D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.0000000004597000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4501842414.0000000004750000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4502100417.0000000002CDC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4521802675.0000000004D24000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4522417398.00000000032EC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.4581136611.00000000043D0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.4581582974.00000000027FF000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.36.dr
Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile opened: c:
Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_00E744B1 FindFirstFileA,FindClose,19_2_00E744B1
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_6CE56CEC FindFirstFileA,FindClose,19_2_6CE56CEC
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_6CE5B23F FindFirstFileA,GetLastError,FindClose,__fread_nolock,_strnlen,_strnlen,FindFirstFileA,FindClose,19_2_6CE5B23F
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_6CE5C4A0 _strrchr,FindFirstFileA,FindClose,FindClose,FindFirstFileA,FindClose,_strrchr,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,_strrchr,FileTimeToSystemTime,FileTimeToSystemTime,19_2_6CE5C4A0
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_6CE5A3CE FindFirstFileA,lstrcmpA,lstrcmpA,GetFileAttributesA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,19_2_6CE5A3CE
Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Program Files (x86)\Epic Games\Launcher\Engine
Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Program Files (x86)\Epic Games\Launcher\NULL
Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Program Files (x86)\Epic Games\Launcher\Engine\NULL
Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries
Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\NULL
Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\ThirdParty

Networking

barindex
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 34.196.212.224 443Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 34.199.117.18 443
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 34.199.225.177 443
Source: App.locres1.9.drString found in binary or memory: http://Launcherhelp.epicgames.com
Source: rundll32.exe, 00000024.00000002.4539200762.0000000005141000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.epicgames.dev
Source: wget.exe, 00000002.00000003.3334081460.0000000002AC8000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.3334081460.0000000002AD0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000003.3472891647.0000000002853000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534430652.0000000003330000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567268404.0000000002B20000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585400435.0000000002DF0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.0000000007402000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.00000000074D7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4032094467.0000000003270000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416914644.000000000271F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486279959.00000000043BA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486593475.00000000028FC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494431417.0000000002B4D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.00000000045CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: wget.exe, 00000002.00000003.3334081460.0000000002AC8000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.3334081460.0000000002AD0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.00000000074D7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-string-l1-1-0.dll.9.dr, concrt140.dll0.9.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
Source: rundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000003.3472891647.0000000002853000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534430652.0000000003330000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567268404.0000000002B20000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585400435.0000000002DF0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.0000000007402000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4032094467.0000000003270000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416914644.000000000271F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486279959.00000000043BA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486593475.00000000028FC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494431417.0000000002B4D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.00000000045CE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4502100417.0000000002CDC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4501842414.0000000004787000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4521802675.0000000004D5B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4522417398.00000000032EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: rundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000003.3472891647.0000000002853000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534430652.0000000003330000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567268404.0000000002B20000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585400435.0000000002DF0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.0000000007402000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4032094467.0000000003270000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416914644.000000000271F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486279959.00000000043BA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486593475.00000000028FC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494431417.0000000002B4D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.00000000045CE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4502100417.0000000002CDC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4501842414.0000000004787000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4521802675.0000000004D5B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4522417398.00000000032EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/NETFoundationProjectsCodeSigningCA.crt0
Source: rundll32.exe, 0000000D.00000002.3550669837.0000000003398000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3550085101.0000000003398000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4432475429.00000000027AC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000002.4433698294.00000000027AC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000002.4536909445.000000000330A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: rundll32.exe, 0000000D.00000002.3550669837.0000000003398000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3550085101.0000000003398000.00000004.00000020.00020000.00000000.sdmp, DXSETUP.exe, 00000013.00000002.4384188941.0000000000C12000.00000004.00000020.00020000.00000000.sdmp, DXSETUP.exe, 00000013.00000003.4367690317.0000000000C0F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4432475429.00000000027AC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000002.4433698294.00000000027AC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000002.4536909445.000000000330A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: wget.exe, 00000002.00000003.3334081460.0000000002AC8000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000002.3373252779.0000000002AD9000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.3334081460.0000000002AD9000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.3334081460.0000000002AD0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.00000000074D7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-string-l1-1-0.dll.9.dr, concrt140.dll0.9.drString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
Source: wget.exe, 00000002.00000003.3334081460.0000000002AC8000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.3334081460.0000000002AD0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.00000000074D7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-string-l1-1-0.dll.9.dr, concrt140.dll0.9.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
Source: rundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000003.3472891647.0000000002853000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534430652.0000000003330000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567268404.0000000002B20000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585400435.0000000002DF0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.0000000007402000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4032094467.0000000003270000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416914644.000000000271F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486279959.00000000043BA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486593475.00000000028FC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494431417.0000000002B4D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.00000000045CE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4502100417.0000000002CDC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4501842414.0000000004787000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4521802675.0000000004D5B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4522417398.00000000032EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: rundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000003.3472891647.0000000002853000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534430652.0000000003330000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567268404.0000000002B20000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585400435.0000000002DF0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.0000000007402000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4032094467.0000000003270000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416914644.000000000271F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486279959.00000000043BA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486593475.0000000002904000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.00000000045CE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494431417.0000000002B55000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4501842414.0000000004787000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4502100417.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4521802675.0000000004D5B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4522417398.00000000032F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0=
Source: rundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000003.3472891647.0000000002853000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534430652.0000000003330000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567268404.0000000002B20000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585400435.0000000002DF0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.0000000007402000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4032094467.0000000003270000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416914644.000000000271F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486279959.00000000043BA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486593475.00000000028FC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494431417.0000000002B4D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.00000000045CE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4502100417.0000000002CDC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4501842414.0000000004787000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4521802675.0000000004D5B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4522417398.00000000032EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/NETFoundationProjectsCodeSigningCA.crl0E
Source: wget.exe, 00000002.00000003.3334081460.0000000002AC8000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.3334081460.0000000002AD0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.00000000074D7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-string-l1-1-0.dll.9.dr, concrt140.dll0.9.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
Source: rundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000003.3472891647.0000000002853000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534430652.0000000003330000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567268404.0000000002B20000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585400435.0000000002DF0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.0000000007402000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4032094467.0000000003270000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416914644.000000000271F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486279959.00000000043BA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486593475.00000000028FC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494431417.0000000002B4D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.00000000045CE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4502100417.0000000002CDC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4501842414.0000000004787000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4521802675.0000000004D5B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4522417398.00000000032EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: wget.exe, 00000002.00000003.3334081460.0000000002AC8000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.3334081460.0000000002AD0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000003.3472891647.0000000002853000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534430652.0000000003330000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567268404.0000000002B20000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585400435.0000000002DF0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.0000000007402000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.00000000074D7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4032094467.0000000003270000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416914644.000000000271F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486279959.00000000043BA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486593475.00000000028FC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494431417.0000000002B4D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.00000000045CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: rundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000003.3472891647.0000000002853000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534430652.0000000003330000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567268404.0000000002B20000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585400435.0000000002DF0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.0000000007402000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4032094467.0000000003270000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416914644.000000000271F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486279959.00000000043BA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486593475.00000000028FC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494431417.0000000002B4D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.00000000045CE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4502100417.0000000002CDC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4501842414.0000000004787000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4521802675.0000000004D5B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4522417398.00000000032EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/NETFoundationProjectsCodeSigningCA.crl0L
Source: wget.exe, 00000002.00000003.3334081460.0000000002AC8000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.3334081460.0000000002AD0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.00000000074D7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-string-l1-1-0.dll.9.dr, concrt140.dll0.9.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
Source: rundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000003.3472891647.0000000002853000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534430652.0000000003330000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567268404.0000000002B20000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585400435.0000000002DF0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.0000000007402000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4032094467.0000000003270000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416914644.000000000271F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486279959.00000000043BA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486593475.00000000028FC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494431417.0000000002B4D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.00000000045CE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4502100417.0000000002CDC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4501842414.0000000004787000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4521802675.0000000004D5B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4522417398.00000000032EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: wget.exe, 00000002.00000003.3334081460.0000000002AC8000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000002.3373252779.0000000002AD9000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.3334081460.0000000002AD9000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.3334081460.0000000002AD0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.00000000074D7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-string-l1-1-0.dll.9.dr, concrt140.dll0.9.drString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
Source: rundll32.exe, 0000000D.00000002.3551839836.0000000004F30000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000002.4438890151.000000000471D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://datarouter.cfef.live.use1a.on.epicgames.com
Source: rundll32.exe, 0000000D.00000002.3551839836.0000000004F30000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000002.4438890151.000000000471D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://datarouter.ol.epicgames.com
Source: rundll32.exe, 00000024.00000002.4539200762.0000000005141000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://eos-gateway-ingressv2-prod-c3-w1.befa.live.use1a.on.epicgames.com
Source: rundll32.exe, 0000000F.00000002.3590187923.0000000002E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://msdn.microsoft.c
Source: rundll32.exe, 0000000D.00000002.3550669837.0000000003398000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3550085101.0000000003398000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4432475429.00000000027AC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000002.4433698294.00000000027AC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000002.4536909445.000000000330A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
Source: wget.exe, 00000002.00000003.3334081460.0000000002AC8000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.3334081460.0000000002AD0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000003.3472891647.0000000002853000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534430652.0000000003330000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567268404.0000000002B20000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585400435.0000000002DF0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.0000000007402000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.00000000074D7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4032094467.0000000003270000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416914644.000000000271F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486279959.00000000043BA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486593475.00000000028FC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494431417.0000000002B4D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.00000000045CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
Source: rundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000003.3472891647.0000000002853000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534430652.0000000003330000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567268404.0000000002B20000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585400435.0000000002DF0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.0000000007402000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4032094467.0000000003270000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416914644.000000000271F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486279959.00000000043BA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486593475.0000000002904000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.00000000045CE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494431417.0000000002B55000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4501842414.0000000004787000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4502100417.0000000002CE4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4521802675.0000000004D5B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4522417398.00000000032F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0K
Source: wget.exe, 00000002.00000003.3334081460.0000000002AC8000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.3334081460.0000000002AD0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000003.3472891647.0000000002853000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534430652.0000000003330000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567268404.0000000002B20000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585400435.0000000002DF0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.0000000007402000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.00000000074D7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4032094467.0000000003270000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416914644.000000000271F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486279959.00000000043BA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486593475.00000000028FC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494431417.0000000002B4D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.00000000045CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0N
Source: rundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000003.3472891647.0000000002853000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534430652.0000000003330000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567268404.0000000002B20000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585400435.0000000002DF0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.0000000007402000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4032094467.0000000003270000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416914644.000000000271F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486279959.00000000043BA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486593475.00000000028FC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494431417.0000000002B4D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.00000000045CE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4502100417.0000000002CDC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4501842414.0000000004787000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4521802675.0000000004D5B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4522417398.00000000032EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0O
Source: wget.exe, 00000002.00000003.3334081460.0000000002AC8000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000002.3373252779.0000000002AD9000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.3334081460.0000000002AD9000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.3334081460.0000000002AD0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.00000000074D7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-string-l1-1-0.dll.9.dr, concrt140.dll0.9.drString found in binary or memory: http://ocsp.sectigo.com0
Source: rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-string-l1-1-0.dll.9.dr, concrt140.dll0.9.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-string-l1-1-0.dll.9.dr, concrt140.dll0.9.drString found in binary or memory: http://s.symcd.com06
Source: rundll32.exe, 0000000D.00000002.3551839836.0000000004EA1000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000002.3551839836.0000000004F1D000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000002.4438890151.0000000004691000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000002.4438890151.0000000004707000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000024.00000002.4539200762.00000000050B1000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000024.00000002.4539200762.000000000512E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-string-l1-1-0.dll.9.dr, concrt140.dll0.9.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-string-l1-1-0.dll.9.dr, concrt140.dll0.9.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-string-l1-1-0.dll.9.dr, concrt140.dll0.9.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: rundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000003.3472891647.0000000002853000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534430652.0000000003330000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567268404.0000000002B20000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585400435.0000000002DF0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.0000000007402000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4032094467.0000000003270000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416914644.000000000271F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486279959.00000000043BA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486593475.00000000028FC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494431417.0000000002B4D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.00000000045CE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4502100417.0000000002CDC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4501842414.0000000004787000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4521802675.0000000004D5B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4522417398.00000000032EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wixtoolset.org
Source: InstallChainer.exeString found in binary or memory: http://wixtoolset.org/
Source: rundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, InstallChainer.exe, 00000020.00000002.4619396490.00000000031D2000.00000002.00000001.01000000.00000020.sdmp, rundll32.exe, 00000021.00000003.4486279959.0000000004383000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.0000000004597000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4501842414.0000000004750000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4521802675.0000000004D24000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.4581136611.00000000043D0000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.36.drString found in binary or memory: http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
Source: rundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, InstallChainer.exe, InstallChainer.exe, 00000020.00000002.4619396490.00000000031D2000.00000002.00000001.01000000.00000020.sdmp, rundll32.exe, 00000021.00000003.4486279959.0000000004383000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.0000000004597000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4501842414.0000000004750000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4521802675.0000000004D24000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.4581136611.00000000043D0000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.36.drString found in binary or memory: http://wixtoolset.org/news/
Source: rundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, InstallChainer.exe, InstallChainer.exe, 00000020.00000002.4619396490.00000000031D2000.00000002.00000001.01000000.00000020.sdmp, rundll32.exe, 00000021.00000003.4486279959.0000000004383000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.0000000004597000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4501842414.0000000004750000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4521802675.0000000004D24000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.4581136611.00000000043D0000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.36.drString found in binary or memory: http://wixtoolset.org/releases/
Source: InstallChainer.exeString found in binary or memory: http://wixtoolset.org/telemetry/v
Source: DXSETUP.exe, 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmp, DXSETUP.exe, 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpString found in binary or memory: http://www.BetaPlace.com
Source: DXSETUP.exe, 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpString found in binary or memory: http://www.BetaPlace.com.
Source: DXSETUP.exe, 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpString found in binary or memory: http://www.BetaPlace.com.?
Source: DXSETUP.exe, 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpString found in binary or memory: http://www.BetaPlace.comEContinuare
Source: DXSETUP.exe, 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpString found in binary or memory: http://www.betaplace.com
Source: DXSETUP.exe, DXSETUP.exe, 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmp, DXSETUP.exe, 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpString found in binary or memory: http://www.betaplace.com.
Source: wget.exe, 00000002.00000003.3334081460.0000000002AC8000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.3334081460.0000000002AD0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.00000000074D7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-string-l1-1-0.dll.9.dr, concrt140.dll0.9.drString found in binary or memory: http://www.digicert.com/CPS0
Source: rundll32.exe, 00000024.00000002.4539200762.000000000512E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.epicgame
Source: rundll32.exe, 00000024.00000002.4539200762.00000000050B1000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000024.00000002.4539200762.000000000512E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.epicgames.dev
Source: rundll32.exe, 00000021.00000003.4486279959.0000000004383000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.0000000004597000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4501842414.0000000004750000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000002.4539200762.00000000050B1000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4521802675.0000000004D24000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.4581136611.00000000043D0000.00000004.00000020.00020000.00000000.sdmp, CustomActionManaged.dll.36.drString found in binary or memory: https://api.epicgames.dev/
Source: rundll32.exe, 00000024.00000002.4539200762.00000000050B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.epicgames.dev/telemetry/data?SessionID=
Source: rundll32.exe, 00000024.00000002.4539200762.0000000005100000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.epicgames.dev/telemetry/data?SessionID=%7B05E76004-9FD2-4B7C-9331-C8C8FF384573%7D&AppID=
Source: rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-string-l1-1-0.dll.9.dr, concrt140.dll0.9.drString found in binary or memory: https://d.symcb.com/cps0%
Source: rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-string-l1-1-0.dll.9.dr, concrt140.dll0.9.drString found in binary or memory: https://d.symcb.com/rpa0
Source: rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-string-l1-1-0.dll.9.dr, concrt140.dll0.9.drString found in binary or memory: https://d.symcb.com/rpa0.
Source: rundll32.exe, 0000000D.00000002.3551839836.0000000004F1D000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000002.4438890151.0000000004707000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://datarouter.ol.epicgameT
Source: rundll32.exe, 0000000D.00000002.3551839836.0000000004EA1000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000002.3551839836.0000000004F1D000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000002.4438890151.0000000004691000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000002.4438890151.0000000004707000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://datarouter.ol.epicgames.com
Source: rundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000002.3551839836.0000000004EA1000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000002.4438890151.0000000004691000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, CustomActionManaged.dll.17.drString found in binary or memory: https://datarouter.ol.epicgames.com/
Source: rundll32.exe, 0000000D.00000002.3551839836.0000000004EA1000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000002.4438890151.0000000004691000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://datarouter.ol.epicgames.com/datarouter/api/v1/public/data?SessionID=
Source: rundll32.exe, 0000001F.00000002.4438890151.00000000046E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://datarouter.ol.epicgames.com/datarouter/api/v1/public/data?SessionID=%7BBDE4A3F4-5C77-43EB-A3
Source: wget.exe, 00000002.00000002.3373068210.0000000000A28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://epicgames-download1.akamaized.net/Builds/UnrealEngineLauncher/Installe
Source: wget.exe, 00000002.00000002.3373141394.0000000000B85000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000002.3373252779.0000000002AD4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://epicgames-download1.akamaized.net/Builds/UnrealEngineLauncher/Installers/Win32/EpicInstaller
Source: wget.exe, 00000002.00000003.3334081460.0000000002AC8000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000002.3373252779.0000000002AD9000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.3334081460.0000000002AD9000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.3334081460.0000000002AD0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.00000000074D7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-string-l1-1-0.dll.9.dr, concrt140.dll0.9.drString found in binary or memory: https://sectigo.com/CPS0
Source: wget.exe, 00000002.00000003.3334081460.0000000002AC8000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.3334081460.0000000002AD0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000003.3472891647.0000000002853000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534430652.0000000003330000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567268404.0000000002B20000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585400435.0000000002DF0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.0000000007402000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.00000000074D7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4032094467.0000000003270000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416914644.000000000271F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486279959.00000000043BA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486593475.0000000002904000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486593475.00000000028FC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494431417.0000000002B4D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_00E74D57 CreateMutexA,GetLastError,SetErrorMode,SetErrorMode,LoadLibraryA,SetErrorMode,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,DirectXSetupSetCallback,DirectXSetupSetCallback,DirectXSetupA,GetAsyncKeyState,ExitWindowsEx,#17,FreeLibrary,GetLastError,DirectXSetupA,GetLastError,FreeLibrary,GetLastError,GetLastError,CloseHandle,CloseHandle,EnumWindows,19_2_00E74D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Users\user\AppData\Local\Temp\DX4270.tmp\d3dx10_43_x86.catJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Users\user\AppData\Local\Temp\DX4270.tmp\d3dcsx_43_x86.catJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Users\user\AppData\Local\Temp\DX4270.tmp\xinput1_3_x86.catJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Users\user\AppData\Local\Temp\DX4270.tmp\d3dx11_43_x86.catJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Users\user\AppData\Local\Temp\DX4270.tmp\D3DCompiler_43_x86.catJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_00E74D57 CreateMutexA,GetLastError,SetErrorMode,SetErrorMode,LoadLibraryA,SetErrorMode,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,DirectXSetupSetCallback,DirectXSetupSetCallback,DirectXSetupA,GetAsyncKeyState,ExitWindowsEx,#17,FreeLibrary,GetLastError,DirectXSetupA,GetLastError,FreeLibrary,GetLastError,GetLastError,CloseHandle,CloseHandle,EnumWindows,19_2_00E74D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_00E76964 GetSystemDirectoryA,GetLastError,#17,ExitWindowsEx,19_2_00E76964
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\560898.msiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1E53.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1EC1.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2BC2.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{B85FAA6E-A9AA-4655-9029-E1A4EDC05E1A}Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI30D4.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI328B.tmpJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI1EC1.tmp-Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI1EC1.tmp-\CustomActionManaged.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI1EC1.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI1EC1.tmp-\CustomAction.configJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI2BC2.tmp-
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI2BC2.tmp-\CustomActionManaged.dll
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI2BC2.tmp-\Microsoft.Deployment.WindowsInstaller.dll
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI2BC2.tmp-\CustomAction.config
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI328B.tmp-
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI328B.tmp-\CustomActionManaged.dll
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI328B.tmp-\Microsoft.Deployment.WindowsInstaller.dll
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI328B.tmp-\CustomAction.config
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIE11B.tmp-
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIE11B.tmp-\CustomActionManaged.dll
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIE11B.tmp-\Microsoft.Deployment.WindowsInstaller.dll
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIE11B.tmp-\CustomAction.config
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\Logs\DirectX.log
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET621E.tmp
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET621E.tmp
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET64AE.tmp
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET64AE.tmp
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET65E6.tmp
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET65E6.tmp
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET672E.tmp
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET672E.tmp
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET68E4.tmp
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET68E4.tmp
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI7793.tmp-
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI7793.tmp-\CustomActionManaged.dll
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI7793.tmp-\Microsoft.Deployment.WindowsInstaller.dll
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI7793.tmp-\CustomAction.config
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI90CA.tmp-
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI90CA.tmp-\CustomActionManaged.dll
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI90CA.tmp-\Microsoft.Deployment.WindowsInstaller.dll
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI90CA.tmp-\CustomAction.config
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI95CC.tmp-
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI95CC.tmp-\CustomActionManaged.dll
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI95CC.tmp-\Microsoft.Deployment.WindowsInstaller.dll
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI95CC.tmp-\CustomAction.config
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI988C.tmp-
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI988C.tmp-\CustomActionManaged.dll
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI988C.tmp-\Microsoft.Deployment.WindowsInstaller.dll
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI988C.tmp-\CustomAction.config
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIA08C.tmp-
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIA08C.tmp-\CustomActionManaged.dll
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIA08C.tmp-\Microsoft.Deployment.WindowsInstaller.dll
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIA08C.tmp-\CustomAction.config
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIB774.tmp-
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIB774.tmp-\CustomActionManaged.dll
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIB774.tmp-\Microsoft.Deployment.WindowsInstaller.dll
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIB774.tmp-\CustomAction.config
Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI1E53.tmpJump to behavior
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_00E7EE9B19_2_00E7EE9B
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_00E8503D19_2_00E8503D
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_00E7940019_2_00E79400
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_00E8492119_2_00E84921
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_00E856FC19_2_00E856FC
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_00E84E6A19_2_00E84E6A
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_00E843D819_2_00E843D8
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_6CE669F219_2_6CE669F2
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_6CE5C4A019_2_6CE5C4A0
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_6CE64FC119_2_6CE64FC1
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_6CE6231019_2_6CE62310
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_733FDD9D19_2_733FDD9D
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeCode function: 32_2_031D346532_2_031D3465
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeCode function: 32_2_0192105032_2_01921050
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 37_3_04632B1037_3_04632B10
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: String function: 733F64D5 appears 57 times
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: String function: 6CE56391 appears 137 times
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: String function: 00E7390A appears 59 times
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: String function: 00E7ABA8 appears 31 times
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: String function: 6CE56210 appears 91 times
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: String function: 6CE622A4 appears 34 times
Source: api-ms-win-core-localization-l1-2-0.dll.9.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-conio-l1-1-0.dll.9.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-heap-l1-1-0.dll.9.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-handle-l1-1-0.dll.9.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-file-l1-2-0.dll.9.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-debug-l1-1-0.dll.9.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-stdio-l1-1-0.dll.9.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-environment-l1-1-0.dll.9.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-namedpipe-l1-1-0.dll.9.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-datetime-l1-1-0.dll.9.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-heap-l1-1-0.dll.9.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-console-l1-2-0.dll.9.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-file-l2-1-0.dll.9.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-string-l1-1-0.dll.9.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-string-l1-1-0.dll.9.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-console-l1-1-0.dll.9.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-synch-l1-1-0.dll.9.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-rtlsupport-l1-1-0.dll.9.drStatic PE information: No import functions for PE file found
Source: CustomActionManaged.dll.13.dr, AnalyticsPayload.csSuspicious method names: .AnalyticsPayload.GetActionEndAnalyticsPayloadString
Source: CustomActionManaged.dll.13.dr, AnalyticsPayload.csSuspicious method names: .AnalyticsPayload.GetActionStartAnalyticsPayloadString
Source: CustomActionManaged.dll.13.dr, AnalyticsPayload.csSuspicious method names: .AnalyticsPayload.GetActionUpgradeStartAnalyticsPayloadString
Source: CustomActionManaged.dll.13.dr, AnalyticsPayload.csSuspicious method names: .AnalyticsPayload.GetCompactedJsonString
Source: CustomActionManaged.dll.13.dr, AnalyticsPayload.csSuspicious method names: .AnalyticsPayload.GetActionUpgradeEndAnalyticsPayloadString
Source: CustomActionManaged.dll.13.dr, CustomActions.csSuspicious method names: .CustomActions.GetAnalyticsPayload
Source: CustomActionManaged.dll.14.dr, CustomActions.csSuspicious method names: .CustomActions.GetAnalyticsPayload
Source: CustomActionManaged.dll.11.dr, CustomActions.csSuspicious method names: .CustomActions.GetAnalyticsPayload
Source: CustomActionManaged.dll.14.dr, AnalyticsPayload.csSuspicious method names: .AnalyticsPayload.GetActionEndAnalyticsPayloadString
Source: CustomActionManaged.dll.14.dr, AnalyticsPayload.csSuspicious method names: .AnalyticsPayload.GetActionStartAnalyticsPayloadString
Source: CustomActionManaged.dll.14.dr, AnalyticsPayload.csSuspicious method names: .AnalyticsPayload.GetActionUpgradeStartAnalyticsPayloadString
Source: CustomActionManaged.dll.14.dr, AnalyticsPayload.csSuspicious method names: .AnalyticsPayload.GetCompactedJsonString
Source: CustomActionManaged.dll.14.dr, AnalyticsPayload.csSuspicious method names: .AnalyticsPayload.GetActionUpgradeEndAnalyticsPayloadString
Source: CustomActionManaged.dll.11.dr, AnalyticsPayload.csSuspicious method names: .AnalyticsPayload.GetActionEndAnalyticsPayloadString
Source: CustomActionManaged.dll.11.dr, AnalyticsPayload.csSuspicious method names: .AnalyticsPayload.GetActionStartAnalyticsPayloadString
Source: CustomActionManaged.dll.11.dr, AnalyticsPayload.csSuspicious method names: .AnalyticsPayload.GetActionUpgradeStartAnalyticsPayloadString
Source: CustomActionManaged.dll.11.dr, AnalyticsPayload.csSuspicious method names: .AnalyticsPayload.GetCompactedJsonString
Source: CustomActionManaged.dll.11.dr, AnalyticsPayload.csSuspicious method names: .AnalyticsPayload.GetActionUpgradeEndAnalyticsPayloadString
Source: 560898.msi.9.drBinary or memory string: c.vBp
Source: classification engineClassification label: mal52.evad.win@45/1108@0/5
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_00E7390A __wstrtime,__wstrtime,_strrchr,FormatMessageA,LocalFree,GetLastError,19_2_00E7390A
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_00E74163 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,FreeLibrary,GetLastError,19_2_00E74163
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_6CE579F6 EndDialog,lstrcmpA,lstrcmpA,lstrcmpA,lstrcmpA,lstrcmpA,lstrcmpA,lstrcmpA,lstrcmpA,lstrcmpA,lstrcmpA,lstrcmpA,lstrcmpA,lstrcmpA,lstrcmpA,lstrcmpA,FindResourceA,GetLastError,LoadResource,GetLastError,_memset,SetDlgItemTextA,SendDlgItemMessageA,EndDialog,SendDlgItemMessageA,19_2_6CE579F6
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic GamesJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\Desktop\cmdline.outJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6800:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2520:120:WilError_03
Source: C:\Windows\SysWOW64\rundll32.exeMutant created: NULL
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeMutant created: \Sessions\1\BaseNamedObjects\DSETUP32 DLL Mutex
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4404:120:WilError_03
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeMutant created: \Sessions\1\BaseNamedObjects\***DirectXSetupA***
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeMutant created: \Sessions\1\BaseNamedObjects\DSETUP DLL Mutex
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1292:120:WilError_03
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeMutant created: \Sessions\1\BaseNamedObjects\DirectX Setup
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI61A5.tmpJump to behavior
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: WinMain19_2_00E74D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: WinMain19_2_00E74D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: WinMain19_2_00E74D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: WinMain19_2_00E74D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: WinMain19_2_00E74D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: dsetup.dll19_2_00E74D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: DirectXSetupA19_2_00E74D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: FreeLibrary()19_2_00E74D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: WinMain19_2_00E74D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: WinMain19_2_00E74D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: WinMain19_2_00E74D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: WinMain19_2_00E74D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: FreeLibrary()19_2_00E74D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: WinMain19_2_00E74D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: LoadLibrary()19_2_00E74D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: WinMain19_2_00E74D57
Source: C:\Windows\System32\msiexec.exeFile read: C:\Windows\win.iniJump to behavior
Source: C:\Windows\SysWOW64\wget.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI7BA8.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5637875 5 CustomActionManaged!CustomActionManaged.CustomActions.ValidatePathLength
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://epicgames-download1.akamaized.net/Builds/UnrealEngineLauncher/Installers/Win32/EpicInstaller-15.17.1.msi?launcherfilename=EpicInstaller-15.17.1-unrealEngine.msi" > cmdline.out 2>&1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://epicgames-download1.akamaized.net/Builds/UnrealEngineLauncher/Installers/Win32/EpicInstaller-15.17.1.msi?launcherfilename=EpicInstaller-15.17.1-unrealEngine.msi"
Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\download\EpicInstaller-15.17.1-unrealEngine.msi"
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 58A23805EF6FEF63BB0D3241077B6055 C
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI7BA8.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5637875 5 CustomActionManaged!CustomActionManaged.CustomActions.ValidatePathLength
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 3A9E928A23721413ED58A57A3ED0EE78
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSI1EC1.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5644000 10 CustomActionManaged!CustomActionManaged.CustomActions.TelemetrySendStart
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSI2BC2.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5647328 16 CustomActionManaged!CustomActionManaged.CustomActions.SetStartupCmdlineArgs
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSI328B.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5649046 22 CustomActionManaged!CustomActionManaged.CustomActions.CheckReparsePoints
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding ADCB3C50BD4A94372326895BA9237D2A E Global\MSI0000
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSIE11B.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5693781 31 CustomActionManaged!CustomActionManaged.CustomActions.MoveChainerToFolder
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe "C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe" /silent
Source: unknownProcess created: C:\Windows\System32\SrTasks.exe C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:1
Source: C:\Windows\System32\SrTasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "icacls.exe" "C:\Program Files (x86)\Epic Games\Launcher" /grant "BUILTIN\Users":(OI)(CI)F
Source: C:\Windows\SysWOW64\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "icacls.exe" "C:\ProgramData\Epic" /grant "BUILTIN\Users":(OI)(CI)F
Source: C:\Windows\SysWOW64\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSI7793.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5732234 50 CustomActionManaged!CustomActionManaged.CustomActions.TelemetrySendEnd
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exe "C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exe" 44 "C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\EpicOnlineServices.msi" "EOSPRODUCTID=EpicGamesLauncher" "C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\EpicGamesLauncher.exe" com.epicgames.launcher://unrealEngine
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSI90CA.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5738687 59 CustomActionManaged!CustomActionManaged.CustomActions.SetLauncherEpicGamesDirLoc
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSI95CC.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5739984 65 CustomActionManaged!CustomActionManaged.CustomActions.SetLauncherInstallDirLoc
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSI988C.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5740671 71 CustomActionManaged!CustomActionManaged.CustomActions.SetServiceWrapperDirLoc
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSIB774.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5748578 99 CustomActionManaged!CustomActionManaged.CustomActions.RegisterProductID
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://epicgames-download1.akamaized.net/Builds/UnrealEngineLauncher/Installers/Win32/EpicInstaller-15.17.1.msi?launcherfilename=EpicInstaller-15.17.1-unrealEngine.msi" Jump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 58A23805EF6FEF63BB0D3241077B6055 CJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 3A9E928A23721413ED58A57A3ED0EE78Jump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding ADCB3C50BD4A94372326895BA9237D2A E Global\MSI0000Jump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe "C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe" /silentJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exe "C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exe" 44 "C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\EpicOnlineServices.msi" "EOSPRODUCTID=EpicGamesLauncher" "C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\EpicGamesLauncher.exe" com.epicgames.launcher://unrealEngineJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI7BA8.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5637875 5 CustomActionManaged!CustomActionManaged.CustomActions.ValidatePathLengthJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSI1EC1.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5644000 10 CustomActionManaged!CustomActionManaged.CustomActions.TelemetrySendStartJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSI2BC2.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5647328 16 CustomActionManaged!CustomActionManaged.CustomActions.SetStartupCmdlineArgsJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSI328B.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5649046 22 CustomActionManaged!CustomActionManaged.CustomActions.CheckReparsePointsJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSI7793.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5732234 50 CustomActionManaged!CustomActionManaged.CustomActions.TelemetrySendEndJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSI90CA.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5738687 59 CustomActionManaged!CustomActionManaged.CustomActions.SetLauncherEpicGamesDirLocJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSI95CC.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5739984 65 CustomActionManaged!CustomActionManaged.CustomActions.SetLauncherInstallDirLocJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSI988C.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5740671 71 CustomActionManaged!CustomActionManaged.CustomActions.SetServiceWrapperDirLocJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSIE11B.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5693781 31 CustomActionManaged!CustomActionManaged.CustomActions.MoveChainerToFolderJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSIE11B.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5693781 31 CustomActionManaged!CustomActionManaged.CustomActions.MoveChainerToFolder
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "icacls.exe" "C:\Program Files (x86)\Epic Games\Launcher" /grant "BUILTIN\Users":(OI)(CI)F
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "icacls.exe" "C:\ProgramData\Epic" /grant "BUILTIN\Users":(OI)(CI)F
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSIB774.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5748578 99 CustomActionManaged!CustomActionManaged.CustomActions.RegisterProductID
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\wget.exeSection loaded: explorerframe.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: cryptnet.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msihnd.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: riched20.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: usp10.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msls31.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: dlnashext.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wpdshext.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cabinet.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cabinet.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: apphelp.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: version.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: advpack.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: dsetup.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: winmm.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: sfc.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: sfc_os.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: srclient.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: spp.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: powrprof.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: vssapi.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: vsstrace.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: umpdc.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: kernel.appcore.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: sxproxy.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: mscoree.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: msasn1.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: cryptsp.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: rsaenh.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: gpapi.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: cryptnet.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: iphlpapi.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: winnsi.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: cabinet.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: devrtl.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: cabinet.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: devrtl.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: spinf.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: drvstore.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: cabinet.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: devrtl.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: spinf.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: drvstore.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: cabinet.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: devrtl.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: spinf.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: drvstore.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: cabinet.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: devrtl.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: spinf.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: drvstore.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: cabinet.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: devrtl.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: spinf.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: drvstore.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: cabinet.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: devrtl.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: spinf.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: drvstore.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: spfileq.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: ntmarta.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: devrtl.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: spinf.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: drvstore.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: spfileq.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: devrtl.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: spinf.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: drvstore.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: spfileq.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: devrtl.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: spinf.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: drvstore.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: spfileq.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: devrtl.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: spinf.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: drvstore.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: spfileq.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: sfc.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: sfc_os.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: srclient.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: spp.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: powrprof.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: vssapi.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: vsstrace.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: umpdc.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: sxproxy.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: windows.storage.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: wldp.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: uxtheme.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: propsys.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: windows.fileexplorer.common.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: windows.staterepositoryps.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: profapi.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: spp.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: srclient.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: srcore.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: vssapi.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: vssapi.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: powrprof.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: ktmw32.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: vssapi.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: wer.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: bcd.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: vsstrace.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: umpdc.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: dsrole.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: msxml3.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: vss_ps.dll
Source: C:\Windows\SysWOW64\icacls.exeSection loaded: ntmarta.dll
Source: C:\Windows\SysWOW64\icacls.exeSection loaded: ntmarta.dll
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeSection loaded: mscoree.dll
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeSection loaded: apphelp.dll
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeSection loaded: kernel.appcore.dll
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeSection loaded: version.dll
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeSection loaded: cryptsp.dll
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeSection loaded: rsaenh.dll
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeSection loaded: msi.dll
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeSection loaded: uxtheme.dll
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeSection loaded: srpapi.dll
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeSection loaded: tsappcmp.dll
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeSection loaded: netapi32.dll
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeSection loaded: wkscli.dll
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeSection loaded: netutils.dll
Source: C:\Windows\SysWOW64\wget.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{56FDF344-FD6D-11d0-958A-006097C9A090}\InProcServer32Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile written: C:\ProgramData\Epic\EpicGamesLauncher\Data\EMS\EpicGamesLauncher\PortalRegions.iniJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Binary string: DSETUP.pdb source: DXSETUP.exe, DXSETUP.exe, 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp
Source: Binary string: DSETUP.pdb0 source: DXSETUP.exe, 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp
Source: Binary string: d:\build\++Portal\Sync\Portal\Source\Installers\EpicOnlineServicesHelper\CustomActionManaged\obj\x86\Release\CustomActionManaged.pdb source: rundll32.exe, 00000021.00000003.4486279959.0000000004383000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.0000000004597000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4501842414.0000000004750000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4521802675.0000000004D24000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.4581136611.00000000043D0000.00000004.00000020.00020000.00000000.sdmp, CustomActionManaged.dll.36.dr
Source: Binary string: dsetup32.pdb source: DXSETUP.exe, DXSETUP.exe, 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp
Source: Binary string: api-ms-win-core-string-l1-1-0.pdb source: api-ms-win-core-string-l1-1-0.dll.9.dr
Source: Binary string: XInput1_3.pdb source: DXSETUP.exe, 00000013.00000003.4360454414.0000000000C6C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: XInput1_3.pdb@ source: DXSETUP.exe, 00000013.00000003.4360454414.0000000000C6C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: d:\build\++Portal\Sync\Engine\Restricted\NotForLicensees\Source\Programs\UnrealEngineLauncherInstaller\CustomActionManaged\obj\x86\Release\CustomActionManaged.pdb source: rundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, CustomActionManaged.dll.17.dr
Source: Binary string: C:\agent\_work\66\s\build\ship\x86\wixca.pdb source: rundll32.exe, 00000011.00000003.4037619149.0000000007402000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\agent\_work\66\s\build\ship\x86\SfxCA.pdb source: MSI7BA8.tmp.8.dr
Source: Binary string: d:\build\++Portal\Sync\Engine\Source\Programs\NotForLicensees\UnrealEngineLauncherInstallChainer\InstallChainer\InstallChainer\obj\x86\Release\InstallChainer.pdb source: InstallChainer.exe, 00000020.00000000.4441421814.0000000000F52000.00000002.00000001.01000000.0000001E.sdmp
Source: Binary string: d:\agent\_work\3\s\\binaries\x86ret\bin\i386\\concrt140.i386.pdb source: concrt140.dll0.9.dr
Source: Binary string: C:\agent\_work\66\s\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdbP source: rundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000003.3472891647.000000000284F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534430652.000000000332C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567268404.0000000002B1C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585400435.0000000002DEC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4032094467.000000000326C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4033511562.00000000032BF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416914644.000000000271F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, InstallChainer.exe, 00000020.00000002.4619396490.00000000031D2000.00000002.00000001.01000000.00000020.sdmp, rundll32.exe, 00000021.00000003.4486279959.0000000004383000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486593475.00000000028FC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494431417.0000000002B4D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.0000000004597000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4501842414.0000000004750000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4502100417.0000000002CDC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4521802675.0000000004D24000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4522417398.00000000032EC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.4581136611.00000000043D0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.4581582974.00000000027FF000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.36.dr
Source: Binary string: DXSETUP.pdb source: DXSETUP.exe, DXSETUP.exe, 00000013.00000000.4128120904.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, DXSETUP.exe, 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp
Source: Binary string: dxupdate.pdb source: dxupdate.dll.19.dr
Source: Binary string: C:\agent\_work\66\s\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdb source: rundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000003.3472891647.000000000284F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534430652.000000000332C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567268404.0000000002B1C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585400435.0000000002DEC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4032094467.000000000326C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4033511562.00000000032BF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416914644.000000000271F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, InstallChainer.exe, InstallChainer.exe, 00000020.00000002.4619396490.00000000031D2000.00000002.00000001.01000000.00000020.sdmp, rundll32.exe, 00000021.00000003.4486279959.0000000004383000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486593475.00000000028FC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494431417.0000000002B4D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.0000000004597000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4501842414.0000000004750000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4502100417.0000000002CDC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4521802675.0000000004D24000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4522417398.00000000032EC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.4581136611.00000000043D0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.4581582974.00000000027FF000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.36.dr
Source: api-ms-win-core-localization-l1-2-0.dll.9.drStatic PE information: 0xB4568012 [Mon Nov 16 03:29:22 2065 UTC]
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_00E73C3F GetVersionExA,LoadLibraryA,GetProcAddress,GetLastError,FreeLibrary,GetLastError,19_2_00E73C3F
Source: CustomActionManaged.dll.14.drStatic PE information: real checksum: 0x0 should be: 0x16c68
Source: MSI7BA8.tmp.8.drStatic PE information: real checksum: 0x34095 should be: 0x434e4
Source: MSI328B.tmp.9.drStatic PE information: real checksum: 0x34095 should be: 0x434e4
Source: MSI2BC2.tmp.9.drStatic PE information: real checksum: 0x34095 should be: 0x434e4
Source: CustomActionManaged.dll.11.drStatic PE information: real checksum: 0x0 should be: 0x16c68
Source: MSI1EC1.tmp.9.drStatic PE information: real checksum: 0x34095 should be: 0x434e4
Source: CustomActionManaged.dll.13.drStatic PE information: real checksum: 0x0 should be: 0x16c68
Source: CrashReportClient.exe.9.drStatic PE information: section name: .uedbg
Source: CrashReportClient.exe.9.drStatic PE information: section name: _RDATA
Source: EpicGamesLauncher.exe.9.drStatic PE information: section name: .uedbg
Source: EpicGamesLauncher.exe.9.drStatic PE information: section name: _RDATA
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_3_06D92560 push edi; iretd 15_3_06D9265A
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_3_06D91EFB pushfd ; iretd 15_3_06D91F01
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_3_06D9265B push edi; iretd 15_3_06D92662
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_3_06D923B8 push esi; iretd 15_3_06D9255A
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_3_06D923A9 push esp; iretd 15_3_06D923AA
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_3_06D923AB push esp; iretd 15_3_06D923B2
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_3_06D9247B push ebp; iretd 15_3_06D92482
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_3_06D92463 push ebp; iretd 15_3_06D9247A
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_00E7ABED push ecx; ret 19_2_00E7AC00
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_6CE622E9 push ecx; ret 19_2_6CE622FC
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_733F8B11 push ecx; ret 19_2_733F8B24

Persistence and Installation Behavior

barindex
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A43489159A520F0D93D032CCAF37E7FE20A8B419 Blob
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A43489159A520F0D93D032CCAF37E7FE20A8B419 Blob
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET64AE.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIA08C.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\concrt140.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI1EC1.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-file-l1-2-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-core-datetime-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-crt-stdio-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI7B87.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-handle-l1-1-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI95CC.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET68E4.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-crt-environment-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-heap-l1-1-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIE11B.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Users\user\AppData\Local\Temp\DX4270.tmp\d3dcsx_43.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI61A5.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI7793.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\ProgramData\Epic\EpicGamesLauncher\InstallChainer.exeJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIB774.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-string-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2BC2.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\DirectXRedist\dsetup32.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET672E.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI988C.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-crt-heap-l1-1-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIA08C.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET621E.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\DirectXRedist\DSETUP.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Users\user\AppData\Local\Temp\DX4270.tmp\d3dx11_43.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\msvcp140_2.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI2BC2.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI7BA8.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\D3DCompiler_43.dll (copy)Jump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-core-file-l2-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\EpicGamesLauncher.exeJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-namedpipe-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI7BA8.tmpJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\d3dx11_43.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET65E6.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIE11B.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI328B.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-core-rtlsupport-l1-1-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI988C.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\CrashReportClient.exeJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Users\user\AppData\Local\Temp\DX4270.tmp\dxupdate.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-crt-conio-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-debug-l1-1-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI1EC1.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-crt-string-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-synch-l1-1-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI90CA.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-localization-l1-2-0.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Users\user\AppData\Local\Temp\DX4270.tmp\D3DCompiler_43.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\ProgramData\Epic\EpicGamesLauncher\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI90CA.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI328B.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI95CC.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\d3dcsx_43.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\xinput1_3.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Users\user\AppData\Local\Temp\DX4270.tmp\xinput1_3.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\concrt140.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Users\user\AppData\Local\Temp\DX4270.tmp\d3dx10_43.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI328B.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI2BC2.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1E53.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\vccorlib140.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI7793.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-core-console-l1-2-0.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\d3dx10_43.dll (copy)Jump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIB774.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI7BA8.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1EC1.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-console-l1-1-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\ProgramData\Epic\EpicGamesLauncher\InstallChainer.exeJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\ProgramData\Epic\EpicGamesLauncher\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\D3DCompiler_43.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET64AE.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIA08C.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI1EC1.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\d3dx11_43.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET65E6.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIE11B.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI328B.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI988C.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI95CC.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET68E4.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI1EC1.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIE11B.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI7793.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI90CA.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIB774.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2BC2.tmpJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET672E.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI90CA.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI988C.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI328B.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI95CC.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\d3dcsx_43.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\xinput1_3.dll (copy)Jump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIA08C.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET621E.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI2BC2.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI328B.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1E53.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI7793.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\d3dx10_43.dll (copy)Jump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIB774.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1EC1.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI2BC2.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_6CE5C3A6 GetPrivateProfileStringA,19_2_6CE5C3A6
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Content\Font\Noto_License.txtJump to behavior
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
Source: C:\Windows\System32\SrTasks.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "icacls.exe" "C:\Program Files (x86)\Epic Games\Launcher" /grant "BUILTIN\Users":(OI)(CI)F
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeMemory allocated: 18E0000 memory reserve | memory write watch
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeMemory allocated: 3360000 memory reserve | memory write watch
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeMemory allocated: 1940000 memory reserve | memory write watch
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeDropped PE file which has not been started: C:\Windows\SysWOW64\SET64AE.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSIA08C.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\concrt140.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSI1EC1.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-file-l1-2-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-core-datetime-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-crt-stdio-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI7B87.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-handle-l1-1-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSI95CC.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeDropped PE file which has not been started: C:\Windows\SysWOW64\SET68E4.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSIE11B.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-crt-environment-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-heap-l1-1-0.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\DX4270.tmp\d3dcsx_43.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI61A5.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSI7793.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSIB774.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI2BC2.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-string-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\DirectXRedist\dsetup32.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeDropped PE file which has not been started: C:\Windows\SysWOW64\SET672E.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSI988C.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-crt-heap-l1-1-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSIA08C.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeDropped PE file which has not been started: C:\Windows\SysWOW64\SET621E.tmpJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\DX4270.tmp\d3dx11_43.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\msvcp140_2.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSI2BC2.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeDropped PE file which has not been started: C:\Windows\SysWOW64\D3DCompiler_43.dll (copy)Jump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI7BA8.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-core-file-l2-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\EpicGamesLauncher.exeJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI7BA8.tmpJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeDropped PE file which has not been started: C:\Windows\SysWOW64\d3dx11_43.dll (copy)Jump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-namedpipe-l1-1-0.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeDropped PE file which has not been started: C:\Windows\SysWOW64\SET65E6.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSIE11B.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSI328B.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-core-rtlsupport-l1-1-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSI988C.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\CrashReportClient.exeJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\DX4270.tmp\dxupdate.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-crt-conio-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-debug-l1-1-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSI1EC1.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-crt-string-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-synch-l1-1-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSI90CA.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-localization-l1-2-0.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\DX4270.tmp\D3DCompiler_43.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\ProgramData\Epic\EpicGamesLauncher\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSI90CA.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSI95CC.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSI328B.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeDropped PE file which has not been started: C:\Windows\SysWOW64\d3dcsx_43.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeDropped PE file which has not been started: C:\Windows\SysWOW64\xinput1_3.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\DX4270.tmp\xinput1_3.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\DX4270.tmp\d3dx10_43.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\concrt140.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSI2BC2.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI328B.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI1E53.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\vccorlib140.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSI7793.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-core-console-l1-2-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSIB774.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeDropped PE file which has not been started: C:\Windows\SysWOW64\d3dx10_43.dll (copy)Jump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI7BA8.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI1EC1.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-console-l1-1-0.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_19-30409
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_19-28079
Source: C:\Windows\System32\msiexec.exe TID: 6604Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 2796Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\SrTasks.exe TID: 1964Thread sleep time: -300000s >= -30000s
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7164Thread sleep time: -30000s >= -30000s
Source: C:\Windows\SysWOW64\rundll32.exe TID: 964Thread sleep time: -30000s >= -30000s
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile Volume queried: C:\Windows FullSizeInformation
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile Volume queried: C:\ FullSizeInformation
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_00E744B1 FindFirstFileA,FindClose,19_2_00E744B1
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_6CE56CEC FindFirstFileA,FindClose,19_2_6CE56CEC
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_6CE5B23F FindFirstFileA,GetLastError,FindClose,__fread_nolock,_strnlen,_strnlen,FindFirstFileA,FindClose,19_2_6CE5B23F
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_6CE5C4A0 _strrchr,FindFirstFileA,FindClose,FindClose,FindFirstFileA,FindClose,_strrchr,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,_strrchr,FileTimeToSystemTime,FileTimeToSystemTime,19_2_6CE5C4A0
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_6CE5A3CE FindFirstFileA,lstrcmpA,lstrcmpA,GetFileAttributesA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,19_2_6CE5A3CE
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_00E8152E __get_wpgmptr,VirtualQuery,GetSystemInfo,GetModuleHandleW,GetProcAddress,VirtualAlloc,VirtualProtect,19_2_00E8152E
Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Program Files (x86)\Epic Games\Launcher\Engine
Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Program Files (x86)\Epic Games\Launcher\NULL
Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Program Files (x86)\Epic Games\Launcher\Engine\NULL
Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries
Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\NULL
Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\ThirdParty
Source: SrTasks.exe, 00000017.00000003.4313089834.0000023E8BB42000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WORKGROUPar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:88
Source: DXSETUP.exe, 00000013.00000002.4384188941.0000000000BCE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: rundll32.exe, 00000022.00000002.4497257595.0000000002B6C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rPH]qemu
Source: DXSETUP.exe, 00000013.00000002.4384188941.0000000000BCE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
Source: SrTasks.exe, 00000017.00000002.4420452235.0000023E8BAE8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WORKGROUPar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:
Source: SrTasks.exe, 00000017.00000002.4420452235.0000023E8BAE8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \Device\HarddiskVolume1\??\Volume{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:m
Source: rundll32.exe, 00000024.00000002.4536909445.000000000330A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll>
Source: SrTasks.exe, 00000017.00000002.4420452235.0000023E8BAE8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \Device\HarddiskVolume1\??\Volume{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:::
Source: wget.exe, 00000002.00000002.3373068210.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000002.3550669837.0000000003398000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3550085101.0000000003398000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000002.4433698294.000000000279A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4432475429.000000000279A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeAPI call chain: ExitProcess graph end nodegraph_19-27572
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeAPI call chain: ExitProcess graph end nodegraph_19-28080
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeAPI call chain: ExitProcess graph end nodegraph_19-29173
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeAPI call chain: ExitProcess graph end nodegraph_19-26830
Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_00E73647 GetWindowsDirectoryA,OutputDebugStringA,CreateDirectoryA,GetLastError,__wstrtime,__wstrtime,19_2_00E73647
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_00E73C3F GetVersionExA,LoadLibraryA,GetProcAddress,GetLastError,FreeLibrary,GetLastError,19_2_00E73C3F
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_00E820B3 GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,SetEndOfFile,GetLastError,19_2_00E820B3
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_00E77E8A SetUnhandledExceptionFilter,19_2_00E77E8A
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_00E7765E SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,19_2_00E7765E
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_00E81B48 _raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,__amsg_exit,19_2_00E81B48
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_6CE5FC2E SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,19_2_6CE5FC2E
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_6CE6AACB _raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_6CE6AACB
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_7340065C _raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_7340065C
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_733F6DF2 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,19_2_733F6DF2
Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 34.196.212.224 443Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 34.199.117.18 443
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 34.199.225.177 443
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe "C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe" /silentJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "icacls.exe" "C:\Program Files (x86)\Epic Games\Launcher" /grant "BUILTIN\Users":(OI)(CI)F
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "icacls.exe" "C:\ProgramData\Epic" /grant "BUILTIN\Users":(OI)(CI)F
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe c:\windows\system32\cmd.exe /c wget -t 2 -v -t 60 -p "c:\users\user\desktop\download" --no-check-certificate --content-disposition --user-agent="mozilla/5.0 (windows nt 6.1; wow64; trident/7.0; as; rv:11.0) like gecko" "https://epicgames-download1.akamaized.net/builds/unrealenginelauncher/installers/win32/epicinstaller-15.17.1.msi?launcherfilename=epicinstaller-15.17.1-unrealengine.msi" > cmdline.out 2>&1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -t 60 -p "c:\users\user\desktop\download" --no-check-certificate --content-disposition --user-agent="mozilla/5.0 (windows nt 6.1; wow64; trident/7.0; as; rv:11.0) like gecko" "https://epicgames-download1.akamaized.net/builds/unrealenginelauncher/installers/win32/epicinstaller-15.17.1.msi?launcherfilename=epicinstaller-15.17.1-unrealengine.msi"
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exe "c:\program files (x86)\epic games\launcher\portal\extras\eos\installchainer.exe" 44 "c:\program files (x86)\epic games\launcher\portal\extras\eos\epiconlineservices.msi" "eosproductid=epicgameslauncher" "c:\program files (x86)\epic games\launcher\portal\binaries\win32\epicgameslauncher.exe" com.epicgames.launcher://unrealengine
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -t 60 -p "c:\users\user\desktop\download" --no-check-certificate --content-disposition --user-agent="mozilla/5.0 (windows nt 6.1; wow64; trident/7.0; as; rv:11.0) like gecko" "https://epicgames-download1.akamaized.net/builds/unrealenginelauncher/installers/win32/epicinstaller-15.17.1.msi?launcherfilename=epicinstaller-15.17.1-unrealengine.msi" Jump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exe "c:\program files (x86)\epic games\launcher\portal\extras\eos\installchainer.exe" 44 "c:\program files (x86)\epic games\launcher\portal\extras\eos\epiconlineservices.msi" "eosproductid=epicgameslauncher" "c:\program files (x86)\epic games\launcher\portal\binaries\win32\epicgameslauncher.exe" com.epicgames.launcher://unrealengineJump to behavior
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: GetLocaleInfoA,19_2_00E812F5
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: GetLocaleInfoA,19_2_6CE69F85
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: GetLocaleInfoA,19_2_73401F21
Source: C:\Windows\SysWOW64\wget.exeQueries volume information: C:\Users\user\Desktop\download VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI7BA8.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI7BA8.tmp-\CustomActionManaged.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSI1EC1.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSI1EC1.tmp-\CustomActionManaged.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSI2BC2.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSI2BC2.tmp-\CustomActionManaged.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSI328B.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSI328B.tmp-\CustomActionManaged.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSIE11B.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSIE11B.tmp-\CustomActionManaged.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSI7793.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSI7793.tmp-\CustomActionManaged.dll VolumeInformation
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeQueries volume information: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exe VolumeInformation
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeQueries volume information: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\Microsoft.Deployment.WindowsInstaller.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSI90CA.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSI90CA.tmp-\CustomActionManaged.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSI95CC.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSI95CC.tmp-\CustomActionManaged.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSI988C.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSI988C.tmp-\CustomActionManaged.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSIA08C.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSIA08C.tmp-\CustomActionManaged.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSIB774.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSIB774.tmp-\CustomActionManaged.dll VolumeInformation
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_00E77499 GetLocalTime,19_2_00E77499
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 19_2_00E73C3F GetVersionExA,LoadLibraryA,GetProcAddress,GetLastError,FreeLibrary,GetLastError,19_2_00E73C3F
Source: C:\Windows\SysWOW64\wget.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: C:\Windows\System32\msiexec.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 BlobJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Replication Through Removable Media
3
Native API
1
DLL Side-Loading
1
DLL Side-Loading
11
Disable or Modify Tools
11
Input Capture
1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts12
Command and Scripting Interpreter
2
Windows Service
1
Access Token Manipulation
1
Deobfuscate/Decode Files or Information
LSASS Memory11
Peripheral Device Discovery
Remote Desktop Protocol11
Input Capture
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Services File Permissions Weakness
2
Windows Service
2
Obfuscated Files or Information
Security Account Manager4
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook111
Process Injection
1
Install Root Certificate
NTDS26
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
Services File Permissions Weakness
1
Timestomp
LSA Secrets21
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials2
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
File Deletion
DCSync1
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job22
Masquerading
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
Virtualization/Sandbox Evasion
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
Access Token Manipulation
Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd111
Process Injection
Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task1
Services File Permissions Weakness
KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers1
Rundll32
GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1462579 URL: https://epicgames-download1... Startdate: 25/06/2024 Architecture: WINDOWS Score: 52 7 msiexec.exe 501 1001 2->7         started        10 msiexec.exe 1 10 2->10         started        13 cmd.exe 2 2->13         started        15 SrTasks.exe 2->15         started        dnsIp3 85 C:\Windows\Installer\MSI328B.tmp, PE32 7->85 dropped 87 C:\Windows\Installer\MSI2BC2.tmp, PE32 7->87 dropped 89 C:\Windows\Installer\MSI1EC1.tmp, PE32 7->89 dropped 97 28 other files (none is malicious) 7->97 dropped 17 msiexec.exe 1 7->17         started        19 DXSETUP.exe 7->19         started        23 msiexec.exe 7->23         started        32 2 other processes 7->32 107 172.64.149.23 CLOUDFLARENETUS United States 10->107 91 C:\Users\user\AppData\Local\...\MSI7BA8.tmp, PE32 10->91 dropped 93 C:\Users\user\AppData\Local\...\MSI7B87.tmp, PE32 10->93 dropped 95 C:\Users\user\AppData\Local\...\MSI61A5.tmp, PE32 10->95 dropped 25 wget.exe 2 13->25         started        28 conhost.exe 13->28         started        30 conhost.exe 15->30         started        file4 process5 dnsIp6 34 rundll32.exe 14 7 17->34         started        39 rundll32.exe 17->39         started        41 rundll32.exe 17->41         started        53 5 other processes 17->53 59 C:\Windows\SysWOW64\xinput1_3.dll (copy), PE32 19->59 dropped 61 C:\Windows\SysWOW64\d3dx11_43.dll (copy), PE32 19->61 dropped 63 C:\Windows\SysWOW64\d3dx10_43.dll (copy), PE32 19->63 dropped 65 13 other files (none is malicious) 19->65 dropped 109 Installs new ROOT certificates 19->109 43 rundll32.exe 23->43         started        45 rundll32.exe 23->45         started        47 icacls.exe 23->47         started        49 icacls.exe 23->49         started        105 95.101.54.105 AKAMAI-LONGB European Union 25->105 51 rundll32.exe 6 32->51         started        file7 signatures8 process9 dnsIp10 99 34.196.212.224 AMAZON-AESUS United States 34->99 71 2 other files (none is malicious) 34->71 dropped 111 System process connects to network (likely due to code injection or exploit) 34->111 101 34.199.225.177 AMAZON-AESUS United States 39->101 73 2 other files (none is malicious) 39->73 dropped 103 34.199.117.18 AMAZON-AESUS United States 41->103 75 2 other files (none is malicious) 41->75 dropped 67 Microsoft.Deployme...indowsInstaller.dll, PE32 43->67 dropped 69 C:\Windows\...\CustomActionManaged.dll, PE32 43->69 dropped 77 2 other files (none is malicious) 43->77 dropped 79 2 other files (none is malicious) 45->79 dropped 55 conhost.exe 47->55         started        57 conhost.exe 49->57         started        81 2 other files (none is malicious) 51->81 dropped 83 10 other files (none is malicious) 53->83 dropped file11 signatures12 process13

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://epicgames-download1.akamaized.net/Builds/UnrealEngineLauncher/Installers/Win32/EpicInstaller-15.17.1.msi?launcherfilename=EpicInstaller-15.17.1-unrealEngine.msi0%Avira URL Cloudsafe
SourceDetectionScannerLabelLink
C:\Program Files (x86)\Epic Games\DirectXRedist\DSETUP.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe0%ReversingLabs
C:\Program Files (x86)\Epic Games\DirectXRedist\dsetup32.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\CrashReportClient.exe0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-console-l1-1-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-debug-l1-1-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-file-l1-2-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-handle-l1-1-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-heap-l1-1-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-localization-l1-2-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-namedpipe-l1-1-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-string-l1-1-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-synch-l1-1-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-crt-conio-l1-1-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-crt-environment-l1-1-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\concrt140.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\EpicGamesLauncher.exe0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-core-console-l1-2-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-core-datetime-l1-1-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-core-file-l2-1-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-core-rtlsupport-l1-1-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-crt-heap-l1-1-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-crt-stdio-l1-1-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-crt-string-l1-1-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\concrt140.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\msvcp140_2.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\vccorlib140.dll0%ReversingLabs
C:\ProgramData\Epic\EpicGamesLauncher\InstallChainer.exe0%ReversingLabs
C:\ProgramData\Epic\EpicGamesLauncher\Microsoft.Deployment.WindowsInstaller.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\DX4270.tmp\D3DCompiler_43.dll3%ReversingLabs
C:\Users\user\AppData\Local\Temp\DX4270.tmp\d3dcsx_43.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\DX4270.tmp\d3dx10_43.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\DX4270.tmp\d3dx11_43.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\DX4270.tmp\dxupdate.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\DX4270.tmp\xinput1_3.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSI61A5.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSI7B87.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSI7BA8.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSI7BA8.tmp-\CustomActionManaged.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSI7BA8.tmp-\Microsoft.Deployment.WindowsInstaller.dll0%ReversingLabs
C:\Windows\Installer\MSI1E53.tmp0%ReversingLabs
C:\Windows\Installer\MSI1EC1.tmp0%ReversingLabs
C:\Windows\Installer\MSI1EC1.tmp-\CustomActionManaged.dll0%ReversingLabs
C:\Windows\Installer\MSI1EC1.tmp-\Microsoft.Deployment.WindowsInstaller.dll0%ReversingLabs
C:\Windows\Installer\MSI2BC2.tmp0%ReversingLabs
C:\Windows\Installer\MSI2BC2.tmp-\CustomActionManaged.dll0%ReversingLabs
C:\Windows\Installer\MSI2BC2.tmp-\Microsoft.Deployment.WindowsInstaller.dll0%ReversingLabs
C:\Windows\Installer\MSI328B.tmp0%ReversingLabs
C:\Windows\Installer\MSI328B.tmp-\CustomActionManaged.dll0%ReversingLabs
C:\Windows\Installer\MSI328B.tmp-\Microsoft.Deployment.WindowsInstaller.dll0%ReversingLabs
C:\Windows\Installer\MSI7793.tmp-\CustomActionManaged.dll0%ReversingLabs
C:\Windows\Installer\MSI7793.tmp-\Microsoft.Deployment.WindowsInstaller.dll0%ReversingLabs
C:\Windows\Installer\MSI90CA.tmp-\CustomActionManaged.dll0%ReversingLabs
C:\Windows\Installer\MSI90CA.tmp-\Microsoft.Deployment.WindowsInstaller.dll0%ReversingLabs
C:\Windows\Installer\MSI95CC.tmp-\CustomActionManaged.dll0%ReversingLabs
C:\Windows\Installer\MSI95CC.tmp-\Microsoft.Deployment.WindowsInstaller.dll0%ReversingLabs
C:\Windows\Installer\MSI988C.tmp-\CustomActionManaged.dll0%ReversingLabs
C:\Windows\Installer\MSI988C.tmp-\Microsoft.Deployment.WindowsInstaller.dll0%ReversingLabs
C:\Windows\Installer\MSIA08C.tmp-\CustomActionManaged.dll0%ReversingLabs
C:\Windows\Installer\MSIA08C.tmp-\Microsoft.Deployment.WindowsInstaller.dll0%ReversingLabs
C:\Windows\Installer\MSIB774.tmp-\CustomActionManaged.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://sectigo.com/CPS00%URL Reputationsafe
http://ocsp.sectigo.com00%URL Reputationsafe
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
http://datarouter.cfef.live.use1a.on.epicgames.com0%Avira URL Cloudsafe
http://datarouter.ol.epicgames.com0%Avira URL Cloudsafe
https://datarouter.ol.epicgameT0%Avira URL Cloudsafe
http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v0%Avira URL Cloudsafe
https://api.epicgame0%Avira URL Cloudsafe
https://datarouter.ol.epicgames.com/datarouter/api/v1/public/data?SessionID=%7BBDE4A3F4-5C77-43EB-A30%Avira URL Cloudsafe
https://api.epicgames.dev0%Avira URL Cloudsafe
http://wixtoolset.org/news/0%Avira URL Cloudsafe
https://api.epicgames.dev/0%Avira URL Cloudsafe
http://eos-gateway-ingressv2-prod-c3-w1.befa.live.use1a.on.epicgames.com0%Avira URL Cloudsafe
https://api.epicgames.dev/telemetry/data?SessionID=%7B05E76004-9FD2-4B7C-9331-C8C8FF384573%7D&AppID=0%Avira URL Cloudsafe
http://www.BetaPlace.com.?0%Avira URL Cloudsafe
http://wixtoolset.org0%Avira URL Cloudsafe
http://www.betaplace.com0%Avira URL Cloudsafe
http://www.betaplace.com.0%Avira URL Cloudsafe
https://datarouter.ol.epicgames.com/datarouter/api/v1/public/data?SessionID=0%Avira URL Cloudsafe
https://api.epicgames.dev/telemetry/data?SessionID=0%Avira URL Cloudsafe
http://Launcherhelp.epicgames.com0%Avira URL Cloudsafe
http://wixtoolset.org/releases/0%Avira URL Cloudsafe
https://datarouter.ol.epicgames.com/0%Avira URL Cloudsafe
http://wixtoolset.org/0%Avira URL Cloudsafe
http://wixtoolset.org/telemetry/v0%Avira URL Cloudsafe
http://api.epicgames.dev0%Avira URL Cloudsafe
http://msdn.microsoft.c0%Avira URL Cloudsafe
http://www.BetaPlace.comEContinuare0%Avira URL Cloudsafe
https://datarouter.ol.epicgames.com0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://api.epicgames.dev/rundll32.exe, 00000021.00000003.4486279959.0000000004383000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.0000000004597000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4501842414.0000000004750000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000002.4539200762.00000000050B1000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4521802675.0000000004D24000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.4581136611.00000000043D0000.00000004.00000020.00020000.00000000.sdmp, CustomActionManaged.dll.36.drfalse
  • Avira URL Cloud: safe
unknown
https://datarouter.ol.epicgameTrundll32.exe, 0000000D.00000002.3551839836.0000000004F1D000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000002.4438890151.0000000004707000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://sectigo.com/CPS0wget.exe, 00000002.00000003.3334081460.0000000002AC8000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000002.3373252779.0000000002AD9000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.3334081460.0000000002AD9000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.3334081460.0000000002AD0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.00000000074D7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-string-l1-1-0.dll.9.dr, concrt140.dll0.9.drfalse
  • URL Reputation: safe
unknown
http://ocsp.sectigo.com0wget.exe, 00000002.00000003.3334081460.0000000002AC8000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000002.3373252779.0000000002AD9000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.3334081460.0000000002AD9000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.3334081460.0000000002AD0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.00000000074D7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-string-l1-1-0.dll.9.dr, concrt140.dll0.9.drfalse
  • URL Reputation: safe
unknown
http://eos-gateway-ingressv2-prod-c3-w1.befa.live.use1a.on.epicgames.comrundll32.exe, 00000024.00000002.4539200762.0000000005141000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://api.epicgames.devrundll32.exe, 00000024.00000002.4539200762.00000000050B1000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000024.00000002.4539200762.000000000512E000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/vrundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, InstallChainer.exe, 00000020.00000002.4619396490.00000000031D2000.00000002.00000001.01000000.00000020.sdmp, rundll32.exe, 00000021.00000003.4486279959.0000000004383000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.0000000004597000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4501842414.0000000004750000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4521802675.0000000004D24000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.4581136611.00000000043D0000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.36.drfalse
  • Avira URL Cloud: safe
unknown
http://datarouter.ol.epicgames.comrundll32.exe, 0000000D.00000002.3551839836.0000000004F30000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000002.4438890151.000000000471D000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://api.epicgamerundll32.exe, 00000024.00000002.4539200762.000000000512E000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://datarouter.ol.epicgames.com/datarouter/api/v1/public/data?SessionID=%7BBDE4A3F4-5C77-43EB-A3rundll32.exe, 0000001F.00000002.4438890151.00000000046E0000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://datarouter.cfef.live.use1a.on.epicgames.comrundll32.exe, 0000000D.00000002.3551839836.0000000004F30000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000002.4438890151.000000000471D000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://wixtoolset.org/news/rundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, InstallChainer.exe, InstallChainer.exe, 00000020.00000002.4619396490.00000000031D2000.00000002.00000001.01000000.00000020.sdmp, rundll32.exe, 00000021.00000003.4486279959.0000000004383000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.0000000004597000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4501842414.0000000004750000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4521802675.0000000004D24000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.4581136611.00000000043D0000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.36.drfalse
  • Avira URL Cloud: safe
unknown
https://api.epicgames.dev/telemetry/data?SessionID=%7B05E76004-9FD2-4B7C-9331-C8C8FF384573%7D&AppID=rundll32.exe, 00000024.00000002.4539200762.0000000005100000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.BetaPlace.com.?DXSETUP.exe, 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0twget.exe, 00000002.00000003.3334081460.0000000002AC8000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000002.3373252779.0000000002AD9000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.3334081460.0000000002AD9000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.3334081460.0000000002AD0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.00000000074D7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-string-l1-1-0.dll.9.dr, concrt140.dll0.9.drfalse
  • URL Reputation: safe
unknown
http://wixtoolset.org/releases/rundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, InstallChainer.exe, InstallChainer.exe, 00000020.00000002.4619396490.00000000031D2000.00000002.00000001.01000000.00000020.sdmp, rundll32.exe, 00000021.00000003.4486279959.0000000004383000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.0000000004597000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4501842414.0000000004750000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4521802675.0000000004D24000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.4581136611.00000000043D0000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.36.drfalse
  • Avira URL Cloud: safe
unknown
https://api.epicgames.dev/telemetry/data?SessionID=rundll32.exe, 00000024.00000002.4539200762.00000000050B1000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://wixtoolset.orgrundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000003.3472891647.0000000002853000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534430652.0000000003330000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567268404.0000000002B20000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585400435.0000000002DF0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.0000000007402000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4032094467.0000000003270000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416914644.000000000271F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486279959.00000000043BA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.4486593475.00000000028FC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494431417.0000000002B4D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000022.00000003.4494080703.00000000045CE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4502100417.0000000002CDC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.4501842414.0000000004787000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4521802675.0000000004D5B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.4522417398.00000000032EC000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://Launcherhelp.epicgames.comApp.locres1.9.drfalse
  • Avira URL Cloud: safe
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#wget.exe, 00000002.00000003.3334081460.0000000002AC8000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000002.3373252779.0000000002AD9000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.3334081460.0000000002AD9000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.3334081460.0000000002AD0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4037619149.00000000074D7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4033511562.00000000032C9000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-string-l1-1-0.dll.9.dr, concrt140.dll0.9.drfalse
  • URL Reputation: safe
unknown
https://datarouter.ol.epicgames.com/rundll32.exe, 0000000B.00000003.3472795764.00000000040C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000002.3551839836.0000000004EA1000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.3534335191.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3567171276.0000000004542000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3585024655.0000000004791000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.4031946238.0000000004CA6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000002.4438890151.0000000004691000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.4416619862.00000000044DA000.00000004.00000020.00020000.00000000.sdmp, CustomActionManaged.dll.17.drfalse
  • Avira URL Cloud: safe
unknown
https://datarouter.ol.epicgames.com/datarouter/api/v1/public/data?SessionID=rundll32.exe, 0000000D.00000002.3551839836.0000000004EA1000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000002.4438890151.0000000004691000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.betaplace.com.DXSETUP.exe, DXSETUP.exe, 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmp, DXSETUP.exe, 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.betaplace.comDXSETUP.exe, 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://wixtoolset.org/InstallChainer.exefalse
  • Avira URL Cloud: safe
unknown
http://wixtoolset.org/telemetry/vInstallChainer.exefalse
  • Avira URL Cloud: safe
unknown
http://www.BetaPlace.comEContinuareDXSETUP.exe, 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://datarouter.ol.epicgames.comrundll32.exe, 0000000D.00000002.3551839836.0000000004EA1000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000002.3551839836.0000000004F1D000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000002.4438890151.0000000004691000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000002.4438890151.0000000004707000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.BetaPlace.com.DXSETUP.exe, 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpfalse
    unknown
    http://api.epicgames.devrundll32.exe, 00000024.00000002.4539200762.0000000005141000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://msdn.microsoft.crundll32.exe, 0000000F.00000002.3590187923.0000000002E10000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namerundll32.exe, 0000000D.00000002.3551839836.0000000004EA1000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000002.3551839836.0000000004F1D000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000002.4438890151.0000000004691000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000002.4438890151.0000000004707000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000024.00000002.4539200762.00000000050B1000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000024.00000002.4539200762.000000000512E000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://www.BetaPlace.comDXSETUP.exe, 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmp, DXSETUP.exe, 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpfalse
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      34.196.212.224
      unknownUnited States
      14618AMAZON-AESUStrue
      34.199.117.18
      unknownUnited States
      14618AMAZON-AESUStrue
      172.64.149.23
      unknownUnited States
      13335CLOUDFLARENETUSfalse
      34.199.225.177
      unknownUnited States
      14618AMAZON-AESUStrue
      95.101.54.105
      unknownEuropean Union
      34164AKAMAI-LONGBfalse
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1462579
      Start date and time:2024-06-25 18:44:37 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 13m 28s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:urldownload.jbs
      Sample URL:https://epicgames-download1.akamaized.net/Builds/UnrealEngineLauncher/Installers/Win32/EpicInstaller-15.17.1.msi?launcherfilename=EpicInstaller-15.17.1-unrealEngine.msi
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:38
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal52.evad.win@45/1108@0/5
      EGA Information:
      • Successful, ratio: 7.7%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 346
      • Number of non-executed functions: 181
      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, VSSVC.exe, svchost.exe
      • Execution Graph export aborted for target InstallChainer.exe, PID 4800 because there are no executed function
      • Execution Graph export aborted for target rundll32.exe, PID 1408 because it is empty
      • Execution Graph export aborted for target rundll32.exe, PID 2372 because it is empty
      • Execution Graph export aborted for target rundll32.exe, PID 2700 because it is empty
      • Execution Graph export aborted for target rundll32.exe, PID 516 because it is empty
      • Execution Graph export aborted for target rundll32.exe, PID 5520 because it is empty
      • Execution Graph export aborted for target rundll32.exe, PID 5588 because it is empty
      • Execution Graph export aborted for target rundll32.exe, PID 652 because it is empty
      • Execution Graph export aborted for target rundll32.exe, PID 6544 because it is empty
      • Execution Graph export aborted for target rundll32.exe, PID 6784 because it is empty
      • Execution Graph export aborted for target rundll32.exe, PID 6828 because it is empty
      • Not all processes where analyzed, report is missing behavior information
      • Report size exceeded maximum capacity and may have missing behavior information.
      • Report size exceeded maximum capacity and may have missing disassembly code.
      • Report size getting too big, too many NtCreateFile calls found.
      • Report size getting too big, too many NtCreateKey calls found.
      • Report size getting too big, too many NtOpenFile calls found.
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
      • Report size getting too big, too many NtReadVirtualMemory calls found.
      • Report size getting too big, too many NtSetInformationFile calls found.
      • Report size getting too big, too many NtSetValueKey calls found.
      • Report size getting too big, too many NtWriteFile calls found.
      • Skipping network analysis since amount of network traffic is too extensive
      • VT rate limit hit for: https://epicgames-download1.akamaized.net/Builds/UnrealEngineLauncher/Installers/Win32/EpicInstaller-15.17.1.msi?launcherfilename=EpicInstaller-15.17.1-unrealEngine.msi
      TimeTypeDescription
      12:47:44API Interceptor1x Sleep call for process: msiexec.exe modified
      12:47:58API Interceptor3x Sleep call for process: rundll32.exe modified
      12:49:12API Interceptor30x Sleep call for process: SrTasks.exe modified
      No context
      No context
      No context
      No context
      No context
      Process:C:\Windows\System32\msiexec.exe
      File Type:Microsoft Cabinet archive data, many, 47342 bytes, 5 files, at 0x44 +A "xinput1_3_x86.cat" +A "xinput1_3.dll", flags 0x4, ID 8235, number 1, extra bytes 20 in head, 3 datablocks, 0x1 compression
      Category:dropped
      Size (bytes):53302
      Entropy (8bit):7.985485862279273
      Encrypted:false
      SSDEEP:1536:9cnwcwzHEdb27WH2SfZDNu75ddnVR+ZFaNk0ZT9rHUh:0wb+2eZonQwN9oh
      MD5:C234DF417C9B12E2D31C7FD1E17E4786
      SHA1:92F32E74944E5166DB72D3BFE8E6401D9F7521DD
      SHA-256:2ACEA6C8B9F6F7F89EC51365A1E49FBD0D8C42C53418BD0783DBF3F74A744E6D
      SHA-512:6CBAE19794533AD9401F92B10BD9549638BA20CE38375DE4F9D0E20AF20D78819E46856151CC6818325AF9AC774B8128E18FBEBD2DA5DA4EFBD417FC2AF51DAB
      Malicious:false
      Reputation:low
      Preview:MSCF...........D...............+ .............H....................(.........6{. .xinput1_3_x86.cat.h?...(.....6.. .xinput1_3.dll......h.....6G. .apr2007_xinput_x86.inf......m.....6G. .xinput1_3_x86.inf./....p.....6G. .xinput1_3_x86_xp.inf.i...T5..CK.y<.....Y.d..H.<3.1....=...`,cbB.f...*R*kB..V..E...,.[$I.R(~g..n........}....<....y>.9.s.....f*&.s)E.F..Cp ..Q...D 0<0.;....R.....3.\...4...F.1QI...........@..O....2.f....I\...a...c4.0.....,...0.!..6.. M...@..:..ocp.A.K6......... .F..!...[....+..,...0n...<..@cl`+Xe^.X.t.$.;{X@.P....@d..N=.....Z..g....&...#...%]....~.........C. #..u...h(.4^.4.... a.a...*#.Z<....%.{..5..n$....P@[..C<01..Y...F.\..[.H.H.l..f.l.X.0...l.4.A....+B.~.|.l.YO0..k}i>~V..O.f...M0n^.?..B..........a.......N.w/==J.{..D@0..Q.....%..@6..Z.|......@@.4..a.....q......t....4v....dI.Ym..^...........[7.XH.8Y.nR..d.<.;O.."k...d.y2aV..4....D...5..B".H~.....+x_o.4....c.#.`..0...v.F4........I.Q$.....x....._..;]...O[....l....?..:.......Q._....2.;.~...NXz
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):95576
      Entropy (8bit):6.500628817584274
      Encrypted:false
      SSDEEP:1536:Bc8tBKv1HCyODN2wjIqlLmqxY3AMVI4I9okOEvc0/c/sZRYltL26VVE2S+JJqsHy:BftQv1iyODswNLmqxY3AMV71Ev54EAxM
      MD5:EB701DEF7D0809E8DA765A752AB42BE5
      SHA1:7897418F0FAE737A3EBE4F7954118D71C6C8B426
      SHA-256:2A61679EEEDABF7D0D0AC14E5447486575622D6B7CFA56F136C1576FF96DA21F
      SHA-512:6FF8433C0DADC0E87D18F04289AB6F48624C908ACBDA506708F5E0F3C9522E9316E587E71F568938067BA9F37F96640B793FDFAA580CAEDC3BF9873DC221271F
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........xx...+...+...+..+...+...+F..+.6k+...+.6x+...+.6{+...+...+...+...+...+...+...+...+...+Rich...+................PE..L......M...........!.....*...N.......k.......@.......................................4....@..........................5..y....*.......p..h............^..X.......H...0................................6..@............................................text...)(.......*.................. ..`.data..../...@......................@....rsrc...h....p.......@..............@..@.reloc...............H..............@..B................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):517976
      Entropy (8bit):5.9440274231307315
      Encrypted:false
      SSDEEP:3072:Qi6LKKSPluzye9iHWptICTrbusJxDO9insyH6+PJTOramZap5XVeR4zW1mFD1gbH:8UHWDICTmUxDpEa04+GU
      MD5:BF3F290275C21BDD3951955C9C3CF32C
      SHA1:9FD00F3BB8A870112DAE464F555FCD5E7F9200C0
      SHA-256:8F47D7121EF6532AD9AD9901E44E237F5C30448B752028C58A9D19521414E40D
      SHA-512:D2C354EE8B6977D01F23C6D2BB4977812BF653EAE25E7A75A7D0A36B588C89FCDBDC2A8087C24D6FF687AFEBD086D4B7D0C92203CE39691B21DAB71EAFD1D249
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......."..Sf}..f}..f}..A...s}..A...E}..A....}..o._.k}..f}...}....f.g}....g.e}....V.g}....Q.g}..Richf}..................PE..L......M.................b...j.......p....................................... ......t3....@...... ...........................d..........l<..............X............................................4..@...............L............................text....a.......b.................. ..`.data....2...........f..............@....rsrc...l<.......>...z..............@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):1566040
      Entropy (8bit):6.38739478154395
      Encrypted:false
      SSDEEP:24576:CIQ+ddddddddddddddxOOOOOOOOOOOOOO2iWeXiWeXiWeXiWeXiWeXiWeXiWeXi+:CIQsOOOOOOOOOOOOOO2iWeXiWeXiWeXf
      MD5:D8FA7BB4FE10251A239ED75055DD6F73
      SHA1:76C4BD2D8F359F7689415EFC15E3743D35673AE8
      SHA-256:FB0E534F9B0926E518F1C2980640DFD29F14217CDFA37CF3A0C13349127ED9A8
      SHA-512:73F633179B1340C1C14D0002B72E44CAB1919D0EF174F307E4BFE6DE240B0B6EF233E67A8B0A0CD677556865EE7B88C6DE152045A580AB9FBF1A50D2DB0673B4
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........^..?...?...?...G6..?...?..U?.......?.......?.......?...I>..?...I...?...I...?...I?..?...I8..?..Rich.?..........................PE..L......M...........!................c........................................ ......\.....@.................................$...........P...............X............................................^..@...............h............................text............................... ..`.data....4..........................@....rsrc...P...........................@..@.reloc..D).......*..................@..B................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:Microsoft Cabinet archive data, many, 91192 bytes, 3 files, at 0x44 "dxupdate.dll" "dxupdate.inf", flags 0x4, ID 3666, number 1, extra bytes 20 in head, 8 datablocks, 0x1 compression
      Category:dropped
      Size (bytes):97152
      Entropy (8bit):7.99414458916803
      Encrypted:true
      SSDEEP:1536:JvknxJRHNYzrAzRstaRGk0jzphvXdy57XwwnNb+vnaI1eYpIKxozNlmn6F5x:JvknxJpNYAzRstaRkz0BwwnNbSa+vp58
      MD5:D495680ABA28CAAFC4C071A6D0FE55AC
      SHA1:5885ECE90970EB10B6B95D6C52D934674835929E
      SHA-256:E18A5404B612E88FA8B403C9B33F064C0A89528DB7EF9A79AA116908D0E6AFED
      SHA-512:A25C647678661473B99462D7433C1D05AF54823D404476E35315C11C93B3F5ECE92C912560AF0D9EFE8F07E36AE68594362D73ABF5D5DE409A3F0A146FE31A10
      Malicious:false
      Reputation:low
      Preview:MSCF....8d......D...............R...........8d..H.............................~>.%..dxupdate.dll.02........h=...dxupdate.inf.1...0.....~>.%..dxupdate.cif.T....'..CK.Z}.$.U....;..@.e!.#....G===.=+".?..+.s..l8....o.{....;.+..(...d,..HVd..,......(..[&H.........Y.Y..~..{.gv.vW.'.....^......^...}...1v....2.*.~.......y...a_.....^Z..V?H.Q..bo(..0.Ra...q(..`o....W.....4~...q.?...F.............].....~c...O7^..W..x.?...l.=.~$......'..o;.._.....'u.aK......=..X.........g........~.].[..+..\b._........p.=.....w...%..@.o-.....O2..w...~sn..D_:....G).../e.Q_/....=Y.x........p.0..^....w...A}..'..... ...P.7....3.av...?...Kl.......>t...O`..b.]....x..Y....._...x..}....@.....1.9.o....[.?.......)...g..'.1.i../.^.|..=........x...L.6`...>..,...K./....6...........A.#.?.8.|....?.|......w%K.>@..(.I...9.../....].....%v7.>.....-@.p....E........6...Kc..p?@.....8.|.p/..xg...7...^.(..7..X~?..........#...w...q..U....f.... ..?<.\...}.K.Z.,]+...../..-......e...aO....a9Y......Wg.
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):15457232
      Entropy (8bit):6.624458758309935
      Encrypted:false
      SSDEEP:393216:YEb9f6Ol1FFtm/deMigK39RK8pVeh9sYq4Awc5UCC2hB4P2:YEb9f6Ol1FFo/deMig2R/eh9sYq4Awcp
      MD5:4E170B44987BF04F7A8EE228110F0447
      SHA1:653E8495E2528DDC8763BC30927DEF6C8695FA7D
      SHA-256:CC4BA7AA5570FF9A31E5A2CF78065D6356F1B1F9FFF0B42574D3CE7132AC23EA
      SHA-512:DC4D3C5538952CAD9252E057BEB986E3E5ACC90E3F49F6B94BEA9F6B802073D89ED80130D39E5FF160D9AC1837A62EE41B7ED547C9A908B5BA46A054C3412866
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............a..a..a.....a...d..a.;B...a.p.e..a.p.b..a.p.d..a.p.`..a...e..a...g..a.....a.w....a...`..a.7.d...a...e..a..g..a..e..a..`..a.=.e..a.....a..`...a.2.d...a.?.d..a.2.e...a.>.d...a.>....a.....a.>.c..a.Rich..a.................PE..L....28e.........."......X...*X..............p....@.................................F2....@.................................,...H.......xh...............9.......... R..T....................S......xR..@............p...............................text...*........................... ..`.uedbg..]........................... ..`.rdata..>.-..p....-..\..............@..@.data.....#..P...2...4..............@..._RDATA...'...p...(...f..............@..@.rsrc...xh.......j..................@..@.reloc..............................@..B........................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):17872
      Entropy (8bit):7.132558512552857
      Encrypted:false
      SSDEEP:384:mPWfhWFU+Y3DGk8ZpH3GCJErz550iA+Y3DGUw8JN77hhn80Po:zJDGkiRBEklDGo3hFRo
      MD5:A02AF67BD05CED8DCEC2422C5A368E30
      SHA1:C00920F5608C41E44496035AB53D137D31626063
      SHA-256:47490DBE76AC98A7134B8ED6506DC18BED97B4EFB6DB8764B2357D2B7D0B5171
      SHA-512:0145F5865CC9809CBEB04D7C5783BD23193DAA48275AE2396DDBD5CD3CBA693FC6F5EE6ABACB65DFB1229AD6FCAF7FE700346D4C5726C8EA5A259690262981D7
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L.....R............!......................... ...............................0......J.....@.............................+............ ...................9..............T............................................................................text...+........................... ..`.rsrc........ ......................@..@......R.........;...T...T.........R.........d.................R.....................RSDSy...xy.8.RI.......api-ms-win-core-console-l1-1-0.pdb..........T....rdata..T........rdata$zzzdbg.......+....edata... ..`....rsrc$01....` .......rsrc$02......................R.....................(...`...............,...W...................G...o...............................D...s...............5...b...............................................api-ms-win-core-console-l1-1-0.dll.AllocConsole.kern
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):17360
      Entropy (8bit):7.156517933803656
      Encrypted:false
      SSDEEP:384:mvWfhWo+Y3DGk8ZpH3GCJEFxTq0+4y+Y3DGELu8JN77hhVEY:bTDGkiRBEa14GDG0p3hbEY
      MD5:08DE2B409864DAEE675885620D34F8FB
      SHA1:0C598288BB6C0EB1809F210D3850657BC4606B70
      SHA-256:DD2C5EFA9315F66A6531E93A6B80D13F471D57F1BA86FA2294C6C3274ADC144C
      SHA-512:DDBE3EC5A802C5E25EFBCEE23795EB9CF3CA47ACEAD97B75E6DDEC1D95E15FF07299606EB8A7288217444A5500D4E1D652F486672AA8AE5BF8449399143842FC
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L..................!......................... ...............................0.......?....@.......................................... ...................9..............T............................................................................text............................... ..`.rsrc........ ......................@..@................9...T...T...................d.......................................RSDS....F.B..s.Lz.....api-ms-win-core-debug-l1-1-0.pdb............T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02............................P...............(...8...H...|...............q.......................api-ms-win-core-debug-l1-1-0.dll.DebugBreak.kernel32.DebugBreak.IsDebuggerPresent.kernel32.IsDebuggerPresent.OutputDebugStringA.kernel32.OutputDebugStri
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):17360
      Entropy (8bit):7.163875204083516
      Encrypted:false
      SSDEEP:384:mKWfhW9+Y3DGk8ZpH3GCJErMn3n+Y3DGUTP8JN77hhZpv:IYDGkiRBEmlDGsU3hjt
      MD5:72591F3EB22ABD6ADD78281FFF3F69BD
      SHA1:44CC71FE68FB4214690E2BF1A4A37428D0276761
      SHA-256:5D94FCFCA59CB80E0AE42574CB9F83E8D7D0261A0236097A58C58B8E8E3DFF48
      SHA-512:970326ECCC59F0FAF754897B2B886848B7D0F6B5AA85AD4E421F2A917358466A45F59A0BCFDDCC8759169897515B80DBFB798D7D807E32020608D3A044D3D060
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L....lC............!......................... ...............................0......E.....@.............................L............ ...................9..............T............................................................................text...<........................... ..`.rsrc........ ......................@..@.....lC.........8...T...T........lC.........d................lC.....................RSDS..T..t..*..].".....api-ms-win-core-file-l1-2-0.pdb.........T....rdata..T........rdata$zzzdbg.......L....edata... ..`....rsrc$01....` .......rsrc$02.........lC.....@...................(...8...l...............`.......................api-ms-win-core-file-l1-2-0.dll.CreateFile2.kernel32.CreateFile2.GetTempPathW.kernel32.GetTempPathW.GetVolumeNameForVolumeMountPointW.kernel32.GetVolumeNameForVolumeMou
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):17360
      Entropy (8bit):7.163065573934889
      Encrypted:false
      SSDEEP:384:mHWfhWE+Y3DGk8ZpH3GCJEFx2TjoD+Y3DGEK9S8JN77hhDnCL:fLDGkiRBE+oJDG793h9y
      MD5:5C4308E0D3C3403694D6FFFEADF282F5
      SHA1:591075C32583DC1B9E27D6B0D65D56C373EFBD68
      SHA-256:9E953AE44E72EF5B0476D2D60A05041AF33FEE241BE55621A00CC2C670E8F907
      SHA-512:D4EEC3AFB4A3F910E49F99338F5056967B2E5F4C7790D3B291DE84FE1600E0B3E0E36ABABE0EC79566B49A960A54D268BF6BD14B4A5D14940E53B666D1D6BACE
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L...L..............!......................... ...............................0......{.....@............................._............ ...................9..............T............................................................................text..._........................... ..`.rsrc........ ......................@..@....L...........:...T...T.......L...........d...............L.......................RSDS.1S..1...OWM+.......api-ms-win-core-handle-l1-1-0.pdb...........T....rdata..T........rdata$zzzdbg......._....edata... ..`....rsrc$01....` .......rsrc$02....................L.......Z...............(...<...P...................A...|...............,.............api-ms-win-core-handle-l1-1-0.dll.CloseHandle.kernel32.CloseHandle.CompareObjectHandles.kernel32.CompareObjectHandles.DuplicateHandle.kernel32
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):17360
      Entropy (8bit):7.231261033088047
      Encrypted:false
      SSDEEP:384:mYElOWfhWn+Y3DGk8ZpH3GCJEFxcGcol+Y3DGE7ak8JN77hhRe:kSDGkiRBEnDGpn3hre
      MD5:2344DF300A500D4A666C14C4AA40DD84
      SHA1:35337CC8433DD19EC733C4DE328C2FE1C5EC01D0
      SHA-256:EE731DD2942F063FEC75C1C167AAA63B7C0C03000A95DD96447D456B4240D4FD
      SHA-512:64760C467C557EB9BA9EA136182CB97FA154CE9E3B670B6F544D52FC09DBBC3C7FA6621F420CC543B340260D29309DDAAF3B851F23055264E17D56BA678D0143
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L....y.?...........!......................... ...............................0............@.......................................... ...................9..............T............................................................................text............................... ..`.rsrc........ ......................@..@.....y.?........8...T...T........y.?........d................y.?....................RSDSP[c.0..#...`......api-ms-win-core-heap-l1-1-0.pdb.........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02.........y.?........................X...............2...Q...q.......................C...h...........................(...E...f.......................0..._...z...............................................api-ms-win-core-heap-l1-1-0.dll.GetProcessHeap.k
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):19920
      Entropy (8bit):7.127869482647659
      Encrypted:false
      SSDEEP:384:miOMw3zdp3bwjGjue9/0jCRrndbJWfhW3+Y3DGk8ZpH3GCJErAqTTl+Y3DGUs8JN:vOMwBprwjGjue9/0jCRrndb+ODGkiRBc
      MD5:1057C413179A108B60578FD04A974360
      SHA1:19E7EDB337DECFD53EA37942AA053055EA12C510
      SHA-256:9F213BAFDB076C01BD6A2ABE7115F8F32465B6B38F7AB1500CD442ECE1CAA787
      SHA-512:51B7CB62111DFDA00F72322DAA9C9A3DAD32A227EB3FC06AAAFC691CD08CC8ED13286386319A9153D698A56B844D40B442BF7FC05D98E295DD3F48ABCED8E89C
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L.....V............!......................... ...............................0............@.......................................... ...................9..............T............................................................................text............................... ..`.rsrc........ ......................@..@......V.........@...T...T.........V.........d.................V.....................RSDS`7.|7..\f...$......api-ms-win-core-localization-l1-2-0.pdb.........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02..................V.....v.......;...;...(.......................<...f.......................5...]...................!...I...q...................N.............../...j.............../...^.................../...\...................8...`...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):17360
      Entropy (8bit):7.212932796153108
      Encrypted:false
      SSDEEP:384:mPWfhWk+Y3DGk8ZpH3GCJEFxz7R0+Y3DGEz8JN77hh5TB:/HDGkiRBE/72DGF3hzV
      MD5:57FEAB4CAFC94CCDCFEEA84C269D6686
      SHA1:A7DF1D1E107A8B0E574A4DEE6E3EEA056262A7E8
      SHA-256:3E3676EC797ECDB1F270E5BF1E884D37CB964D9A65D097FC250C247767255953
      SHA-512:40218D1C4741F4F79800B9FB431FF041A3FF594723E72E828DEC957947270ADCFE6F31CDC66A20D795B96F308864914B9FADFD598FF0CFA14C3A823A7D658B82
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L...R.............!......................... ...............................0............@.......................................... ...................9..............T............................................................................text............................... ..`.rsrc........ ......................@..@....R..........=...T...T.......R..........d...............R......................RSDS..k3"1...?F2?..S....api-ms-win-core-namedpipe-l1-1-0.pdb............T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02................R......................(...P...x...............:...w...............O...y...............&...W...............=...j.......................api-ms-win-core-namedpipe-l1-1-0.dll.ConnectNamedPipe.kernel32.ConnectNamedPipe.CreateNamedP
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):17360
      Entropy (8bit):7.190387498760807
      Encrypted:false
      SSDEEP:384:mTyMvNWfhWl+Y3DGk8ZpH3GCJEFxGG+Y3DGEd28JN77hhuQ:cyMvqQDGkiRBEpDGyR3hoQ
      MD5:6D23B1C181DCF0C328444415F0A69CAF
      SHA1:3865C0112F58E6C5B0138C62FFDD8FC7DC0BDADA
      SHA-256:D3612DE5A7460FC12F024E3C301C172F286D8CBCA1A890A0EDE65F151DAFA1DA
      SHA-512:3A5FA387FEB71AC9AE8B9D0E93B56B6DA3E96FABB1597A745025837FD60FDBBB1CBB2803BE1A4E5C46467082E9C56C5100F7A2421764DD62CE9DC499C568DC8D
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L....y.............!......................... ...............................0............@.......................................... ...................9..............T............................................................................text............................... ..`.rsrc........ ......................@..@.....y..........:...T...T........y..........d................y......................RSDS...%..E......a.....api-ms-win-core-string-l1-1-0.pdb...........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02.....................y......x...............(...H...h...............)...O...x...........................>...i...........................api-ms-win-core-string-l1-1-0.dll.CompareStringEx.kernel32.CompareStringEx.CompareStringOrdinal.kernel32.Compare
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):19408
      Entropy (8bit):7.080937379143234
      Encrypted:false
      SSDEEP:384:mjfdv3V0dfpkXc0vVazWfhWM+Y3DGk8ZpH3GCJEFxmog55+Y3DGE8Z8JN77hhgnb:adv3VqpkXc0vVaQnDGkiRBE6nDGa3h2b
      MD5:7EFA8337D01DF82405103E74DEA4AB0F
      SHA1:6709CE2DD2D0DCF8300B1D3A7B20DD03C676E3E5
      SHA-256:D29ADF82A3F473292D6882C0FB079940398536B9779CF43BF0BE7F2C9A182E5C
      SHA-512:7E8D381F97A2DFFF5D58DDA23F8D4941C14EE05C97BB7160CA7201FF6DFA3E44A6319C606335A7D0BA00B3B932C377E72E29CE8C9678CC2F66FE4949735B4010
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L...+.QX...........!......................... ...............................0............@.............................V............ ...................9..............T............................................................................text...V........................... ..`.rsrc........ ......................@..@....+.QX........9...T...T.......+.QX........d...............+.QX....................RSDS.#.wA.o..=K. ......api-ms-win-core-synch-l1-1-0.pdb............T....rdata..T........rdata$zzzdbg.......V....edata... ..`....rsrc$01....` .......rsrc$02....................+.QX............)...)...(.......p.......1...c...................!...F...m...............$...X...........$...[.......................@...i...............!...Q.......................[...............7...........O...................
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):18384
      Entropy (8bit):7.1391272647934425
      Encrypted:false
      SSDEEP:384:mhIWfhWv+Y3DGk8ZpH3GCJEFxhZzV+Y3DGEbt8JN77hh233+:0+DGkiRBEr3DGUK3hY3O
      MD5:D3B28EC94FAB13AA7150B3AC1ABFB24B
      SHA1:62CE8413919282D9E4B2E3FF51B61F9FF14C8D34
      SHA-256:598F0CD35118BA86DC7CD4A5240ABEEE6D01D27A0960AE49766C84C2111662BA
      SHA-512:75C6754D5D1EB3F2793D1E252C90085045009DE5FFA5E6E48202D12828024ACE8D3D450E0E411F8447A51A3C19BF565D9527917BDA45D76AE73B5965FC3FA6BB
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L....n............!......................... ...............................0......}&....@.......................................... ...................9..............T............................................................................text............................... ..`.rsrc........ ......................@..@v....................n.........8...d...d........n.........d................n.....................RSDSC..T~.~.:GmfY.......api-ms-win-crt-conio-l1-1-0.pdb.........d....rdata..d........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02.........n.....T...............(.......................>...w.........../...W...p...........................,...L...l.......................,...L...m...............t...........'...^...............P...g...........................$...=...
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):17872
      Entropy (8bit):7.124968259908221
      Encrypted:false
      SSDEEP:384:mGWfhWX+Y3DGk8ZpH3GCJEFxeM+Y3DGEA/8JN77hhX+/:0WDGkiRBEbDGu3h9g
      MD5:7EC18A5100D4C149F5CECCD5D28ABAB4
      SHA1:CA9A57E017DF2E6019AE5BC79144764E752699F5
      SHA-256:0F91011F52DC33ED32144E67EE5B3A977ABACA32F6A76AE522450CBFD33C1F1D
      SHA-512:E63CDE78447A896A25DD758A54A6C2311311C66DBB5ABBF658F357F6546FEFBCD0B1120394D47EA2E1F4618A848D8AB8E5F41BFDA6A331EB9D4220E4BA9FE3C9
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L....<i*...........!......................... ...............................0......|.....@............................."............ ...................9..............T............................................................................text...2........................... ..`.rsrc........ ......................@..@v....................<i*........>...d...d........<i*........d................<i*....................RSDS.[.lv.C.8...u.......api-ms-win-crt-environment-l1-1-0.pdb...........d....rdata..d........rdata$zzzdbg......."....edata... ..`....rsrc$01....` .......rsrc$02.................<i*....................8...............C...d...........................3...O...l....................... .......5...Z...w.......................)...F...a...........................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):248272
      Entropy (8bit):6.687188620681205
      Encrypted:false
      SSDEEP:6144:R2y3hhQZpA2C/VFuGEcL6hmDCYfM1+/e7VR8AocazlBQdSkIuVxRYy12z/VszBR/:Ht+zsM1+WkzRuVxRYPzS/n
      MD5:BC440B80B432081023D3F7043F1C0C97
      SHA1:8EB0CF8C6A611F372486083E85C0873E2A9C6B4D
      SHA-256:8C9AB74CE98F323B557FCFF323D13144F97B1E021E0EF28A5E8FB383860FE871
      SHA-512:BE88DC81B2663EEAF9AF7B5ED6744411C4D7943F91B75EDAEDE9F7EF8D1C7B91BE3DC5D6F460C2E3FD26281D0D11D6477E88C9D4A5D570BA49474A51F0E6EB29
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........HD...D...D..../..F...M.~.N.......A...D..........O.......C...............E.......E.......E...RichD...........PE..L....h.].........."!.........x...............0............................................@A.............................K..<r...........................9.......+...;..8............................<..@............p..8............................text............................... ..`.data....4...0...2..................@....idata.......p.......N..............@..@.rsrc................`..............@..@.reloc...+.......,...d..............@..B........................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):33
      Entropy (8bit):3.8330556814482386
      Encrypted:false
      SSDEEP:3:a/uVMWJQKrWy:aMMErWy
      MD5:369E92A1F7A7ECEDCACA7D7845CC3F74
      SHA1:C001EF0B380BB783ADBEA52EF1D9061882122499
      SHA-256:226E2ED6957CF8D5D7BE843556425A4E3DA5C33D54407D2187F8105AAEFC92D9
      SHA-512:8A06CA6B6CB92E5F79B4095B20F943A0A61F8049F4F4D7D3B45B5E09E5F9E9D2335BAAAAB3501A63037EA8FC58A80C7A51E24608BBEB2CA469E31E95E9928CB9
      Malicious:false
      Reputation:low
      Preview:; Base.ini is required to exist..
      Process:C:\Windows\System32\msiexec.exe
      File Type:Generic INItialization configuration [DeviceProfiles]
      Category:dropped
      Size (bytes):34761
      Entropy (8bit):5.473320491342328
      Encrypted:false
      SSDEEP:384:dkfI+LHANt2rulkjOFOQgNtvjOaO63vYcDbEyBoOWe0mp+Pwh0XeTfasQ/mzU+lv:dkZiBqbn
      MD5:10AE9CFE530FB68319DAA15BA1C3A8FC
      SHA1:6A725189BF8DF1288C4DF0FD188ED3410DED2728
      SHA-256:FFE32A801774EA1DB3649E24534458C00065037277F013C04ADD50ED19F6F00D
      SHA-512:6428827CF4EA92E604628E81B20D0BBDE90125FF5A008AAC1D700E8918CCC1E501613FDC22EA700AB4A45D734D53483BE50BC04B15AAC44F7C55375C09A2E9A4
      Malicious:false
      Reputation:low
      Preview:; Add a ArrayOfStruct key for all DeviceProfile PerObjectConfig sections (this must come before any DeviceProfile sections)..; Note that * properties don't get written back out by the config system, but these aren't real sections, so that should be okay..[DeviceProfile]..*TextureLODGroups=Group....[DeviceProfiles]..+DeviceProfileNameAndTypes=Windows,Windows..+DeviceProfileNameAndTypes=WindowsNoEditor,Windows..+DeviceProfileNameAndTypes=WindowsServer,Windows..+DeviceProfileNameAndTypes=WindowsClient,Windows..+DeviceProfileNameAndTypes=IOS,IOS..+DeviceProfileNameAndTypes=iPadAir,IOS..+DeviceProfileNameAndTypes=iPadAir2,IOS..+DeviceProfileNameAndTypes=iPadAir3,IOS..+DeviceProfileNameAndTypes=iPadAir4,IOS..+DeviceProfileNameAndTypes=iPadMini2,IOS..+DeviceProfileNameAndTypes=iPadMini3,IOS..+DeviceProfileNameAndTypes=iPadMini4,IOS..+DeviceProfileNameAndTypes=iPadMini5,IOS..+DeviceProfileNameAndTypes=iPodTouch6,IOS..+DeviceProfileNameAndTypes=iPodTouch7,IOS..+DeviceProfileNameAndTypes=iPhone5
      Process:C:\Windows\System32\msiexec.exe
      File Type:Generic INItialization configuration [InstallBundleManager]
      Category:dropped
      Size (bytes):157512
      Entropy (8bit):5.327507630883185
      Encrypted:false
      SSDEEP:1536:+SBCkfn5OkZX53ftqSiyh1olLWI5qs7ieWy1xAeU5GCg3Dnz1Y0nXpSrVWpXFVsZ:+AD1olLd7xUZENxg2Vg
      MD5:1F924BCE5B3D2653CA87F6241EA65BA9
      SHA1:1D102BAAE15BAC7F6E3F73D40AFC4B2BDA4E187D
      SHA-256:BE94115FC5E64EC51A387958A2C87EB49A872CA52C53F308AEFE0E0E15C35912
      SHA-512:F77981A58F1991589E13AA2E34CDD752E5870826D4AF9356C070199E1DAFC1A662BE3C6F28A154F761A3E61196B474C194C9F5824F21613212DACC71CC0568EB
      Malicious:false
      Reputation:low
      Preview:; This file defines the default settings for core and engine-level features..; These settings are overridden by a project's DefaultEngine.ini file and per-platform overrides..; Some of these settings can be modified from the project settings in the editor....[/Script/EngineSettings.GameMapsSettings]..GameInstanceClass=/Script/Engine.GameInstance..EditorStartupMap=/Engine/Maps/Templates/Template_Default..GameDefaultMap=/Engine/Maps/Entry..ServerDefaultMap=/Engine/Maps/Entry..GlobalDefaultGameMode="/Script/Engine.GameModeBase"..; Example for map prefix and game mode name setting..; +GameModeMapPrefixes=(Name="DM-",GameMode="/Script/GamePackage.DMGameMode")..; +GameModeClassAliases=(Name="DM",GameMode="/Script/GamePackage.DMGameMode")..LocalMapOptions=....[InstallBundleManager]..ModuleName=NullInstallBundleManager..EditorModuleName=NullInstallBundleManager....[URL]..Protocol=unreal..Name=Player..SaveExt=usa..Port=7777....[HTTP]..HttpTimeout=180..HttpConnectionTimeout=60..HttpReceiveTimeou
      Process:C:\Windows\System32\msiexec.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):61
      Entropy (8bit):4.482561986290143
      Encrypted:false
      SSDEEP:3:HRAbEqKdwDQJBApKGExdQIAcGsPRCv:HRY8GIBA8k9cQv
      MD5:1DB30560254DC359FF91940E10DDB1A6
      SHA1:6B9F33E0F1B5E827028FC838C233259F2E389485
      SHA-256:CD92B03B5A94EAD554160461A3FAA9E8E1FDF52F37A23C000EBE1164FC28F90B
      SHA-512:2BAF7B85A29F23460DAE30E128FF42D46D91EBDFFA36EE62D5D5DBFDF178729E4DCE5BA9B9A30A1DEB6365D36971F446F5084A40F307F49842B85626397131DC
      Malicious:false
      Reputation:low
      Preview:[Internationalization]..ShouldUseLocalizedNumericInput=True..
      Process:C:\Windows\System32\msiexec.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):11059
      Entropy (8bit):5.103147782440043
      Encrypted:false
      SSDEEP:192:Y2PCbAZIxNj0IrmQp4JV3ugs19RcaJRkQPMgaNOzvHoNs/OgkySxsm:DKieEo0V+2aJRkQsOmsLkym
      MD5:382321EAD709D931C39737A8ADC01183
      SHA1:9F745A520F81939659D77FEB339144FE23ADD81B
      SHA-256:26B2D78F9D499F75D4274332DCCDFACCAAABB7C9FD1F63DAFC75315320438268
      SHA-512:DDDCE196B1DD7A66316855B945CB3ED98286A3735B716CA0A9E1E7A42B8ED75E2AA1390690938F79EBABDD54440FFBDEAF8E0F2B52BA5758EB072CF80271E101
      Malicious:false
      Reputation:low
      Preview:; These are tweaked defaults for various lightmass solver and export settings..; Artist oriented lightmass settings are in the editor UI..; Documentation for all of these is in UnrealLightmass / Public / SceneExport.h..; This ini is reloaded every time a lighting build begins, no need to restart....; Warning: overwriting this file with an old version will cause the editor to crash. This file must be in sync with the editor executable...; Instead, create a DefaultLightmass.ini in your project and override just the values you need, then the overrides will continue to work on version upgrades...; https://docs.unrealengine.com/latest/INT/Programming/Basics/ConfigurationFiles/..;..; For example, in your project's Config/DefaultLightmass.ini:..; [DevOptions.PrecomputedDynamicObjectLighting]..; SurfaceLightSampleSpacing=400....[DevOptions.StaticLighting]..bAllowMultiThreadedStaticLighting=True..ViewSingleBounceNumber=-1..bUseBilinearFilterLightmaps=True..bCompressLightmaps=True..bUseConserva
      Process:C:\Windows\System32\msiexec.exe
      File Type:Generic INItialization configuration [ExcludeContentForMobile]
      Category:dropped
      Size (bytes):1310
      Entropy (8bit):4.8887259246146755
      Encrypted:false
      SSDEEP:24:QSMx71rUoSBpMyQDQ0RzMga3oAD7FQR0YehvNb:QSMxx2NUzx5uZ4Yv9
      MD5:18DA090A41DFBF5B6DCF765DDA7455ED
      SHA1:AC27AD231720FC899AC2F5D1B48C52DD4D48F606
      SHA-256:E1901D684774984A794368E33B1229AF3A834506AE4D10C4C45CC2AAD0A5AA83
      SHA-512:2BCE9838DFD0178470D588F93C599283921061CFF4FA8DFF4F40B9FD5CB0D9DF7B80954654F0A8490B6F6B6A60645AB02DE8D4A8D70FA0C0A7C183B058047B5F
      Malicious:false
      Reputation:low
      Preview:; These rules are applied in order, the first rule that applies per file is taken and no others are evaluated..; [SectionName]..; bOverrideChunkManifest=false ..; If true this allows overriding assignments from the cooker..; bExcludeFromPaks=false ...; If true this removes entirely, cannot coexist with overridepaks..; OverridePaks="pakchunk1" ...; If set this will override pak list, comma separated..; Platforms="iOS,Android"...; If set this rule will only apply to these platforms..; Targets="Shipping,Test"...; If set this rule will only apply to these configurations..; bOnlyChunkedBuilds=true...; If set this rule will only apply to chunked builds..; bOnlyNonChunkedBuilds=true..; If set this rule will only apply to non-chunked builds..; +Files=".../*FileMask*.*"...; List of file masks to apply to, using the C# FileFilter class......[ExcludeContentForMobile]..; Exclude specific large textures on mobile platforms, this was moved from CopyBuildToStagingDirectory.cs..; This can be added to
      Process:C:\Windows\System32\msiexec.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):89
      Entropy (8bit):4.742925459228287
      Encrypted:false
      SSDEEP:3:w241AVHGSW1tKAKM6yQjUAKM6zntM:wdymQAK14AKB+
      MD5:A3879611FF83D94C1352E06EF35CFD85
      SHA1:F9598AEF32DAA75929A8300C02FEB308E89EFD1E
      SHA-256:B2064E1945F399CDCF2AF1F1AFD83397AF3C30AC14ED955F21DDA7FC9620296E
      SHA-512:1A52D5BDCF5ECD6D5086E8E0272DAD86E1E1AF92154C4ADD098E1CC12B71F995E91F7A37D57F03C20717D0DD7939041DF9E31C662626597494CDF2B75A0000E3
      Malicious:false
      Reputation:low
      Preview:[Staging]..+RemapDirectories=(From="Engine/Plugins/Lumin", To="Engine/Plugins/MagicLeap")
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXEl0t6E7lFEKe:SvKM0t6gCKe
      MD5:CF788FA9793FEA6104E904FBA48B9ADE
      SHA1:5105A53F269A6C445FE58F0AB7BB501BF5790960
      SHA-256:D49D36962528CD70E638FE62C2A675838D5F6D13C229F6A107530D58C458D100
      SHA-512:B07CED3B04E2CE33B0FA215AE03002E666D5408F31ADE8FE84F46E2A7474D277B40887F090D5DB6ABEA58B6A8DF385F952DD614979AD903AAF31B524A06AA93B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):92
      Entropy (8bit):3.28350515130155
      Encrypted:false
      SSDEEP:3:XCbVSm/tluFblElwql5ERoZPUl1RY:Sv6BMw7CZMu
      MD5:18933A825F0FC4CCD2CDEB68524F851F
      SHA1:640CFC46024F16F989198B416141DACAC18CC955
      SHA-256:F73099366D30DD36F3DE23E28F7851B57454090B3AF7648B1125E343F1321B92
      SHA-512:1DDCB869360D19B469FA9DB3147925DED100A931F47CE4FEA7B6384F0A3AF6500FD8D8A8A0672D8B5CF6A47EEA0D874C4445C1DAD9AB16B72C14BC7F7FF39973
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ...................................t.u.....o......P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):144
      Entropy (8bit):3.8427825837613345
      Encrypted:false
      SSDEEP:3:XCbVSm/tltv5/jlullJJstP93OkwlyHbtHUnZWf0lF0/xKlF1hFn:SvMl5Mxwly7K0f00g5
      MD5:AE6774AD1B4E487D0992D22700F9087F
      SHA1:46B5C49C76A7106F33BFA9BB13EC5B0F50EFF50B
      SHA-256:DC359B3A630DAB0A5B4E728806547747FC25105B70ABD3B22E8BFF20A3995EF5
      SHA-512:095B725D6F78B78A8F77DFA461B716A480219A969EFC8246045BC0B93A18BA1377BC17BF4FF99B390038DB71DB3A387C4B6C658F858B735A897D41CE6C34CE79
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ...................................................NN.........P.......P..o.t...... u..`... ....o...... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):92
      Entropy (8bit):3.28350515130155
      Encrypted:false
      SSDEEP:3:XCbVSm/tluFblElwql5ERoZPUl1RY:Sv6BMw7CZMu
      MD5:18933A825F0FC4CCD2CDEB68524F851F
      SHA1:640CFC46024F16F989198B416141DACAC18CC955
      SHA-256:F73099366D30DD36F3DE23E28F7851B57454090B3AF7648B1125E343F1321B92
      SHA-512:1DDCB869360D19B469FA9DB3147925DED100A931F47CE4FEA7B6384F0A3AF6500FD8D8A8A0672D8B5CF6A47EEA0D874C4445C1DAD9AB16B72C14BC7F7FF39973
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ...................................t.u.....o......P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):144
      Entropy (8bit):3.8427825837613345
      Encrypted:false
      SSDEEP:3:XCbVSm/tltv5/jlullJJstP93OkwlyHbtHUnZWf0lF0/xKlF1hFn:SvMl5Mxwly7K0f00g5
      MD5:AE6774AD1B4E487D0992D22700F9087F
      SHA1:46B5C49C76A7106F33BFA9BB13EC5B0F50EFF50B
      SHA-256:DC359B3A630DAB0A5B4E728806547747FC25105B70ABD3B22E8BFF20A3995EF5
      SHA-512:095B725D6F78B78A8F77DFA461B716A480219A969EFC8246045BC0B93A18BA1377BC17BF4FF99B390038DB71DB3A387C4B6C658F858B735A897D41CE6C34CE79
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ...................................................NN.........P.......P..o.t...... u..`... ....o...... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):572
      Entropy (8bit):5.373790886124089
      Encrypted:false
      SSDEEP:12:Q74tjYwqxDGPbo9iVu92VnVu92VpEIEQPwG:Q7Ur+IEEw92tw92nDV
      MD5:F47AB3C1C4A8BB34305293AE3725CEC4
      SHA1:73718A4B40FB655D24AB4A55EA8FD037A0201B8B
      SHA-256:325158DB8005C2BBAA3D9AD4AFE7DC196EB27B6072AC94BFD59B7351DE23362F
      SHA-512:987C454DFCD870441918591C0929A075F55BDD5B58A803E8BDE320F0D596F1D90AE02A312E9FC8FF9F6FC1A52E1C925B72A1A76AF979ED20E1A4CA1995077DE1
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................b........:...:.4.*...#.(.1.J.D.../.,.F.(.1...4.*.F.(.1...F.H.F.(.1...J.H.D.J.H.2...[.. . . . .~. ... ... ... ... ... ... .o. ... ... ... ... ... .c. ...]...................NN....k..)...45^W*....................V.....................\D....%...'..................V.........................V.....................\D....%...'..................V........................K..P....P..P..o.t...b.. R..`d.. ........c...p...}...............................k.. p.. ....H...U...u.. ..`.y.. ....[...o.w....`...`f.. ...`}..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):376
      Entropy (8bit):4.934418116358701
      Encrypted:false
      SSDEEP:6:SvWEVwly7579tIn/MqMYofGtIn/xtIn/MqMYofGtInLfZMgetlfzMR+nU1cf:polxtOOVGtOxtOOVGtaMxNPU1c
      MD5:825C655E66A8706E0A6186265B79182C
      SHA1:7F5332DA7D0E212F62A51896E84C01B137558BF9
      SHA-256:87C751A030504B6C93FF63960B3502705F6125C9A687DE7786EB6C36BA982B9F
      SHA-512:D33B86814453E512DCE2ED5618F7B30C98F1AF4F560BAFE593E6ACAF5040F43F42C62C20884D819364167793DA67A2B8D521BA0895FEC877E54F78C01EE767D8
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................Q.. ........V...V...........6..........................NN..^D........<.Q......6QD.6......3.'.%.....3.%.........^D........<.Q......6QD.6..^D........<.Q......6QD.6......3.'.%.....3.%.........^D........<.Q......6QD.6.........P.......P..o.t...6.. u..`8.. ................%...........2...?...L...........?.. D.. ..H.I.. ..`.M.. ....o.w.:.. ...`O..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):92
      Entropy (8bit):3.28350515130155
      Encrypted:false
      SSDEEP:3:XCbVSm/tluFblElwql5ERoZPUl1RY:Sv6BMw7CZMu
      MD5:18933A825F0FC4CCD2CDEB68524F851F
      SHA1:640CFC46024F16F989198B416141DACAC18CC955
      SHA-256:F73099366D30DD36F3DE23E28F7851B57454090B3AF7648B1125E343F1321B92
      SHA-512:1DDCB869360D19B469FA9DB3147925DED100A931F47CE4FEA7B6384F0A3AF6500FD8D8A8A0672D8B5CF6A47EEA0D874C4445C1DAD9AB16B72C14BC7F7FF39973
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ...................................t.u.....o......P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXEl0t6E7lFEKe:SvKM0t6gCKe
      MD5:CF788FA9793FEA6104E904FBA48B9ADE
      SHA1:5105A53F269A6C445FE58F0AB7BB501BF5790960
      SHA-256:D49D36962528CD70E638FE62C2A675838D5F6D13C229F6A107530D58C458D100
      SHA-512:B07CED3B04E2CE33B0FA215AE03002E666D5408F31ADE8FE84F46E2A7474D277B40887F090D5DB6ABEA58B6A8DF385F952DD614979AD903AAF31B524A06AA93B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):28432
      Entropy (8bit):5.567467981150978
      Encrypted:false
      SSDEEP:768:AJG1Pi0609voRI21kVcQ4PID8rPfAxD/QVzFkVRe0Xqwge:AMtVkVPfAxD/QVJM5Xq6
      MD5:CC5E90EE9B5824AA5466F1D6AC53342F
      SHA1:EAB29097DF96421D3262C9820B6F0D0F9D121214
      SHA-256:1B487B2128F64C7B5F6B4C7526F043BADFFB9F86D1C2055F935C8CFA021C831B
      SHA-512:2AD0697D4DA6CF68BFF98DCB3D6887B7C9253A7FEA1025422FFD61DA74155E17508859A1F214B4D51691C975D6629F6DC62A0EAE96156790A842F9C350A264FC
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................V.......g........X...1.T...2.T...3.T...4.T...s.....7.b...N.D...a.E...g...e...h.a.m...h.e.d...m.e.g...m.i.....n.e.h...p.a.g...s...b...t.a.h...t.e.k...v.i.e...x.u.e...y.e.k...E.D.C...A.v.i...G...e...J.M.M...K.a.M...K.M.M...O.c.h...P.a.y...X.i.n...X.n.t...X.u.n...a.v.i...c.b.l...c.b.r...c.o.n...c.u.l...g.a.l...g.c.h...m.o.n...o.c.h...p.a.y...p.e.r...r.a.t...t.i.g...x.i.n...x.n.t...x.u.n...L.e.i...L.h.o...L.w.a...m.o.n.u...r.a.t.u...g...e.i...E.i.e.n...E.i.h.M...s.e.l.....t.r.i.....{.0.}.b...7.b.i.s...A.n.n.a...E.i.j.i...E.i.s.o...E.n.g.i...E.n.p.M...E.n.. M...G.e.n.M...H.M.a.n...H.M.e.i...H.M.e.n...H.M.j.i...H.M.k.i...J.i.a.n...J.u.e.i...J.M.e.i...J.M.w.a...K.a.e.i...K.a.h.M...K.a.j.M...K.e.i.M...K.M.a.n...K.M.h.M...K.M.j.i...K.M.k.a...K.M.w.a...M.e.i.M...M.o.n.u...R...X.....R.a.t.u...S.h.M.M...W.a.d.M...Y.M.r.M...Y.M.w.a...e...C.....h.o.m.e...L.c.h.M...L.n.i.n...g.a.l.l.u...c.a.b.r.a...g.o.c.h.u...p.e.r.r.u...t.i.g.r.e...J.M.g.a.n...J.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.870450165586334
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDklU8gl8l/6kftl7+t3:SBtkJYlU8g8l/Nl4t
      MD5:BB0AEDB2268541C63B88E2DAA6A83F14
      SHA1:E7BB3AA9133FB59F22DDA92CEBC150BB83A74C1E
      SHA-256:6B40AF34079AC564CCBCFA52F909A460198F52938E5D09BB0A6D60EFBD64E68F
      SHA-512:25A48EF5A44915D747660225B049D6D2003E460135076302D8C6541ABAE568A21F2B2F28EBBFA9BABFC630CFFA78BDA769B8196FE63110F533C7DC9107AEBC7F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.................................a.z._.L.a.t.n._.A.Z...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXEl0t6E7lFEKe:SvKM0t6gCKe
      MD5:CF788FA9793FEA6104E904FBA48B9ADE
      SHA1:5105A53F269A6C445FE58F0AB7BB501BF5790960
      SHA-256:D49D36962528CD70E638FE62C2A675838D5F6D13C229F6A107530D58C458D100
      SHA-512:B07CED3B04E2CE33B0FA215AE03002E666D5408F31ADE8FE84F46E2A7474D277B40887F090D5DB6ABEA58B6A8DF385F952DD614979AD903AAF31B524A06AA93B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):3024
      Entropy (8bit):3.840448449572339
      Encrypted:false
      SSDEEP:48:/EL27l0wx4F1Nd7KX4Qc039gZb04VU253PePtJBLPqilg8zM/Xt15IlDB1Zy:/ELH6O1GcbZd9ktPfIXt0Be
      MD5:AC1477035AFEA949843AB8E8F101517E
      SHA1:E195EA2719ACF9133653F4F691DCDA32414E6236
      SHA-256:2761825769003AF3030EC77234C60C2C59631D5ECC5680C7F46748C7EFE09790
      SHA-512:D5954A36E53D2995B51EEBD04D67C342D90BDDB1EEBB31094CAD59B99233EB15560E10C4969E521927AC5FE035C2D2C70520CA8E88AA6B423DE6E98FE170EE49
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................Version.exceptions.SentenceBreak......C.....F.....G.....I.....L.....P.....Y.....Q.u.....C.a.....C.o.....D.i.....D.o.....D.r.....F.a.....F.n.....F.r.....H.r.....J.r.....K.l.....M.i.....M.o.....N.r.....O.p.....R.d.....S.a.....S.o.....S.t.....W.g.....e.v.....F.a.m.....M.o.d.....P.I.N.....S.t.R.....Z.t.r.....a...D.....a...M.....f.r.z.....i...J.....m...W.....o...A.....u...U.....v...T.....z...B.....z...Z.....A...M.....A.b.s.....A.b.t.....A.b.w.....A.d.j.....A.k.t.....A.l.t.....A.p.p.....A.p.r.....A.r.t.....A.u.g.....B.e.d.....B.e.n.....B.e.r.....D.a.t.....D.e.z.....D.i.m.....D.i.r.....E.r.f.....F...f.....F.e.b.....F.r.l.....G.e.m.....G.e.s.....G.g.f.....H.b.f.....H.r.n.....I.n.c.....I.n.h.....I.n.t.....J...D.....J.a.n.....K.a.p.....K.o.p.....L.t.d.....M.a.x.....M.i.n.....M.i.o.....M.r.d.....M.s.p.....N.o.v.....O.b.j.....O.k.t.....P...M.....P.f.d.....R.e.g.....R.e.l.....R.e.p.....S.e.k.....S.e.p.....S.t.d.....S.t.r.....T.e.l.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):712
      Entropy (8bit):3.369956447252417
      Encrypted:false
      SSDEEP:12:WjthcQRSMC7iqha4uA6Fyp1yl12TeRTVIKolACK4JgJ9LrkSlj:WjwOC7/hshQyMz7K4JK9L4Slj
      MD5:1ADFA9703C0CBA543C2A6A14195B80F9
      SHA1:3286BAEB9407AEA5FD5DB4BAF1523F2CB78BC686
      SHA-256:001162812BCBC4B3E2F8747BFACC6BBFB6084DD04FC37DADF1BABEC54B5E0144
      SHA-512:3989E555C9F058B942542C28200AC5419C84DAF14DC6A321C5B6C2D3DD4233ED7475663398C6CF868F22DCF8A21AF80A4BCBD7718C31843747F8DBEF6729CF5B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................Version.exceptions.SentenceBreak......D.....L.....D.C.....d.r.....o.n.....r.a.g.....C...P.....C.f.r.....I.n.g.....L.i.v.....L.t.d.....M.o.d.....N...B.....S.i.g.....U...S.....a...C.....a.l.l.....a.v.v.....d...C.....d.i.v.....f.i.g.....i.n.t.....p...i.....p.a.g.....s.e.z.....t.a.b.....t.a.v.....v.e.r.....v.o.l.....G.e.o.m.....a.r.c.h.....d.o.t.t.....m.i.t.t.....c...c...p.....N...d...A.....N...d...E.....N...d...T.....O...d...G.....S...A...R.....S...p...A.....U...S...A.....d...p...R.....2...1...1.9...1.4...S...M...A...R...T.....-.6.Y.E.^.......................T.....;.1.m...|.......".c.........@...h.w.,.'.....r.O...J.......3....... .(......`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):53856
      Entropy (8bit):3.7418320755024443
      Encrypted:false
      SSDEEP:768:2DoEL0eu4444443P444444444444444F44544444444444b444c44Q4e4444444+:2cELN/d4VqcVk
      MD5:3134881D21CCA929C6DA5ED7C81B27C6
      SHA1:8C4DF4847AC71183503E521154A91B3F849CC834
      SHA-256:D5F7E98EAAA8F0EBE30056C6864DF8E01B00F1BD421F9D02888A40509C9B943D
      SHA-512:D6AD8C3748A9CA8FCD289532EBE1D4B7BFF1619E6713330855935BB3F62B10B7D95156A85029CBBA773A898E6EB92FC61978BFD11BAF2AB7029C6527D28E7C49
      Malicious:false
      Reputation:low
      Preview:...'........Brk ........ Copyright (C) 2016 and later: Unicode, Inc. and others. License & terms of use: http://www.unicode.org/copyright.html .............)...P....@...A..x....H...f..(...."......................................Z................................................................................................................................................................................... .....!.".............................................#.........................................................................................#.......................$...................................................................................................................................................................................................................................................%...........................................................................................#.......................&...............................................'...............
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):56472
      Entropy (8bit):3.7017475681634124
      Encrypted:false
      SSDEEP:768:hrVu4444443P444444444444444F44544444444444b444c44Q4e44444444444D:TopB4FWnVL
      MD5:506FF44FA1B804128F6A9C5C352FDAE0
      SHA1:7DEBF66ECE7B93EC08CBE59A37B2F5E6892F84FE
      SHA-256:643605B61FBCA9B13DF2CB2CF583EC7F4490E95E712A8168EBFB20520B6065D1
      SHA-512:A2F170F972B630AC47C7B769AB43F3E0E5A9FE4D95FA060BD07A46A0543A683D450893325C24BFC9BFA5922E88463157A57B1B7656661600314126093E271A97
      Malicious:false
      Reputation:low
      Preview:...'........Brk ........ Copyright (C) 2016 and later: Unicode, Inc. and others. License & terms of use: http://www.unicode.org/copyright.html .............-...P....F..8G..@...xP..`e......&.....................................b......................................................................................................................................................................................................... .!............................................."................................................................................................."...........................#.......................................................................................................................................................................................................................................................................$..................................................................................................."...........................%...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):53552
      Entropy (8bit):3.732355638311328
      Encrypted:false
      SSDEEP:768:ADoEL0wu4444443P444444444444444F44544444444444b444c44Q4e44444443:AcELvopd4VtEVf
      MD5:C9368F051BFFC010B8984B489BF06E6C
      SHA1:6864FB95D254CFCAAAD526FE8E84A15DB08ECA5A
      SHA-256:B29C4358C5D605DC14BE6B1C16FD6BB022582051502952BF91C3CE087371C63D
      SHA-512:2AD8D40A519B1FA375192C2AAF6AB23A73DA3FD4498E1C05463101B4C735A65F8EAAAE65C2B92408A962A937F2E0B1490E234101A816047ED9EEE694BCC24720
      Malicious:false
      Reputation:low
      Preview:...'........Brk ........ Copyright (C) 2016 and later: Unicode, Inc. and others. License & terms of use: http://www.unicode.org/copyright.html .............)...P....@...A..x....H..`e.......".....................................Z................................................................................................................................................................................... .....!.".............................................#.........................................................................................#.......................$...................................................................................................................................................................................................................................................%...........................................................................................#.......................&...............................................'...............
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):660
      Entropy (8bit):3.969364612406447
      Encrypted:false
      SSDEEP:12:WR55CTYlb/PnIXJ3EVReO82PADFE+Yc/ALXN0ZYEI4tiPd2oJofQlnO:W5Ckb3I52sDNoLXN0ZLtO2oyfB
      MD5:0BE7629F239F7A16B71FDB4AC8BA1A18
      SHA1:DF18DBC09EE192D46D05CA4989156AC598FC12D7
      SHA-256:7651D933A0D58C98A6DAFAB3C0F093D713A352B03938339F62AC6C185DAD4B0A
      SHA-512:CFA279D3D09069DCEF43C6A549B4A302E8675670283287AB98B34A332AFC199764888A6C777DA60CFCE942A6F59C3F66987F491C0A48317DBD5CB1217B82691A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................Version.boundaries.%%DEPENDENCY.grapheme.line.line_loose.line_normal.line_strict.sentence.title.word.dictionaries.Hani.Hira.Kana.Khmr.Laoo.Mymr.Thai......l.i.n.e...b.r.k...c.h.a.r...b.r.k...s.e.n.t...b.r.k...w.o.r.d...b.r.k...t.i.t.l.e...b.r.k...2...1...4.9...3.2...c.j.d.i.c.t...d.i.c.t...l.a.o.d.i.c.t...d.i.c.t...t.h.a.i.d.i.c.t...d.i.c.t...k.h.m.e.r.d.i.c.t...d.i.c.t...l.i.n.e._.l.o.o.s.e...b.r.k...l.i.n.e._.n.o.r.m.a.l...b.r.k...b.u.r.m.e.s.e.d.i.c.t...d.i.c.t.........o.~.....%...9.9.9.`.E...R...@.I.N.Y.e.q.z.......o.~.....%...................9.9.9.`.E...R.....3. .(........./..`...P...P
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):37144
      Entropy (8bit):3.478348288934909
      Encrypted:false
      SSDEEP:192:TtUga3kFDIayEm7PCbbV6GTu0b83+QIkHz8kX4LWhifIrUL/XQM8ZFeyiFHaf/0l:yga3Uwx7PCvE8b83aVfU4gJsZF6
      MD5:8E6CD9C6706FA2C50250CABE26EB2F23
      SHA1:89CBB53A6A8EE2B46FFEC8F114D5BC53733A45E9
      SHA-256:3CC9C8EDC37CDC75F7D60C3CF12655A6A4E85B46BD5632BB1ABA62A331544ABA
      SHA-512:80A3029ADCE05D245C58F4A936C05525B4E97A74C5389018D7F8F20F7A2AB84CEC0C7FAC172E1D997E9FAA7A6B3B045A8DD430613EF6EB6DD4C955FDE1544579
      Malicious:false
      Reputation:low
      Preview:...'........Brk ........ Copyright (C) 2016 and later: Unicode, Inc. and others. License & terms of use: http://www.unicode.org/copyright.html .................P.......0...`.......p.......p.......................................*...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................*...................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):44928
      Entropy (8bit):3.730335600949021
      Encrypted:false
      SSDEEP:192:TfSX4tmoCZDvcWc/22cAo0VAjkmNVfmyBB+8mpzQVi7IVbHag1jQnwgDo0LJpTCG:LAvjc/22ch0mNVfmyBTg7IVb6rwDA
      MD5:83B717BB03CBACC3F46CA0DCC6DE0694
      SHA1:B85FC555A01737A383BE0831708E29F545FA4FA8
      SHA-256:D2A53C0F3CDDA9BB26EE250268850BB93D6894ABD12D162BC1EA7FB880444851
      SHA-512:5B63951A368A3A1C699801EB171CAAC3C231EC7BD2CBC975471D32DF111B8272E5B0C5E8BF6547CA0C164E6CF9BAF808343F752FF254C7EB1BB0C7CDF06057D2
      Malicious:false
      Reputation:low
      Preview:...'........Brk ........ Copyright (C) 2016 and later: Unicode, Inc. and others. License & terms of use: http://www.unicode.org/copyright.html ................P.......`.......0....z..`.......0...0...........................X...@....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!.............................................".#.$.........%...&.......'...................................................(...........................................).*.......+.........,...!.......................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):304
      Entropy (8bit):3.8227961435116296
      Encrypted:false
      SSDEEP:6:SBtkJfopI+mGTMG5lYly2/DUtD+QtDRqcQtCBwQ7Z4Cn:WuQvTbIy2/Q4QZQGrd
      MD5:F7CA1EBA6FC99605E44BE6A0D694A4C1
      SHA1:B0A05BFB176FA5A2DF5CAC10E92D9E912344321B
      SHA-256:9261D8B837B66A1E3F3368D4AD111AB94CA857EAEDD2F808E91CDD7ED8351AFF
      SHA-512:603F144ECF70C1FE8886701D1970DBE969798AECE0FCD5FB644DA5CB9B1300916BFC803C56A5F7EEB4C7C4A9FC2357D18CAE04E72146A2584A2E42AD9912F789
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................?.. ........D...D...........?...Version.boundaries.%%DEPENDENCY.line.line_loose.line_normal.line_strict...2...1...3.6...9.8...l.i.n.e._.c.j...b.r.k...l.i.n.e._.l.o.o.s.e._.c.j...b.r.k...l.i.n.e._.n.o.r.m.a.l._.c.j...b.r.k.........).....@.E.P.\.....).....3. .(.<......`A..P
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2524
      Entropy (8bit):5.2701530855113665
      Encrypted:false
      SSDEEP:48:6yf85nMv8XU/fqi2hTaMM+IHIFItfG/yfUXf6H25F25UTqWoQ9QRi67iseKxVpj8:nfQMEE6i6zLIHIFOGE8K2f2++X6A3xf4
      MD5:731AFEFD7454289F3CC687C346CD39F4
      SHA1:65334A4EDB35875090C86F614613C1DCC869BB10
      SHA-256:18E42CAEBB99B8A45635209D37BFC8E6AF5CCEF3F100FF5C6C29F301943E19F9
      SHA-512:D566BE6FC70D4BA28A387165B5ACCCEFC9473DCD18742351EA789F9A09B948AD9566D50E5E138A418E2945C3126926383E3151075BD9169875E5476C92EE1F5F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................_.. ........o...o......................................A.....G...8.A...&.?...+.G...........>...8.(...8.....+.A.....0.,.?.....A.(...&.>.(...+.A.8...,.A.&...8.>.(.....8.>.0.....8.?.(.....>.%.?.....G.%.K...&.?.(.H.........2.....>...K.....H./.>...8.A.(.?...8.H.%.K...-.>.&.M.0.....>.0.M.8.......%.,.0.......8.M.%.....(.8.K.2.....>.,.K.(.....A.2.>.......L.%.>./...+.>...A.(...,.?.8.%.?...,.K.8.K.0.....?.(.?.%.../.A.....8...0.?.....>...8...,.>.0...8.>.5.A.(...8.A...A.0.......>.9.M.(.....+.M.0.?.2...,.A.&.,.>.0...0.,.?.,.>.0.........2.,.>.0...8.A.(.?.,.>.0...8.G...G.(.M.&.....>.(.A.5.>.0.@...(.,.G...M.,.<.0...,.?.8.%.?.,.>.0...8.A...A.0.,.>.0.....8.>...*.B.0.M.5...&.?.8.G...M.,.<.0...8.,.%.>./.9.,.%.>...+.A.../.,.G.2.>.8.G...8.G.,.%.G...M.,.<.0...M./.d./.y.y. .G.G.G.G.G...,.H.8.>...K./.,.H.8.>.....8.*.M.$.>.9. ...G. .&.?.(.....?.%.>.0. ...?.2...?.%.>.0.....>.5.8.G./...K.(.M.&.K.(.H./.,.>.9.>...K.(.H...8.?.%.>.8.G./...K.(.M.&.K.8.G./.,.>.9.>...K.8.G.....>.5.%.>...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXEl0t6E7lFEKe:SvKM0t6gCKe
      MD5:CF788FA9793FEA6104E904FBA48B9ADE
      SHA1:5105A53F269A6C445FE58F0AB7BB501BF5790960
      SHA-256:D49D36962528CD70E638FE62C2A675838D5F6D13C229F6A107530D58C458D100
      SHA-512:B07CED3B04E2CE33B0FA215AE03002E666D5408F31ADE8FE84F46E2A7474D277B40887F090D5DB6ABEA58B6A8DF385F952DD614979AD903AAF31B524A06AA93B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMmsll86E7lXyEKd:SvUl86g1Kd
      MD5:D4EF453530AF778ADA54DF1AFC64F304
      SHA1:E1C2A9D54D408736B091C1BA4740CB054FD437CD
      SHA-256:78FC4219ECA73162DDE17627148AB0B2266CCB80664007082C496BF5BEC35D7E
      SHA-512:8BA387125D94E0279B1C930CB6BF46EA088F4BEEBB3C337C160935265DC114B9AE14F70B73403D797E2E6871F9E57114CEFD999766E0AA6E6B66D6AA0DB23DAA
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.g$...................g$...........o.f$
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):1216
      Entropy (8bit):5.590841534558597
      Encrypted:false
      SSDEEP:24:p+tAIL3kZtYT7tqi/7ttsMteFsMv4YvCKmXWz5aVe:p+tp3otYdZiMteKMwYaKmnVe
      MD5:E0DFF04FF2604F608A3A5C0FDDBDED6A
      SHA1:C47515029521BABB1ABE9A847C31BFEB15200F1F
      SHA-256:E8C2681948310652DD8A897CB5290DF17C6EFAEDBDB4353AF0085D8EA9673EB7
      SHA-512:A762B339223E41F558B9C45143A3AC9A3F3AF67ED157922083922E59102A933BD6783B39356EAF239EA167AE192B64FDA56B3D69D7C1A3DD71790F326C67A25E
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .m......(...(.........m..........K.B.Z...K.K.N...K.M.K...K.M.N...K.M.S...K.M.W...K.N.B...K.N.K...K.S.T...K.T.N...O.K.B...O.K.N...O.K.S...O.K.T...O.R.K...S.A.N...S.a.n.d.e...E.s.a.n.d.e...S.h.a.a.h.a...E.i.z.o.o.b.a...K.W.O.T.A. .1...K.W.O.T.A. .2...K.W.O.T.A. .3...K.W.O.T.A. .4...O.b.u.n.a.k.u...E.r.i.z.o.o.b.a...O.k.w.a.k.a.n.a...O.r.w.a.k.a.n.a........)..k..)...4.wEy..................................!.$...0............... .'./..4....eN>...D....L...3..].N..).P.M.Neh.4......k..)...4.wW*eh................................!.$...0............... .'./..4....eN>...D....L...3..].N..).P.M.Neh.4..................4=Y0.=...=(=..>.....>......4..j.R......}..n.1...r..v.~.z..M.......=80.<...<.<1I.<C0t%..l...G.A..4D..4G.G.D.>.J.../...^.a.d.g.............h.~.................H....<..<....Y.........................................<................P....... ...............P............%.......-.............. ... ........5...8...........;...H.......U.......
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2972
      Entropy (8bit):5.691547237370157
      Encrypted:false
      SSDEEP:48:8+57Ti6hKtR1VnDX21mRcMos/sjwHMdoY49byjfWq3msmUP7Eiax3IEvQnHy6:896hKt5nDm1mR66stoz9Wjf3XV7o+znt
      MD5:F735BD73284F4065E64F3D375C0E4210
      SHA1:7BE091A1D85A8FB82C900C2F5D0A2DB7C308DF79
      SHA-256:33CB15B76BAD8153EEF788FAEB02B60F160F126C13D22E0E63724290C49B6651
      SHA-512:0F19A72BFF06D44BA351BCE5F92E07D05B9250AE118221DCFE4A3DBC0EB7345024FBD18F392E9C5F017ECB416E9F25B6D7506BBA7D9320F2762F643841E74BB7
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .*..............).....*..........&...........~.....a.....b.....c.....d...a.4...b.4...c.4...d.4...e.4...(...F.../...F...&.'.(...h... .a...&.'.2.'.1...&.'...'.1...4.H.(.'.*...F...3.'.F.........F.....*...E.H.H.2...E. .d.....E...2.'.....F.....3...4...E.E.....&.....D.H.H.D...-.H.2.....1.'.F.../.H.H.4...E.E...........4...E.E.....d.. d... .M.M.M...~...F.,.4...E.E.......H.'.1.4...E.E.....~...4. .2.'.....F...M.M.M.. M.M.M... .y...d.. d... .M.M.M... .y.....'.1....... .3.....E...*.4.1...F... ./.H.H...E...*.4.1...F... .........E.....'.F.H.F... .........E...E... .d... .M.M.M... .y...G...A.*..... .w. ... .Y.....'.1....... ./.H.H...E.....'.1....... .........E.....'.F.H.H.F... ./.H.H...E.....'.1....... ...H.'.1...E...G...A.*..... .W. ... .M.M.M.M...M.M.M... .y. .. .M.M.M... .y...d... .M.M.M. .. .d... .M.M.M... .y...E... .d... .M.M.M. .. .E... .d... .M.M.M...4.[.. . .K. .L. .M. .N. .O. .P. .Q. .R. .!. .". .#. .$. .%. .). .+. .0. .5. .6. .7. .8. .C. .G. .I. .J.].
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):180
      Entropy (8bit):4.431161922194599
      Encrypted:false
      SSDEEP:3:XCbVSm/tlR2xaluljwPgOZM7tvyi24OPnYZi2Pc3nslulAlv5cjXPpKlF7lF:SvM8UVw4Oy7Ryi24OvEi2Pc3nV696I7F
      MD5:5AF72DD2B31240203880C30AB8512748
      SHA1:3828F5D086D39C4727477D9755704CFCA51FF409
      SHA-256:97C35776A37D70FC5BADB8F9128B8BC5E940467BB493FFF013300A62CA7344D0
      SHA-512:6C7F35187752BE14ED2E2A64D6F5BC57E1C3DB94194C7F3827DE02EC2C0F960755102E55269405DC6AADA6FC4BAA7DB373E47626B7212E9AC85EA83FDA9A11AA
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................!.. .%......%...%.........%............k..)...4CwH...k............k..)...4Aw.I..$...............................t.`......`... ... ..o.w...*..`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):88
      Entropy (8bit):2.64671783887604
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlW/lRl/jlklbl+3N/lnPn:SBtkJGtaaPn
      MD5:AA8A7AA673D89EF3789A8F51E0A80829
      SHA1:052FC49617344392438BD75F84E6F7662C50D294
      SHA-256:0C3E87EC57077F2273433A6859EA6DDD7AFC5B2A272E475EDA076833239882C5
      SHA-512:B96A6BF5258AF5D6EE582E2EF722F31017DC8FE8CAAF92A912AADB4E38E10645F451FCCAB8FC5EE95B48DF52A2A9E760F12C4255EC80B03BEF791C6551227CB5
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................%%ALIAS...a.r..... .....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.751008663818094
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlu12Ol/8klclsX+RZlUlUvk:SBtkJK2Ol/8sU2cwll
      MD5:102C528C9F8554CEF4474E7E10BB6A07
      SHA1:D9F58057FEB38913D2F40935781934FCFBC69488
      SHA-256:E80DE3D6D7DE0D2D0E8123CA081BCEA0BA849D3F08ABA660D5B93F3896FE10BE
      SHA-512:EE971EBE616AED4CFA017A6C851AEC81C411525FE15D776BDEE19354B7FC951F9493AE13FB71B26F954F91CC247E4BBCFDEEFBD817E55D8400C284460EE39C9A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................Version...2...1...2.3...4.7..... ...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):6816
      Entropy (8bit):3.1812041917040403
      Encrypted:false
      SSDEEP:48:CqEDfLTTLTD5Tf7fTL377fTLKHSGz5Y3pnEoTKAGIhr3C:Cq0f33P5ff33Pf3gY5b1LC
      MD5:F0748CA6B45F4ACCDB0A82D6D0206B61
      SHA1:5303AAFFA8752402FD58D793AA754E673977F75D
      SHA-256:DCF701064EEED5096988453045FDEE7448C3E1ADCF8885C312AFDADDD89BBB3E
      SHA-512:86182697A0547823064E216BB4B92459DEB3E74D416AC25CA44B01A8DD3712D14EB76F6E7F9943345A1AD40377C2EC43E929E6A35F852923DC2FCEDE877AC4A3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................"...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4...[.i.m.p.o.r.t. .s.r.]..............'........UCol.....`#...... ..............4...8...8...X...X...X...X........................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`'bcdefghijklmnopqrstuvwxyz{|}~.................................................................................................................................2irT..@.y...............0.8.@.H.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.P.X.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):8268
      Entropy (8bit):3.8068001682596955
      Encrypted:false
      SSDEEP:48:yThSGz8bppIKNToAGI1IBXapu5uk0c0HXkqqkTXAAcN4CSkjak3WICy7y8NYTosV:yYTrCyhkqqkTXNcNpSk+8NI8NYsM
      MD5:E49D16830A825EEFD584C06F60D8A621
      SHA1:6DDDEE5ECAFE01B4E8CF999AE1D050522CBC9665
      SHA-256:4BEB717D54843C7F7E07A3E70CD33323FC5F634948277B5DC6B2F7BDD2EA7B15
      SHA-512:935E468C1507AE3004AC52AD8786C74E2DA43B5817DCCDA81A1B64404C7138186B82CBCA04A744978509F2E436E77089C05812CD280FC8AD1A1085F5D150B652
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................'...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...4.8...6.7...&.N.<...<.<.<...<.n.g.<.<.<.N.g.<.<.<.N.G...^......'........UCol.....`#...... ..............D...D...D........................... ...:...F...2irT..@.................0.8.@.H.0.8.P.X.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.o.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):560
      Entropy (8bit):6.471097376622729
      Encrypted:false
      SSDEEP:12:WXNR0L3Omtmq103+54vmkCNMvWRQzaLhMvmNKzuxBJB16LO5yG9YmorO0+7ymBAh:W96Osd+OmvmLeO22LSeKufL6uL9iv+70
      MD5:5C0CEE0EEE7A296F1FBD31BE1BCAA7DB
      SHA1:DA0BBFBED073C0F9CCAA3DA5F389284216B49370
      SHA-256:449FCA345D2D6E5C61E2B05353A0D485AE4C9113C1CD453F56F849B51617F5CA
      SHA-512:71573BE3B0927BACBF83D15E20ABE60276691E3EB9C6985B0A161B9BCDB4F15BC38A3C91180EF10A2C4283F90823ABD7049A5BD513A8A8E59205276BC1474C3F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................$...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4...[.r.e.o.r.d.e.r. .C.h.e.r.].................D......'........UCol.....`#...... .............. ...,...,.........6v...v................................ !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstu.wxyz{|}~...................................................................................................................................E.<. .'......`...`..3.y.. .. .(......`~..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):9704
      Entropy (8bit):3.621097460230965
      Encrypted:false
      SSDEEP:48:i6MGRSGzR8fy3/ZAGILxA+qPXu3LjmEuLnj6ouwj2+hRxr226i+f/YijF:iGETxA5bl1VRfaYs
      MD5:46CFAFA533753A2D182AAE7427D364EB
      SHA1:F0784B7C037F256119434D8F84608D79D5E83D3F
      SHA-256:34C8D91C847E6CFE66F7F69198A8586202F04A20554E76113B634612CA528767
      SHA-512:9EFC02F5C8B30DA304849582CB1655E7925A5635302E172BEF5F275E0852DEE645B9DAE8123E96B958DA634110CE15049F3E46EA9DDA71A30FD41F6BE97470D9
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................n.. ........r...r...............Version.collations.phonebook.Sequence.%%CollationBin......3.5...2...1...1.9...1.4...&.a.<...<.<.<...&.o.<...<.<.<...&.u.<...<.<.<...&.s.s.<...<.<.<..........$.....'........UCol.....`#...... ..............D...D...D...d...d...d...d...0...0.... ... ...$..2irT..@.................0.8.@.H.P.X.T.\.a.i.n.v.y...0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0...0.0...........0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.7234597887964593
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlu12Ol/8klclsX+RZlUlnBlk:SBtkJK2Ol/8sU2cwlBlk
      MD5:74852472ABC6DD63B12C4766472C9B74
      SHA1:5B59504CCCC2A557A39AB15BFFAC0270D4E4014A
      SHA-256:BD31F37629AFE5B5CA7801F26F251980F6F6A737C01C3C5BE19E10B8F4840F00
      SHA-512:80E3F257A80030BECD995377E912BCB62940C2819CEE559441CD3B9A141229A7E071FA75B91B4B868DCDBFD00AC389F5250C7D49D0F8096E8CDF9B045523D0DB
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................Version...2...1...1.9...1.4..... ...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):11632
      Entropy (8bit):4.077590020245211
      Encrypted:false
      SSDEEP:192:XWh0Y4faHsQC3mMPE7IsGIyQ1i0lPxbHGk:qaj93mMPE7IjI51iGdGk
      MD5:1DAC841377561C45224B1493C035E0EF
      SHA1:B63E8D3CEA6C4DF2BDCB720901A3071A3CE21AB8
      SHA-256:7843392DD3FFA62E4318C4CB22FAD1381380106FD2252B0A31039AD387994D28
      SHA-512:FD5F29F450AA883F3A6EF415D740A4331DF9104CB9F172D45CE623396A6F66D02AD287417F636905DF46D0FFC820E01BF4AF64BADC9B8C8EF48027A22ACEFC1C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................P.. ........T...T...........b...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4.....&...<.<...&.D.<.d.z.<.<.<.D.z.<.<.<.D.Z.<.V.<.<.<...&.E.<.[.<.<.<...&.F.<...<.<.<...&.G.<.g.b.<.<.<.G.b.<.<.<.G.B.<.c.<.<.<...&.H.<.x.<.<.<.X.&.K.<.k.p.<.<.<.K.p.<.<.<.K.P.&.N.<.n.y.<.<.<.N.y.<.<.<.N.Y.<.K.<.<.<.J.&.O.<.T.<.<.<...&.T.<.t.s.<.<.<.T.s.<.<.<.T.S.&.V.<...<.<.<..........+.....'........UCol.....`#...... ..............D...D...D...................t#..t#...&...&..z+..2irT..@.................0.8.@.H.P.X.^.f.m.u.0.8.0.8.z.......0.8.....0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.7234597887964593
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlu12Ol/8klclsX+RZlUlnBlk:SBtkJK2Ol/8sU2cwlBlk
      MD5:74852472ABC6DD63B12C4766472C9B74
      SHA1:5B59504CCCC2A557A39AB15BFFAC0270D4E4014A
      SHA-256:BD31F37629AFE5B5CA7801F26F251980F6F6A737C01C3C5BE19E10B8F4840F00
      SHA-512:80E3F257A80030BECD995377E912BCB62940C2819CEE559441CD3B9A141229A7E071FA75B91B4B868DCDBFD00AC389F5250C7D49D0F8096E8CDF9B045523D0DB
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................Version...2...1...1.9...1.4..... ...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.1584082049584112
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDtM86E/lWlRKOt:SBtkJztt6siRKa
      MD5:446A3139B2628B0370B88DEDED4D5382
      SHA1:73A290ECC02BE29B6E9DEDD1DDE7B0633CB5D5A8
      SHA-256:5107405E84E52F18E47AA7071F183E499A2C325E6E4BDA7FCA2B59ECB55D81D7
      SHA-512:6E6CBE46747664442464BCCB8DC93DFAD4A786C6AC390EDA705C083498C898FF0D9083AFA411E800F1DFC1DB10799BEE110E7C5371B3F559A806D72D42CDEB0C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................___..... ...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):252
      Entropy (8bit):3.8923972437714607
      Encrypted:false
      SSDEEP:6:SBtkJbAUMXfRWv80lbl+lSlGZkgFsJtgylf:WCAUMPR0oSMc5lf
      MD5:A76CCF6803C6297FDBDC90FCAA2C39A8
      SHA1:7156D4D3C55372EF3765D290A098EE994DF34FFE
      SHA-256:F6B660BFAC93F4580444EBA04DE3C650C826F8891999302E3CCD0583D7DDF7F7
      SHA-512:862AAF133C9CC9D157ABB4B7C20EBA0F0F36D55D7B86A32770530096980986FF9CEB4F199D6902B539AAC541D6784BCA4E24ED73CF7DF27F6F3635F97BE4BD81
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................3.. ........7...7...........#...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4...[.b.a.c.k.w.a.r.d.s. .2.]... ......'........UCol.....`#......(....E.<. .#......`...`..3.,.. .. .(......`1..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):17104
      Entropy (8bit):3.4874941508467288
      Encrypted:false
      SSDEEP:96:MOlTpkEKjtDwRehrNL0bDbv/oNuiBmXgpqynC8HpYse:MOllbKhcovL0bDbvKui4XSJQ
      MD5:FD6C94EA946E393251E8CE361AC55866
      SHA1:5C9044025D9356DBC38C61DA738CEEB2D6520785
      SHA-256:F13BCB6CC2690A3BB1B5750D1B8ECC9A3F5F70E12119FBFDE7AD3D2D13155CFE
      SHA-512:3FAFA81C5130C08157CBDF5F257FB4960E50E0491FD47E3A45766E65DBB5A04C3C3F6A3C50C21B4EC1116461683A27EAECC97B32F983C1996BC5CD5FE2A7763C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................0...Version.collations.search.Sequence.%%CollationBin.standard....3.5...2...1...1.9...1.4...[.i.m.p.o.r.t. .e.s.]...[.i.m.p.o.r.t. .e.s.-.u.-.c.o.-.s.e.a.r.c.h.]................#.....'........UCol.....`#...... ..........M...D...D...D.... ... ... ... ..."..."...#...#...#..2irT..@....... .........0.8.@.H.0.8.P.X.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.T.\.b.j.r.z.0.8.y...0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.....0.0.0...0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0...0.0...0.....0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0...0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0...0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0...0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):6896
      Entropy (8bit):3.2718938783920515
      Encrypted:false
      SSDEEP:48:oBpIEt9ZDfLGWLTDfLvf7fTL377fTLKxASGzFpnEoTxAGIhtS:oBpJbfKGPfHf33Pf3vbktS
      MD5:84DADD7F294FF77849F71282F0178B2B
      SHA1:C76A7C957E9C2FE30778F9693524C30E6A0A48A1
      SHA-256:4B344767F46F079B2A27519FD20BCB714FA53AFA45EB0801335381B5DC5DAEFB
      SHA-512:7686B8FCDE850416802F162E93426D6E60C52BA09BA23092C02C5016F4ED5E207D451A2C1B53F024D909B77FE4EB2C68D9CEE0601B3E5DEB7C96145D876BCF49
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................H...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4...V.[.n.o.r.m.a.l.i.z.a.t.i.o.n. .o.n.].[.r.e.o.r.d.e.r. .D.e.v.a. .B.e.n.g. .G.u.r.u. .G.u.j.r. .O.r.y.a. .T.a.m.l. .T.e.l.u. .K.n.d.a. .M.l.y.m. .S.i.n.h.].&.P.<...<.<...<.................t......'........UCol.....`#.......... ..............4...l...l...................X.......................#...$...........!......)...`...h...q................................ !"#$%&'(123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefgfghijklm'()*+,-./.rstuvwxyz{|}~.................................................................................................................................2irT..@.q...............0.8.@.H.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.`.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):18912
      Entropy (8bit):5.023090366613305
      Encrypted:false
      SSDEEP:192:FyvoCH2tLtUy3E5rHgWvwhk4eUAMTpWo2TzrbFS:8vTHMLtF3mrHgw4eUZTpw4
      MD5:A64E40E2EB99B495EC40D72C0714A276
      SHA1:2ABF24E2C32A6D35188B3CB990AD2E03C7D1420A
      SHA-256:2CA044F7DE47CC135785375C2F8A4DE43AEACC76BDCD84778EED23DBF3D51223
      SHA-512:53CC847A9EB04EBFC1AFCEF221E32A6DB661582D518E7D7CBD97D587A915051BC2F0C6CC154AE56A29CE26F69B475EC4A8AF065A5039B85140FAC74D0BB02D87
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................l.. ........p...p...............Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4.....&.C.<.c.s.<.<.<.C.s.<.<.<.C.S.&.D.<.d.z.<.<.<.D.z.<.<.<.D.Z.&.D.Z.<.d.z.s.<.<.<.D.z.s.<.<.<.D.Z.S.&.G.<.g.y.<.<.<.G.y.<.<.<.G.Y.&.L.<.l.y.<.<.<.L.y.<.<.<.L.Y.&.N.<.n.y.<.<.<.N.y.<.<.<.N.Y.&.S.<.s.z.<.<.<.S.z.<.<.<.S.Z.&.T.<.t.y.<.<.<.T.y.<.<.<.T.Y.&.Z.<.z.s.<.<.<.Z.s.<.<.<.Z.S.&.O.<...<.<.<...<.<.Q.<.<.<.P.&.U.<...<.<.<...<.<.q.<.<.<.p.&.c.s.<.<.<.c.c.s./.c.s.&.C.s.<.<.<.C.c.s./.c.s.&.C.S.<.<.<.C.C.S./.C.S.&.d.z.<.<.<.d.d.z./.d.z.&.D.z.<.<.<.D.d.z./.d.z.&.D.Z.<.<.<.D.D.Z./.D.Z.&.d.z.s.<.<.<.d.d.z.s./.d.z.s.&.D.z.s.<.<.<.D.d.z.s./.d.z.s.&.D.Z.S.<.<.<.D.D.Z.S./.D.Z.S.&.g.y.<.<.<.g.g.y./.g.y.&.G.y.<.<.<.G.g.y./.g.y.&.G.Y.<.<.<.G.G.Y./.G.Y.&.l.y.<.<.<.l.l.y./.l.y.&.L.y.<.<.<.L.l.y./.l.y.&.L.Y.<.<.<.L.L.Y./.L.Y.&.n.y.<.<.<.n.n.y./.n.y.&.N.y.<.<.<.N.n.y./.n.y.&.N.Y.<.<.<.N.N.Y./.N.Y.&.s.z.<.<.<.s.s.z./.s.z.&.S.z.<.<.<.S.s.z./.s.z.&.S.Z.<.<.<.S.S.Z.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):7092
      Entropy (8bit):3.1883641632795445
      Encrypted:false
      SSDEEP:48:8qnDfLTTLTD5Tf7fTL377fTLKcSGzFpnEoTxAGIhcFSf:8qDf33P5ff33Pf3JbkcFC
      MD5:DEDF86F20809D515B5441A7A00A9C564
      SHA1:531629BF1DF847C6B4B746AF23D722B994E3A382
      SHA-256:9776F4BE2EF5F11A5D03C9B7AFC184D6361D5256BE1140AE1E416CBBA3F7D0E1
      SHA-512:D8EBD3065D260AAE0A1903CC16E4A441302C7A509A6BA12D83F8D7B6E379ABDD73DCECCCE8E61CEA4F4EC397A062891215FE2416A6AB847881EB340297391A11
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................(...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4...[.r.e.o.r.d.e.r. .C.y.r.l.].&.5.<.Q.<.<.<..........................'........UCol.....`#...... ..............<...@...@...@...@...@...@................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`'bcdefghijklmnopqrstuvwxyz{|}~.................................................................................................................................2irT..@.................0.8.@.H.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.P.X.^.f.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.7234597887964593
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlu12Ol/8klclsX+RZlUlnBlk:SBtkJK2Ol/8sU2cwlBlk
      MD5:74852472ABC6DD63B12C4766472C9B74
      SHA1:5B59504CCCC2A557A39AB15BFFAC0270D4E4014A
      SHA-256:BD31F37629AFE5B5CA7801F26F251980F6F6A737C01C3C5BE19E10B8F4840F00
      SHA-512:80E3F257A80030BECD995377E912BCB62940C2819CEE559441CD3B9A141229A7E071FA75B91B4B868DCDBFD00AC389F5250C7D49D0F8096E8CDF9B045523D0DB
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................Version...2...1...1.9...1.4..... ...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):22836
      Entropy (8bit):4.285576816878592
      Encrypted:false
      SSDEEP:192:xJPnQ1xOzzU5wXJUUvuX3gl4PWBcVegUa/8m2YS3wG4qDYe/6dWUXmgEOKNaOjIS:jQ/+4aYzlEECIohA5GDpwU
      MD5:0C4EBC14057AC2AEC1048A688AB10D78
      SHA1:77C204D54BA7779DD79D606841983297B4340E88
      SHA-256:E519FD05C4E1B6177533895C767E9E3B3C7F821E509C9CF8989DC8E6CB486EA2
      SHA-512:8581D0D1A5726C4CD8ADF51C029F68A49BB0FC448815533F39B6997F29AD5C2EB63128C29FBE80A017D40454F06CF3C94BD602FDBF01A675E036A5E3E3E3A96B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................A.. ........E...E...............Version.collations.phonetic.Sequence.%%CollationBin.standard......3.5...2...1...1.9...1.4...&.E.<.[.<.<.<...&.O.<.<.T.<.<.<.....S.&.E.<.[.<.<.<...&.O.<.<.T.<.<.<...&.G.<.g.b.<.<.<.g.B.<.<.<.G.b.<.<.<.G.B.&.K.<.k.p.<.<.<.k.P.<.<.<.K.p.<.<.<.K.P.&.M.<.m.b.<.<.<.m.B.<.<.<.M.b.<.<.<.M.B.<.m.f.<.<.<.m.F.<.<.<.M.f.<.<.<.M.F.<.m.p.<.<.<.m.P.<.<.<.M.p.<.<.<.M.P.<.m.v.<.<.<.m.V.<.<.<.M.v.<.<.<.M.V.&.N.<.n.d.<.<.<.n.D.<.<.<.N.d.<.<.<.N.D.<.n.g.<.<.<.n.G.<.<.<.N.g.<.<.<.N.G.<.n.g.b.<.<.<.n.g.B.<.<.<.n.G.b.<.<.<.n.G.B.<.<.<.N.g.b.<.<.<.N.g.B.<.<.<.N.G.B.<.n.k.<.<.<.n.K.<.<.<.N.k.<.<.<.N.K.<.n.s.<.<.<.n.S.<.<.<.N.s.<.<.<.N.S.<.n.t.<.<.<.n.T.<.<.<.N.t.<.<.<.N.T.<.n.y.<.<.<.n.Y.<.<.<.N.y.<.<.<.N.Y.<.n.z.<.<.<.n.Z.<.<.<.N.z.<.<.<.N.Z.&.S.<.s.h.<.<.<.s.H.<.<.<.S.h.<.<.<.S.H.&.T.<.t.s.<.<.<.t.S.<.<.<.T.s.<.<.<.T.S......<.....'........UCol.....`#.......... ..............D...D...D...t...t...D!..D!...)...)...5...5...;..2irT..@.................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):10280
      Entropy (8bit):3.8442671385451366
      Encrypted:false
      SSDEEP:96:e/mFraymPmDPQOwdhEn8Qm5aqPNssWB5+CYEZ:eUrJmPmDoOzm5acssgww
      MD5:453D55D7BB47B2B7BC2FD3EBA4E4A1E2
      SHA1:0BC5C02A06018B466F3D673EF209E93D32779D6C
      SHA-256:FC6A6BC9A00735D6D9538BBDC78DABE54390851BE06CFCF06FF000131E6DDB8D
      SHA-512:5FB8EB180F72B4ACDB2AC5BF051209F11C0FDD100F9EE0BFFBA951D9C9AD2B944A69D969613C2742568E1CD46B1F6AF6E4FF4F7DA6B3DF9B8DA1E199A75CCA1A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................M...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4...`.&...=.....&...=.....&...=.....&.A.<.<...<.<.<...&.C.<...<.<.<...&.E.<.<...<.<.<...<.<...<.<.<...&.I.<.<./.<.<.<...<.<.y.<.<.<.Y.&.S.<.a.<.<.<.`.&.U.<.<.s.<.<.<.r.<.<.k.<.<.<.j.&.Z.<.~.<.<.<.}............&.....'........UCol.....`#...... ..............D...D...D...........................b"..b"...&..2irT..@.................0.8.@.H.P.X.\.d.l.t.0.8.y...0.8.0.8.0.8.....0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0...0.0.......0...0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):7248
      Entropy (8bit):3.275547854208499
      Encrypted:false
      SSDEEP:48:jPvMcDfLTTLTD5Tf7fTL377fTLK5SGz5Y3pnEoTKAGIhgxXR4FDR:jPvZf33P5ff33Pf3eY5b1kGDR
      MD5:EA2B7DDCB4A733DA59B0FF62CC497175
      SHA1:4885A7DCB1D0F111FB53474AD6FEAC075B3D8206
      SHA-256:2AEFB3248516F9E2527A8C1AB7EF96E9BDDF123D745310776041F096F15527AA
      SHA-512:3630F610DCDCF922330BC69CEA22D012FF5A06B255E8B96A5220E94C1FE73D4799BD305BB109CA97FBA551AF057F9D6DD57E8B4DC12E512E83A32444703C082D
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................:...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4...9.[.r.e.o.r.d.e.r. .C.y.r.l.].[.s.u.p.p.r.e.s.s.C.o.n.t.r.a.c.t.i.o.n.s. .[...8.].].&...<.S.<.<.<...&.[.<.\.<.<.<..................'........UCol.....`#...... ..............<...@...@...P...P...P...P................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`'bcdefghijklmnopqrstuvwxyz{|}~.................................................................................................................................2irT..@.................0.8.@.H.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.P.X._.g.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):572
      Entropy (8bit):6.406103106338581
      Encrypted:false
      SSDEEP:12:WL2fR0LNL8aupmq103+54vmkCNMvWRQzaLhMvmNKzuxBmLO5yG9YmorO0+7ymBA3:WLSE4pd+OmvmLeO22LSeKuIuL9iv+7y3
      MD5:66E02C38C83471CB19E278EA6FB8112F
      SHA1:4ED90E2E7E56C0D24B80116C6988065E5992C3A3
      SHA-256:7F2297B2E136463FDF75D7E0F0BFA189A861E7B004DC26B17CA423307EF585B6
      SHA-512:28AA0AC9FEF2F5B1BB45623B87961A8E4B1375DF9EE3EA0DEA027464A16E7138B6401DA7B3815C79DFA54461DEE9B367B31BB4D7D32808F41399C316F0FB0707
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................&...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4...[.r.e.o.r.d.e.r. .C.y.r.l. .M.o.n.g.].......P......'........UCol.....`#...... .............. ...8...8..............a...b..0v..4v................................ !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`'bcdefghijklmnopqrstu.wxyz{|}~...................................................................................................................................E.<. .'......`...`..3.|.. .. .(......`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.7234597887964593
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlu12Ol/8klclsX+RZlUlnBlk:SBtkJK2Ol/8sU2cwlBlk
      MD5:74852472ABC6DD63B12C4766472C9B74
      SHA1:5B59504CCCC2A557A39AB15BFFAC0270D4E4014A
      SHA-256:BD31F37629AFE5B5CA7801F26F251980F6F6A737C01C3C5BE19E10B8F4840F00
      SHA-512:80E3F257A80030BECD995377E912BCB62940C2819CEE559441CD3B9A141229A7E071FA75B91B4B868DCDBFD00AC389F5250C7D49D0F8096E8CDF9B045523D0DB
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................Version...2...1...1.9...1.4..... ...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):10344
      Entropy (8bit):4.271419544171399
      Encrypted:false
      SSDEEP:96:PhOspqyPOFaeZUBIX9vaUscbxbKY3zcv//cpQwR48zxYWADv:PwspqvNv3sNWzeHmQv
      MD5:DD7365352475EA3DD2767F13F41FB976
      SHA1:97E4EAD03857C51932E0DFA8ED58587AC67F96B6
      SHA-256:62928E142E473D98A1F85FA88DF103F40694042906F2377EA38A65CE3580C86F
      SHA-512:719450846B7570A0846BE408940F28452A3800C4E1D13A251A04F96A29DF835AB7E6B0972C94BD70B48C682D1503D5451776C32E69BC7658CC978F0C6B33221D
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................C...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4...K.&.Z.<.c.h.<.<.<.C.h.<.<.<.C.H.<.d.h.<.<.<.D.h.<.<.<.D.H.<.k.h.<.<.<.K.h.<.<.<.K.H.<.n.y.<.<.<.N.y.<.<.<.N.Y.<.p.h.<.<.<.P.h.<.<.<.P.H.<.s.h.<.<.<.S.h......'.....'........UCol.....`#.......... ..............D...D...D............................"..`"...&..2irT..@.o...............0.8.@.H.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.^.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):7040
      Entropy (8bit):3.2963712387128243
      Encrypted:false
      SSDEEP:48:/A+knETvBDfLGWLTDfLW6f7fTL377fTLKkSGzFpnEoTxAGIhqjz:/A+k0fKGPfzf33Pf3hbkqjz
      MD5:DF68A691D69D309CC5973650F2A8D877
      SHA1:6BBB69818D12FE9BF2A858863F5CCC9C11643E30
      SHA-256:2029F6CB4B7BD08C58B87488342291AF11CE67DBFBE7BC7A6981375FE81E71EB
      SHA-512:425430AD9EC214FBFDB0BAB62DE7598CBCDB535AC618B2DEF59579BED521891453CDB41A0A951058C215182BDAC88D2204A822B3A4D9324C93CB58C4BABD4300
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................M...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4...`.[.n.o.r.m.a.l.i.z.a.t.i.o.n. .o.n.].[.r.e.o.r.d.e.r. .O.r.y.a. .D.e.v.a. .B.e.n.g. .G.u.r.u. .G.u.j.r. .T.a.m.l. .T.e.l.u. .K.n.d.a. .M.l.y.m. .S.i.n.h.].&...<...<...<...&.9.<...M.7.&./.<.<._..................'........UCol.....`#...... ..............@...............................................................#...$...........!......)...`...h...l...m...q................................ !"#$%&'(123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefgfghijklm()*+',-./.rstuvwxyz{|}~.................................................................................................................................2irT..@.w...............0.8.@.H.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.`.0.f.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.1584082049584112
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDtM86E/lWlRKOt:SBtkJztt6siRKa
      MD5:446A3139B2628B0370B88DEDED4D5382
      SHA1:73A290ECC02BE29B6E9DEDD1DDE7B0633CB5D5A8
      SHA-256:5107405E84E52F18E47AA7071F183E499A2C325E6E4BDA7FCA2B59ECB55D81D7
      SHA-512:6E6CBE46747664442464BCCB8DC93DFAD4A786C6AC390EDA705C083498C898FF0D9083AFA411E800F1DFC1DB10799BEE110E7C5371B3F559A806D72D42CDEB0C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................___..... ...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):10284
      Entropy (8bit):3.8329305980220534
      Encrypted:false
      SSDEEP:48:DOdkPkwSGzkach/xFnThAGILr8+0QksfjmEuM65MVabLf6IEcg0M7zk2wu1uQmYG:DOd0kAcVb2q5MV8pEcRM7w2d1mYs/DB
      MD5:F54792C447E814C203D5CAAA07EA1774
      SHA1:A5D375B3549E36ECFDF92E5A373A28EEFAAB61B7
      SHA-256:8C857F52A2A19783B9C14F0925BAB553C70062A5A833911D98E1836C2CA765AB
      SHA-512:6E22BE2043964182BF19FFA1C6838FB166366A35449E754ADFC4F462F200CA185399FABAA2E4C249CC97B9BC59275110DF0986C421866405C8B7990A4AD0EDCC
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................@...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4...F.&.A.<...<.<.<...&.C.<...<.<.<...&.E.<...<.<.<...&.L.<.B.<.<.<.A.&.N.<.D.<.<.<.C.&.O.<...<.<.<...&.S.<.[.<.<.<.Z.&.Z.<.z.<.<.<.y.<.|.<.<.<.{................&.....'........UCol.....`#...... ..............D...D...D............................"..."...&..2irT..@.................0.8.@.H.P.X.`.h.p.x.y.......0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0...0.......0.....0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):9152
      Entropy (8bit):3.9385991206484325
      Encrypted:false
      SSDEEP:96:+iXmyf33Pfoff33Pf3/Y5b1l5zbl6BpQoRw8YsYV:+oHnQnEb17I/E
      MD5:140A3116DEE46D196904D5B3BC64DC4B
      SHA1:473C9FA7A84CFC5CD61E43FF88B5CAEDACFB2D7F
      SHA-256:4B85DE155ABD4F10DC2CE39E96F2203B4D7F55FE577B2C99B94CDD8819525ACA
      SHA-512:C69C3EB4CDB45434473C623E75DCE326653E04649B229470D3493695F8E07858F2BDAE377E5353C09D24CCFB0A475559039C16DC757B9524B4285FC9F326DB34
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4.....[.n.o.r.m.a.l.i.z.a.t.i.o.n. .o.n.].[.r.e.o.r.d.e.r. .A.r.a.b.].&.N.<.<.P.<.<.O.<.<.K.<.<.M.<.<.L.&.[.b.e.f.o.r.e. .1.].'.<.".&.'.<.<.#.<.<.r.<.<.q.<.<.%.<.<.s.<.!.&.*.<.|.<.<.y.&.,.<...<.<.-.T.&...<...&./.<...<.<...&.1.<...<.<...&...<...&...<.<.*...C.&...<.<...&...<.<...&.H.<.<.$.<.<...<.<...&.G.<.<.<...<.<.<.G.T.<.<.*.......)...&...<.<.*.I...J.....<.<...T.<.<.<.I.T.<.<.<.&.&...<.<.. <.<.. ................d!.....'........UCol.....`#...... ..............D...H...H...................................L!...................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcde'ghijklmnopqrstuvwxyz{|}~.................................................................................................................................2irT..@.................0.8.@.H.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.7234597887964593
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlu12Ol/8klclsX+RZlUlnBlk:SBtkJK2Ol/8sU2cwlBlk
      MD5:74852472ABC6DD63B12C4766472C9B74
      SHA1:5B59504CCCC2A557A39AB15BFFAC0270D4E4014A
      SHA-256:BD31F37629AFE5B5CA7801F26F251980F6F6A737C01C3C5BE19E10B8F4840F00
      SHA-512:80E3F257A80030BECD995377E912BCB62940C2819CEE559441CD3B9A141229A7E071FA75B91B4B868DCDBFD00AC389F5250C7D49D0F8096E8CDF9B045523D0DB
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................Version...2...1...1.9...1.4..... ...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):9028
      Entropy (8bit):3.7670032895856154
      Encrypted:false
      SSDEEP:48:BVe6MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMb:BVR7vBnmfO5npz8ZYGn
      MD5:71C97109D89ED5276BEA459B00925B66
      SHA1:3DC2DBF60B81BE424FBE043DD3E3FD6F6E690952
      SHA-256:50A1B2397DD35328A10CA0E7665AFD5C7BDA8C56A45082EFE6F6ABC117EC0128
      SHA-512:F0D3CAFAE7139A0BE42183624F42E8C82CA85722B0C1604B3BD04D317E47A732C1ACFC32A0F349E02791609C68A893CAFE8AF2D642A4871D390F284C233AEB90
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................4...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4.....&.A.<...<.<.<...<...<.<.<...&.I.<...<.<.<...&.S.<._.=...<.<.<.^.=...&.T.<.c.=...<.<.<.b.=..................".....'........UCol.....`#...... ..............D...D...D...t...t...t...t....................!..2irT..@.................0.8.@.H.P.X.\.d.0.8.0.8.f.n.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.....0.0.0.....0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):552
      Entropy (8bit):6.475698706545024
      Encrypted:false
      SSDEEP:12:Wh/ThR0L+lq103+54vmkCNMvWRQzaLhMvmNKzuxBmLO5SfG9YmorO0+7ymBADOMt:Wr1w+OmvmLeO22LSeKuIuS+iv+7ym2/t
      MD5:3C36DD32064B9ABC9700B51EBFDC9FEB
      SHA1:3020CA291091B8175BD6282DFBCB7AB1A2E8509F
      SHA-256:5473E753D24D1B03BB1B0ABFE4D9FD14377507B1FF19AADB2C35C57440858766
      SHA-512:D079635B3766020E7F3C4C9B95934D692045E4083026AC570E9BA14D16BBCAA41EF1E1F0090BA09BCE4F11A95CCFED1CEC40E30AEE34525DBE957F302EE04588
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................~.. ........................$...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4...[.r.e.o.r.d.e.r. .C.y.r.l.].................<......'........UCol.....`#...... .............. ...$...$....................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`'bcdefghijklmnopqrstuvwxyz{|}~...................................................................................................................................E.<. .'......`...`..3.w.. .. .(......`|..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):29156
      Entropy (8bit):4.012114656235891
      Encrypted:false
      SSDEEP:192:TOoHoNZ/vAKnvna0bDbs/nEYYaHDLWbrAiKmEYYRMkxx:6oHoNZXAunhHs85aHfWbEiK55/xx
      MD5:BF2D357381E33C4A78C716114D3B3119
      SHA1:6F701CBB897FE58A8D4AB3AD352AAA20A9B6F0EE
      SHA-256:B8EC2BC354DE81801377879E0C950167CCE4C3B899FCA3881EAF95EBC85EE1AF
      SHA-512:D35D36C9068307F85057B78FCD704A289424AE43850B5EB876586F11B562AAFC9162551FB14BC0C8B79592FB69F108F7B5130240F16B436929F421B21049FB1A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................m.. ........q...q...............Version.collations.search.Sequence.%%CollationBin.standard....3.5...2...1...1.9...1.4...1.[.i.m.p.o.r.t. .u.n.d.-.u.-.c.o.-.s.e.a.r.c.h.].[.i.m.p.o.r.t. .s.e.-.u.-.c.o.-.s.t.a.n.d.a.r.d.].../.&.[.b.e.f.o.r.e. .1.].b.<...<.<.<...&.[.b.e.f.o.r.e. .1.].d.<...<.<.<...<...<.<.<...<...<.<.<...&.[.b.e.f.o.r.e. .1.].e.<...<.<.<...<.<...<.<.<...&.[.b.e.f.o.r.e. .1.].h.<...<.<.<...<...<.<.<...&.[.b.e.f.o.r.e. .1.].l.<...<.<.<...&.[.b.e.f.o.r.e. .1.].o.<.K.<.<.<.J.<.<.D.<.<.<.C.<.<...<.<.<...&.[.b.e.f.o.r.e. .1.].t.<.a.<.<.<.`.&.[.b.e.f.o.r.e. .1.].u.<.g.<.<.<.f.<.<...<.<.<...&.y.<.<...<.<.<...<.<.q.<.<.<.p.&.[.b.e.f.o.r.e. .1.]...<.~.<.<.<.}.<...<.<.<...<.<.S.<.<.<.R.<...<.<.<...<...<.<.<...<.<.'.<.<.<.&.<...<.<.<...<.<...<.<.<...<...<.<.<...<.<.Q.<.<.<.P.<.<...<.<.<...<.<...<.<.<...<.<...<.<.<..................9.....'........UCol.....`#.......... ..............D...D...D....(...(...-...-..83..83...9...9...9..2irT..@.|..... .........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):2.8358718455819605
      Encrypted:false
      SSDEEP:3:XCbVTtkJtl6/NlXelbONglLMhll+fEPn:SBtkJK/6vJQWOn
      MD5:22828A7D641C2B46CAF27EE76D771B0B
      SHA1:5C2C34608ED1161E4BD7CD471BAB22258BB86933
      SHA-256:2FF2317B37FBFA2470A02052DF89CEC26CEC78BD8A30BCDBDC36D8D874A84D04
      SHA-512:B77FFA9EDA88505A1CB29C2B00F1A29B4D415972C4EBC2FE04889F8601C771EC9BD11956D7334A0A474766CF33BB3ABAD2715B0358BCF9676126AEC9132E226F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................%%ALIAS...s.r._.L.a.t.n._.R.S..... .....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):25664
      Entropy (8bit):4.016149774524455
      Encrypted:false
      SSDEEP:192:zOG2ydsJRFpmi0vO0bDbPNH3Z2nkhiSkkW1Za4uimCvlIeJjHi:aGHdsvmiO9HVXZXQzs1CvSeVC
      MD5:690C0062EEAFA49C713EC2AED29633CC
      SHA1:90AAAC8469535DE0DA1DB8F1A4347F295201A4F9
      SHA-256:EA32904D79FE915AD2C0F04A378C376F4855BEB578505A374DFCBC2C0D790CDB
      SHA-512:9B38CDBF60D53730EC3FA7F36367C651A7C8148681900A4D8126FCCFEEDCDCF3A3CBB2AA85DBC74F9BD273DE9F8CDD185F552C56C03DFA2FA749B519B4E2194D
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................Version.collations.search.Sequence.%%CollationBin.standard....3.5...2...1...1.9...1.4...P.&.A.<.a...<.<.<.A...&.C.<.c...<.<.<.C...&.H.<.c.h.<.<.<.c.H.<.<.<.C.h.<.<.<.C.H.&.O.<.o...<.<.<.O...&.R.<.r...<.<.<.R...&.S.<.s...<.<.<.S...&.Z.<.z...<.<.<.Z.......[.i.m.p.o.r.t. .u.n.d.-.u.-.c.o.-.s.e.a.r.c.h.].&.A.<...<.<.<...<...<.<.<...&.C.<...<.<.<...&.D.<...<.<.<...&.E.<...<.<.<...<...<.<.<...&.I.<...<.<.<...&.L.<.:.<.<.<.9.<.>.<.<.<.=.&.N.<.H.<.<.<.G.&.O.<...<.<.<...<...<.<.<...&.R.<.U.<.<.<.T.<.Y.<.<.<.X.&.S.<.a.<.<.<.`.&.T.<.e.<.<.<.d.&.U.<...<.<.<...<.o.<.<.<.n.&.Y.<...<.<.<...&.Z.<.~.<.<.<.}.......09.....'........UCol.....`#...... ..............D...D...D....'...'...'...'..\/..\/...9...9...9..2irT..@.p..... .........0.8.@.H.P.X.`.h.p.x.}.......0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.............0.8.....0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):8704
      Entropy (8bit):3.6685940591098785
      Encrypted:false
      SSDEEP:48:erdySmNSGzV/YlvjfTVuAGIh3NvuSiDnEVlKWbCmjgC6VfSmYy:epy1x0j7H3Mo7KMxMSmYy
      MD5:8C4F7B3BC899D6D6792994EA761879D4
      SHA1:06982E8B604F9C4435A8F228124AE576ED53A886
      SHA-256:80313AFB3F4ACA7CA9AA2BF8B4071520845CCE9E3FAA4CA29F0990A0C5D4DE51
      SHA-512:AA1AAE5287BD1C655F6AB0B3F429A05794EAC5E05617FD0A738CEAEDE3B7960519703D571C513F3BB257FFB2A3C46CD41504A156C31E300514DDFCAA43573850
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................t.. ........x...x...........0...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4...&.C.<...<.<.<...<...<.<.<...&.D.<...<.<.<...&.S.<.a.<.<.<.`.&.Z.<.~.<.<.<.}.................. .....'........UCol.....`#...... ..............D...D...D.................................... ..2irT..@.................0.8.@.H.P.X.Y.a.0.8.0.8.i.q.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0...0.0.....0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):24540
      Entropy (8bit):3.7529323885518333
      Encrypted:false
      SSDEEP:192:YOzfSj10u+D9i4qvs0bDb1riYcEhcXh/hDN10PWyiYcEhc6lxR:fzfSjmPT0DHTcEhwh/ZNmrcEhRHR
      MD5:B9F397A964EC7B60E93102E703697ACA
      SHA1:51D9C91C9B6DA8964EEFFC724DBD2E1BBAA55558
      SHA-256:5B81A62F482B07E2D06BFAD578D6E4806FBCA20E8EC4E6EC271128CE0DA63704
      SHA-512:BC67CDB81FC32BF35243DEA589E285639BDE5D09A6B60021491927D1BD6342228FE23ADCD263E8E4A915A765436790CEED6FD3879FCC258CF1D4A5DC3FEB2287
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................n...Version.collations.search.Sequence.%%CollationBin.standard....3.5...2...1...1.9...1.4...2.[.i.m.p.o.r.t. .u.n.d.-.u.-.c.o.-.s.e.a.r.c.h.].[.i.m.p.o.r.t. .s.m.n.-.u.-.c.o.-.s.t.a.n.d.a.r.d.]...i.&.A.<...<.<.<...<.<...<.<.<...&.C.<...<.<.<...&.D.<...<.<.<...&.J.<.<...<.<.<...<.<.D.<.<.<.C.&.S.<.a.<.<.<.`.&.Z.<.~.<.<.<.}.<...<.<.<...<...<.<.<...<...<.<.<...<...<.<.<...<...<.<.<...<...<.<.<...<...<.<.<............1.....'........UCol.....`#.......... ..............D...D...D....'...'...(...(..p-..p-...1...1...1..2irT..@.k..... .........0.8.@.H.P.X.`.h.p.x.y.......0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.............0.8.....0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.....0.0.0...0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0...0.0...0.....0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):2.828613311907312
      Encrypted:false
      SSDEEP:3:XCbVTtkJtl6/NlXelbONglSU5YMnPn:SBtkJK/6v/5YMPn
      MD5:B6AB05CAEC5B3D87BA18BCA933CC0A26
      SHA1:42A993B80A17D3F3C7983F1282E1E1FECE63FDED
      SHA-256:4D8B1CFE45A1B3F9DDD60DAD3AB6D8DFE5F7D328C11B7BB8077A8ECAC46D88CA
      SHA-512:039741CC2F608D9D33055B9995D0B25E998371EC28317C496749A56C354210FE166F15255BA836E4B93F6B0C5F6A47F9822CBF99515E823B2F82DD8C50A11A3A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................%%ALIAS...s.r._.C.y.r.l._.B.A..... .....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.1584082049584112
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDtM86E/lWlRKOt:SBtkJztt6siRKa
      MD5:446A3139B2628B0370B88DEDED4D5382
      SHA1:73A290ECC02BE29B6E9DEDD1DDE7B0633CB5D5A8
      SHA-256:5107405E84E52F18E47AA7071F183E499A2C325E6E4BDA7FCA2B59ECB55D81D7
      SHA-512:6E6CBE46747664442464BCCB8DC93DFAD4A786C6AC390EDA705C083498C898FF0D9083AFA411E800F1DFC1DB10799BEE110E7C5371B3F559A806D72D42CDEB0C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................___..... ...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.1584082049584112
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDtM86E/lWlRKOt:SBtkJztt6siRKa
      MD5:446A3139B2628B0370B88DEDED4D5382
      SHA1:73A290ECC02BE29B6E9DEDD1DDE7B0633CB5D5A8
      SHA-256:5107405E84E52F18E47AA7071F183E499A2C325E6E4BDA7FCA2B59ECB55D81D7
      SHA-512:6E6CBE46747664442464BCCB8DC93DFAD4A786C6AC390EDA705C083498C898FF0D9083AFA411E800F1DFC1DB10799BEE110E7C5371B3F559A806D72D42CDEB0C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................___..... ...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):20064
      Entropy (8bit):3.745828754746045
      Encrypted:false
      SSDEEP:192:TOSfg3SyPv1w0bDbq5KAn8nrRWj3MUKPVV6R:6SYF1vH+CR4Z0jE
      MD5:A822B9C75FE11AF54909B142EC7C7AE1
      SHA1:0E1FFDC7BB343BF182036A3AA02B4AFAEFB902EF
      SHA-256:63B27E0DECE4C56B46B01B940EE40DFC70F24ED16549965AD39CB5D5D4647CEB
      SHA-512:715B87CDADE594BDCA171DFAD663131AA9AD1B1244DD2F8FCE5E4E0D38B379298AF05131A043C789DEA09DABD995443C13D8079B6AA02BC16651AAA148D8198A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................0...Version.collations.search.Sequence.%%CollationBin.standard....3.5...2...1...1.9...1.4...[.i.m.p.o.r.t. .h.r.]...[.i.m.p.o.r.t. .h.r.-.u.-.c.o.-.s.e.a.r.c.h.]................(.....'........UCol.....`#...... ..........q...D...D...D....#...#...#...#...&...&...(...(...(..2irT..@....... .........0.8.@.H.P.X.Y.a.0.8.i.q.s.{.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.z...........0.8.....0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.....0.0.0...0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0...0.0...0.....0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0...0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0...0.0.....0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0...0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.1584082049584112
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDtM86E/lWlRKOt:SBtkJztt6siRKa
      MD5:446A3139B2628B0370B88DEDED4D5382
      SHA1:73A290ECC02BE29B6E9DEDD1DDE7B0633CB5D5A8
      SHA-256:5107405E84E52F18E47AA7071F183E499A2C325E6E4BDA7FCA2B59ECB55D81D7
      SHA-512:6E6CBE46747664442464BCCB8DC93DFAD4A786C6AC390EDA705C083498C898FF0D9083AFA411E800F1DFC1DB10799BEE110E7C5371B3F559A806D72D42CDEB0C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................___..... ...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):2.8743333840434984
      Encrypted:false
      SSDEEP:3:XCbVTtkJtl6/NlXelbONglSU5Fg+fEPn:SBtkJK/6v/57On
      MD5:71B3D464B83631B1E1ECEC35AFCEAD37
      SHA1:748A87487B0675355DE3DD7D298173C74176E126
      SHA-256:D1ED65D21F51001F63C40408403A386F2CBE5EE7A61FF98C1F5DA60A2B391469
      SHA-512:14DBFF86707AB747C9B93C03AFAC82D744444DEDBF379F5353D769EABF2C05A968FCDB14EBE7AB6531B2C87EFE021DFF051AAD7FCB30CEE50F7173890B8E22B8
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................%%ALIAS...s.r._.C.y.r.l._.M.E..... .....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):9180
      Entropy (8bit):3.6887838997318045
      Encrypted:false
      SSDEEP:48:RcVJVehSGzmUWiUoaT3AGIhoyye0XnvIlTjN4T084Tm3Arg3Y1Zo:RcVJYhWiUHmPgIlTjNYFmyb3Yw
      MD5:5CE536C02CCCE5413DFE8BC4BDC50FD9
      SHA1:91974FFAB77E59F413F39B9066D5063A0FD6C9B8
      SHA-256:E9051598553443F4D3B3AB25526A429B38D586ABF7834F28CC820F9CBD60CB1E
      SHA-512:264C4428FBC70CCA1E0C7E8D09711C05B3C14E22CB664B58C40BAE6F5A866085BDE164B14CD84439428AA334B2C8F3ABA59FDCEA665303E3BCA92B6429ACF79A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................:...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4...9.[.n.o.r.m.a.l.i.z.a.t.i.o.n. .o.n.].&.E.<...<.<.<...&.G.<.g.b.<.<.<.G.b.<.<.<.G.B.&.O.<...<.<.<...&.S.<.c.<.<.<.b..........".....'........UCol.....`#...... ..............D...D...D...T...T...T...T...`...`...~........"..2irT..@.................0.8.@.H.P.X.Y.a.a.i.j.r.u.}.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0...0.......0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):96
      Entropy (8bit):2.732558048486656
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlR/Pllvlsltloe1zRslklk:SBtkJJelXoeZukC
      MD5:12DD8C36CF20B5221FED4CA8D148690E
      SHA1:49FE57BD75E718FD72D81117BDEE5C4C0BF187D8
      SHA-256:BC0C6C650104EE38A032AAB0BD27D3627087549D811BC2AC1090FC675EDD1426
      SHA-512:74EF0DA76CD1054F3B73EF05AC00991F6425DB064A3803E2E16C2715729CAE32B059D97DAED98C3A0FADB797FAEF30E8520D6335AD41A33B0B1EFFFB6D616035
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................%%ALIAS...z.h._.H.a.n.s..... ...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):2.893564153274269
      Encrypted:false
      SSDEEP:3:XCbVTtkJtl6/NlXelbH1zRfFPn:SBtkJK/67Zp1n
      MD5:215ADB705DE3ABA0C31A481B0566E6E6
      SHA1:412A1B4BDCD5038F986B3FEF3ABE047BF02987D1
      SHA-256:088EDA99EE757C50C1DBA8520B71914B6084EC5A0FAE9B7FA54D692C420CC967
      SHA-512:CAF08E7EC4C3EBC249666E901419B90762742C7C7492B7437B15FF64BD9126DCCB3035787E7ED86143B89ACF4BD9936220267ACA57D9DB040055B58983795D30
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................%%ALIAS...z.h._.H.a.n.t._.H.K..... .....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):152
      Entropy (8bit):3.4689779176628415
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlHF26HfHlsuRmMD4VlliufDUlnBlHlPFPtH:SBtkJ4pMfSlkuwlBlHl/
      MD5:FED6013D3E13618D243805553B6BFEE8
      SHA1:CE436DE298C460153DB8C4D009FED9B6C28B9EDE
      SHA-256:0CC444B8CBCD3DB0702FE798BFF4DB5A56FAE99C8A3576C0025E8B6B57C7C7CC
      SHA-512:57D313A6A031567C231EBCB2E311CADD7EE7A4854E554651FA34C4B1DFD126AC4544140BDF2512A74F2C22C5EBFC0ADD8524D5B796B27C70DB095A1D2265C471
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................Version.collations.default....s.t.r.o.k.e...2...1...1.9...1.4.....3....... .(......`...P
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.1584082049584112
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDtM86E/lWlRKOt:SBtkJztt6siRKa
      MD5:446A3139B2628B0370B88DEDED4D5382
      SHA1:73A290ECC02BE29B6E9DEDD1DDE7B0633CB5D5A8
      SHA-256:5107405E84E52F18E47AA7071F183E499A2C325E6E4BDA7FCA2B59ECB55D81D7
      SHA-512:6E6CBE46747664442464BCCB8DC93DFAD4A786C6AC390EDA705C083498C898FF0D9083AFA411E800F1DFC1DB10799BEE110E7C5371B3F559A806D72D42CDEB0C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................___..... ...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.1584082049584112
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDtM86E/lWlRKOt:SBtkJztt6siRKa
      MD5:446A3139B2628B0370B88DEDED4D5382
      SHA1:73A290ECC02BE29B6E9DEDD1DDE7B0633CB5D5A8
      SHA-256:5107405E84E52F18E47AA7071F183E499A2C325E6E4BDA7FCA2B59ECB55D81D7
      SHA-512:6E6CBE46747664442464BCCB8DC93DFAD4A786C6AC390EDA705C083498C898FF0D9083AFA411E800F1DFC1DB10799BEE110E7C5371B3F559A806D72D42CDEB0C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................___..... ...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):2.8743333840434984
      Encrypted:false
      SSDEEP:3:XCbVTtkJtl6/NlXelbH1zRzlhWfEPn:SBtkJK/67ZFLWOn
      MD5:62CA9648BCF3E92915DF4ED667775BB3
      SHA1:80DADE2F7AE52289CF346A3B1DE99504E082D4CA
      SHA-256:918FB146507DF2A02DF8DD79E35A7D9D88BE3338D55D1D2F1E4AFADA8E72278F
      SHA-512:34BF61355D86566692BDAEC6FE9F748B23091E7F8E9FFC05C49398A0D35775A6438DD23E58D382A4ED3A2A3F37CB3A6120885100448052B76E28CB625E2C57AF
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................%%ALIAS...z.h._.H.a.n.s._.S.G..... .....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.7234597887964593
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlu12Ol/8klclsX+RZlUlnBlk:SBtkJK2Ol/8sU2cwlBlk
      MD5:74852472ABC6DD63B12C4766472C9B74
      SHA1:5B59504CCCC2A557A39AB15BFFAC0270D4E4014A
      SHA-256:BD31F37629AFE5B5CA7801F26F251980F6F6A737C01C3C5BE19E10B8F4840F00
      SHA-512:80E3F257A80030BECD995377E912BCB62940C2819CEE559441CD3B9A141229A7E071FA75B91B4B868DCDBFD00AC389F5250C7D49D0F8096E8CDF9B045523D0DB
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................Version...2...1...1.9...1.4..... ...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXEl0t6E7lFEKe:SvKM0t6gCKe
      MD5:CF788FA9793FEA6104E904FBA48B9ADE
      SHA1:5105A53F269A6C445FE58F0AB7BB501BF5790960
      SHA-256:D49D36962528CD70E638FE62C2A675838D5F6D13C229F6A107530D58C458D100
      SHA-512:B07CED3B04E2CE33B0FA215AE03002E666D5408F31ADE8FE84F46E2A7474D277B40887F090D5DB6ABEA58B6A8DF385F952DD614979AD903AAF31B524A06AA93B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):10140
      Entropy (8bit):4.947208245996127
      Encrypted:false
      SSDEEP:192:18bx6XHZhLlIwU3IOHTOJWlWWq3cbf0bZx8tD5ZC+UB3UOxNOnC1/cM:axc/LlI5tT7WWq3cL00J5M+UB35WnpM
      MD5:64607A2EF6187866EE2A718A10331921
      SHA1:2F5B24C41D5A5C624F625F0AF7B10CF04F551AB6
      SHA-256:CD8A8550E2FBDFD484754E563C9F3138CA61235FC9459F31863AA4FB4390242F
      SHA-512:CF5DC7F9344C2F7540AD4415CC13C7C1E9B6E4445F78ECE7A766D3E8B1FF39229A32C86D5633F78AEAEA9AA7F33D0F238E75FD5808151B0B015B7498B2A9E41A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .&....................H......i~...B.r.i.t.s.e. .p.o.n.d...I.r.a.n.s.e. .r.i.a.l...T.u.r.k.s.e. .l.i.e.r...I.r.a.k.s.e. .d.i.n.a.r...S.i.r.i.e.s.e. .p.o.n.d...J.a.p.a.n.n.e.s.e. .j.e.n...K.a.z.a.k.s.e. .t.e.n.g.e...K.u.b.a.a.n.s.e. .p.e.s.o...L.e.b.a.n.e.s.e. .p.o.n.d...L.i.b.i.e.s.e. .d.i.n.a.r...L.i.t.a.u.s.e. .l.i.t.a.s...M.i.a.n.m.e.s.e. .k.y.a.t...S.w.e.e.d.s.e. .k.r.o.o.n...I.n.d.i.e.s.e. .r.u.p.e.e...C.h.i.n.e.s.e. .j.o.e.a.n...L.e.t.t.i.e.s.e. .l.a.t.s...D.j.i.b.o.e.t.i. .f.r.a.n.k...E.g.i.p.t.i.e.s.e. .p.o.n.d...E.t.i.o.p.i.e.s.e. .b.i.r.r...G.e.o.r.g.i.e.s.e. .l.a.r.i...K.i.r.g.i.s.i.e.s.e. .s.o.m...K.r.o.a.t.i.e.s.e. .k.u.n.a...L.a.o.s.i.a.a.n.s.e. .k.i.p...M.a.c.a.o.s.e. .p.a.t.a.c.a...M.o.l.d.o.w.i.e.s.e. .l.e.u...O.e.z.b.e.k.i.e.s.e. .s.o.m...S.e.r.b.i.e.s.e. .d.i.n.a.r...V.a.n.u.a.t.u.s.e. .v.a.t.u...Y.s.l.a.n.d.s.e. .k.r.o.o.n...I.n.d.i.e.s.e. .r.o.e.p.e.e...K.a.t.a.r.r.e.s.e. .r.i.a.l...A.f.g.a.a.n.s.e. .a.f.g.a.n.i...A.l.g.e.r.i.e.s.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):3.315821515325992
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQx68tXmar98k+FlllQ/wF:Svu68dmar9il4wF
      MD5:006F2DC31EBA19D58A2D90952FC0A0E1
      SHA1:345751FC3EA8C1F78EABBEEE3D8F35DB6B2703BD
      SHA-256:B58B655CF2787743987BB1CAA66DCBD5F75C1161FAF18F426DD82983E57E8CE6
      SHA-512:6D94175559DF549A22428E21111C347ABD77E75B7FB2A5DACD653E2C5C73D9EBCDE74B000E284E76BEE135DD5A1D90B5B14AD3FA0DD82AB1E1CD3BAABB260845
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .!....................!......i~....... .................... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2308
      Entropy (8bit):4.3979767036908575
      Encrypted:false
      SSDEEP:48:wpUIdMjJNuPVJyVFSq3urfDM69UW52wZGY929bJMh1X7/mY/F2nrMyQpnvg:8WK7yVFvuXZ9352bY9291O1X7/mY/Qwq
      MD5:55FE1F0AEEB53BCBA85349A099DEE4BA
      SHA1:0AA381447584402F3B07BC0C890553B4D3D03D29
      SHA-256:54C82B3FAE82F1A28DB85C85C9D6B28549E2EB26BCBC5C4904E717D189CE8A70
      SHA-512:430BD7047BB642689D6F6224C30D7636D7E801678D611D668E72C4FEFED8F09FD4747412A0E059BFC1FBC976495E3DDDC8597201431C9B0425EFE0C2C820F72C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................5.. ..#.....9...9...9............i~...I.r.o...S.e.f.a.....s.k.u.d.o...E.g.y.p.t. .P.T.n...S.u.d.a.n. .P.T.n...B.a.r.e.n. .D.i.n.a...B.r.e.t.e.n. .P.T.n...G.h.a.n.a. .S.i.d.i...G.i.n.i. .F.r.a.n.k...G.y.a.p.a.n. .Y.[.n...I.n.d.i.a. .R.u.p.i...L.i.b.y.a. .D.i.n.a...S.u.d.a.n. .D.i.n.a...I.t.i.o.p.i.a. .B.i.r...K.a.n.a.d.a. .D.T.l.a...K.o.n.g.o. .F.r.a.n.k...L.e.s.o.t.o. .L.o.t.i...A.m.[.r.i.k.a. .D.T.l.a...K.e.n.y.a. .H.y.e.l.e.n...K.o.m.o.r.o. .F.r.a.n.k...M.o.r.o.k.o. .D.i.r.a.m...N.a.m.i.b.i.a. .D.T.l.a...T.u.n.i.s.i.a. .D.i.n.a...A.n.g.o.l.a. .K.w.a.n.z.a...B.u.r.u.n.d.i. .F.r.a.n.k...G.y.e.b.u.t.i. .F.r.a.n.k...L.a.e.b.e.r.i.a. .D.T.l.a...M.a.l.a.w.i. .K.w.a.c.h.a...R.e.w.a.n.d.a. .F.r.a.n.k...S.e.y.h.y.[.l.s. .R.u.p.i...S.t. .H.e.l.e.n.a. .P.T.n...U.g.a.n.d.a. .H.y.e.l.e.n...Z.a.m.b.i.a. .K.w.a.c.h.a...Z.i.m.b.a.b.w.e. .D.T.l.a.....l.g.y.e.r.i.a. .D.i.n.a.....s.t.r.e.l.i.a. .D.T.l.a...M.a.d.a.g.a.s.i. .F.r.a.n.k...M.T.r.e.h.y.e.T.s. .R.u.p.i...N.a.e.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):3.312176235559989
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQgC8tsllxr94jfllQ/kF:SvnC8C/xr94f4kF
      MD5:079D7976EA62316FB2E3C13E2773ADF1
      SHA1:ED428FC821C21CF338AC7E89BF4C84CA65141ABD
      SHA-256:702F9725F0A7266A0C9AEA585BB4F5C2D47C60914E684F236F29702977B54F32
      SHA-512:BDF76350E4931D8E4788A73DBD1E890525150C23BF6981EADF4603B2635D7AE33647D54B3FB58B7FEBE2ED5CA812652B6FB3398F2E544F12FD1AA227B869FC20
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .p....................p......i~.......o...#................ ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):88
      Entropy (8bit):2.706321389987818
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlKelBjlgljl/deNl6l2lkWx:SBtkJTl4P06s+Wx
      MD5:684C1B6BFD753BA822EA8D74E056CB7C
      SHA1:54554C5264F3AA4A913FE41EC70C78AE092E9725
      SHA-256:DD2EC488EAAFDA87F276CF164B7D82BD2CC85B4C1945630C2A42B91EFD5DA63E
      SHA-512:F9A62E62E630D08D847F81FE32E6A7C9B07938B886F85A838C9549A8DBCA3A773E1968840BCF2B7016ED35BA9AA54F0F3602F4879F05741813E8E62FE44F2A2E
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.............................i~...a.r._.S.A.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):10528
      Entropy (8bit):5.22841261707209
      Encrypted:false
      SSDEEP:192:9zBra2qxqD6/IxqGSBixWCpNRhGue6xl/WhjN402thEjTZZKj6muLAO0WP1Pobji:JBrw/IHV8PAQCvxzKJY9DH6lqsqGVJ
      MD5:25E937A70C85521D2EB2B81F5285BA5A
      SHA1:A02AEF71EFF198FC3069EA3107703E0BB3486ECF
      SHA-256:C9BA27BCCE9814AB188A5EFAF429E3A2D1BB899148E474A6DE92DCC0E4EBB000
      SHA-512:7872318C367F434E3788AEBC29375AA6174167726F4A5F2E3CE1C1AECE2B952453E806DB9479623911F5D40B5A8052EFDCEF59CC5EFE92A4A309EE2E3C38865E
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................9.. ........@...@.........K.-....i~................... .........C.F.P. ......................... ................... ................... ......................... ............... ..... ...........U.A.E. ......................... ..................... ........................... ................... ....................... ....................... ........................... ..................... ......................... ..................... ............................... ............... ....... ..................... ............................. ......................... ..................... ............................. .............. ...... ............................. ......................... ......................... ........................... ......................... ......................... ..................... ............................. ............................. ........................... ....................... ...................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2496
      Entropy (8bit):4.225674105997367
      Encrypted:false
      SSDEEP:48:xs2uGj+skXWtT/bS2sr61LDVlHAcirEKr2kfJKp/CgV+:x/uY+sKW/u2JnlgFom0p/9V+
      MD5:05572B51CDD83FD3D81BB148ACB07220
      SHA1:A259AC53240764086743A0CEF9B0582E24E5DE68
      SHA-256:A8F2E53E5F27A01C1A4C230ADF2628FAAE1D755331A655D07245BBD82ABD115A
      SHA-512:4F4ECBB6B074BAED7ED5C485F0B46C5F34D11125658A3CC9D660F477EE498D5069AD3B40A893128F6B5C9619DCDC95AC8A973E6DBA216839DDC430CFCCF6DC08
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................d.. ........h...h...:............i~...t.h.e.d.i. .y.a. .G.h.a.n.a...b.i.r. .y.a. .U.h.a.b.e.s.h.i...f.a.r.a.n.g.a. .y.a. .G.i.n.e...l.o.t.i. .y.a. .L.e.t.h.o.t.o...p.a.u.n.i. .y.a. .M.i.t.h.r.i...d.i.r.h.a.m. .y.a. .M.o.r.o.k.o...f.a.r.a.n.g.a. .C.F.A. .B.E.A.C...n.a.i.r.a. .y.a. .N.i.j.e.r.i.a...p.a.u.n.i. .y.a. .T.h.u.d.a.n.i...r.i.y.a.l. .y.a. .T.h.a.u.d.i.a...r.u.p.i.a. .y.a. .M.o.r.i.t.h.i...d.a.l.a.t.h.i. .y.a. .G.a.m.b.i.a...d.i.n.a.r.i. .y.a. .A.l.j.e.r.i.a...d.i.n.a.r.i. .y.a. .T.h.u.d.a.n.i...d.o.l.a. .y.a. .D.h.i.m.b.a.b.w.e...f.a.r.a.n.g.a. .C.F.A. .B.C.E.A.O...f.a.r.a.n.g.a. .y.a. .B.u.k.i.n.i...f.a.r.a.n.g.a. .y.a. .J.i.b.u.t.i...f.a.r.a.n.g.a. .y.a. .K.o.m.o.r.o...k.w.a.c.h.a. .y.a. .D.h.a.m.b.i.a...k.w.a.n.d.h.a. .y.a. .A.n.g.o.l.a...p.u.l.a. .y.a. .B.o.t.t.h.w.a.n.a...d.i.n.a.r.i. .y.a. .B.a.h.a.r.e.n.i...d.i.n.a.r.i. .y.a. .T.u.n.i.t.h.i.a...d.o.l.a. .y.a. .A.u.t.h.t.r.a.l.i.a...e.t.h.k.u.d.o. .y.a. .K.e.p.u.v.e.d.e...f.a.r.a.n.g.a. .y.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):29460
      Entropy (8bit):4.485162904696295
      Encrypted:false
      SSDEEP:384:6GE+P67DqsdHTXvIubR9VL4SrX72/rrq9WALkXk7OQbYUjkjFdPbZ:k7DqsaulLkXWkf
      MD5:ACA178D3F7923220CE3F676284A58FE3
      SHA1:0BEFF3E73D3C05ED14259C5F7051237EFB1FEE74
      SHA-256:F48DC1EB0C4D9FEA72460090149A80F9273B2B473FD2642ED0F05D3D1E5F2909
      SHA-512:DC29ED80EDE0E810B4491674E6298DB0948F4DBCB9941ED963166CDAB31E896C86CB942C5CBCB0099F8CC5D176A456D94C53101BC91D0399480C625769F3EC65
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ...........................i~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
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):32436
      Entropy (8bit):4.645809034718554
      Encrypted:false
      SSDEEP:384:vrGVznQRVUXi7gFMn01ftm7OIFhq2vTFy4Y07D1DE:vKZQRVUXi7gX1f7AhVs4Y0nlE
      MD5:4F869609848B4ABC169C4CBF13BB6D97
      SHA1:3CDD250564CC3627406F57C54D64F8FF7171AF6E
      SHA-256:CB1C3858BE09F9F2251A880B8C23A01A27A8B4B66CE97DE6CFC9EE8C9D75D8E7
      SHA-512:01939190DD74228817347C25098C8AB9413DDFA0D4E2B8BB006ADB46064B486D7EF7FF34B10B03BEEAB72E6C608E6C41CF09898DF9653B251977D142528EC541
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..b..........................i~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
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):116
      Entropy (8bit):3.517596863677718
      Encrypted:false
      SSDEEP:3:XCbVSm/tlEFu4g0reqqdquqllnfBiPUiltllvUNClFn:Sv8vxrb9llOPUfmF
      MD5:9FF87E06F0477ADD9846CB21A6F6D48A
      SHA1:E30CBBA9C4579206AAA1FD9C49D19B9202ABE9ED
      SHA-256:FF1D492C6C011BC2638BA171CF8C0894035549966ADD7C448C3BA92BEED3A8C5
      SHA-512:BEB9D941C0558852EBD6E8A138C4B13951692A7CAE748645A6AF3147DE7990DC58A813F2F9628D04ECF68A7AC02C592967E75EA54A13A020998AB78C12F5EC83
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~...a.t...h.S................................ ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):20072
      Entropy (8bit):5.3992671375665084
      Encrypted:false
      SSDEEP:384:y7QAvrGONYwEEXYYyyyMFPCJTk6MGy4MWb3knQUSu3y4MYM3U:yQAvrGONnYyEJTk684MWbUn7I4MVU
      MD5:F7D631020FD45D1CC35CFFA449E96481
      SHA1:22BE0657F6930B398E59CB8D502E442191041E5D
      SHA-256:418B1A0D22B60FEBCFBD5CD9ECB0EB6A4995302E5668005D9A0007E646598E3C
      SHA-512:81F3B7E837BD26BF6744F16C42072B6EC4436CE664FD40A5E75A21C3105D05E0F0A1A4D990DAA945B9841D104D7B10E245473ED80E64EA860675CAA4D662293C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..l...................7.;....i~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
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.9159246284584364
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMwlut6E7lI/jbr+0mun:Sv/0t6gIjbrlmun
      MD5:7721B72D6E81A0F713A6D57EBE1A013E
      SHA1:1FD64BA1FBD011B96B228AD5B67CD376FC57A45A
      SHA-256:4D177F2F8CC658D164AAFAD84AFBB372B7B70C61D4A0E6437AC3FD510B8C7167
      SHA-512:F3C3D609AE54033E071A5B79C0916896B651DAD135F0030F0DA6CF1886723A04952A4628E9E0CF3E1B3E4C1FBC691468A565545D8B3310B0938ABC7BB0959B4F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.............................i~.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):3.254334286211548
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQ6C8t6/xr9Y/lllQ/kF:Sv48or9Y/l4kF
      MD5:1B677BA1FFDDEA7E9012D1A6F9F64AAF
      SHA1:AD152F308C5AC32B880ADD0678AEADF1474B03B1
      SHA-256:75C44C64718E8ADCF2CD8947E2893396F62251659925D521EE3C1B0180A2CE38
      SHA-512:D2422E76A21CA4AC6D3844AC51F3C323AC541F9769863ECAD01C029011AA94D7FCA937059836AA6CDAD1E02ECEE7621EFA4FBB4F45E10063BF8FCCBFBE36006A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..1....................1.....i~........1................... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):804
      Entropy (8bit):4.276151774117483
      Encrypted:false
      SSDEEP:12:9VtHbKY8K1t+87cwAeJCKMz28oC/AeXE9lF1EiEoAQg2OrAhLg/yVz2Ol1V:9HurwPxZU/ylO9DAtxVtf
      MD5:D29930D26FF025E995FF0DFE3446BB53
      SHA1:2A935AF793B83EB754454657DAA3670CD773185C
      SHA-256:3B106AA8533E5A35FB91C0C8891C127FE1503D504181E94C3815852641A2CE3E
      SHA-512:55C4F57F66CFA0DA1F19ADD01B2D9C53136DE4476E6D502BD31CF65669699D2D69E4DD2ACC0F3AEE9D07DDA2634059AD1B38C6F08D77D2D91882E1FED1FF440A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .t....................t......i~...U.S. .$...m.g.a. .e.u.r.o...R.u.s.o.n.g. .r.u.b.l.e...D.o.l.y.a.r. .s.a. .U.S...d.o.l.y.a.r. .s.a. .U.S...H.a.p.o.n. .n.g.a. .y.e.n...H.a.p.o.n. .n.g.a. .Y.e.n...I.n.t.s.i.k. .n.g. .y.u.a.n...R.u.p.e.e. .s.a. .I.n.d.i.a...d.o.l.y.a.r.e.s. .s.a. .U.S...I.n.t.s.i.k. .n.g.a. .Y.u.a.n...M.g.a. .r.u.p.e.e. .s.a. .I.n.d.i.a...I.n.g.l.a.t.e.r.a. .n.g.a. .l.i.b.r.a...I.n.g.l.a.t.e.r.a. .n.g.a. .L.i.b.r.a...................h...\.*...........................u...........W.....o...................................s.z...........................................................................W.........+.....o...............................................W.........+...o......P...P...P...P...P...P...P...P...P............... ...P... ...P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):21588
      Entropy (8bit):4.913817114459423
      Encrypted:false
      SSDEEP:384:o9x5StOwB5wgb/gz4cIVJBgDN2JCs7jcbyCIdp1lirywHmH:v08o+W4177Cw0+wq
      MD5:BA80ED1E570C9C651412B84777A74747
      SHA1:20598C7CE0B9A6C0A1DEA1C99D62814AA1D33936
      SHA-256:2D35976B2F18F380691F41C9E5C9D8C7464BF1FB748C401BBBEBE2CDD3C1D31F
      SHA-512:6B0B9C66A9B7E3A2CB3911F4B765904FAD77D45615877A9BE049375E42BACBE211B9652BA02BF06FB115A94541D3D95197F76F8516882B1A97F8B25D03D1380D
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .KQ.........................i~...E.C.U...E.M.U...S.D.R...G.u.l.d...S...l.v...I.r.s.k. .p.u.n.d...T.y.s.k. .m.a.r.k...F.A.E.-.d.i.r.h.a.m...F.i.n.s.k. .m.a.r.k...I.r.s.k.e. .p.u.n.d...T.y.s.k.e. .m.a.r.k...L.e.t.t.i.s.k. .l.a.t...r.u.m...n.s.k. .l.e.u...F.i.n.s.k.e. .m.a.r.k...E.s.t.i.s.k. .k.r.o.o.n...F.r.a.n.s.k. .f.r.a.n.c...M.a.l.i.s.k. .f.r.a.n.c...i.n.d.i.s.k. .r.u.p.e.e...t.y.r.k.i.s.k. .l.i.r.a.....s.t.t.y.s.k. .m.a.r.k...G.r...s.k. .d.r.a.k.m.e...c.u.b.a.n.s.k. .p.e.s.o...r.u.m...n.s.k.e. .l.e.i...B.e.l.g.i.s.k. .f.r.a.n.c...I.s.r.a.e.l.s.k. .p.u.n.d...L.e.t.t.i.s.k. .r.u.b.e.l...m.o.l.d.o.v.i.s.k. .l.e.u...v.a.n.u.a.i.s.k. .v.a.t.u...E.s.t.i.s.k.e. .k.r.o.o.n...G.r...s.k. .d.r.a.k.m.e.r...L.e.t.t.i.s.k.e. .l.a.t.s...M.a.l.i.s.k.e. .f.r.a.n.c...S.p.a.n.s.k. .p.e.s.e.t.a...t.y.r.k.i.s.k.e. .l.i.r.a...u.k.e.n.d.t. .v.a.l.u.t.a.....s.t.t.y.s.k.e. .m.a.r.k...s.c.h.w.e.i.z.e.r.f.r.a.n.c...B.u.r.m.e.s.i.s.k. .k.y.a.t...G.u.i.n.e.a.n.s.k. .s.y.l.i.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):3.309432036254817
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQwl0t8ts/jbr9SIalk/XllQ/kF:SvDut8Sjbr9SIrf4kF
      MD5:480B302B096BBBE6CD67C93DDC98F945
      SHA1:5328D6007054F6D0B727DBB886BFD1BB9BD6EA78
      SHA-256:671A55A822B1D2D1F56D2E86D98EEF4106FE7CC107B42F31E0B5A9163859437B
      SHA-512:5C26E8352BD63CA0900CD634DD4A3EDB22E66F2DAC8A9B161EA3B9FA890932D9FDF3A581BF7056870C516A9CEBC50958E9FA56AC22F68ED0983D58C678205035
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~.....&.h.................... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):824
      Entropy (8bit):4.816512518857309
      Encrypted:false
      SSDEEP:24:jLCsLCV+pmdaf7GtwxG9Mg+M/nXHXHCXnE4T:jpLq+rfG9MgVf33CXE4T
      MD5:DA2FA9DC69B9D0979A67B83B05FFDA67
      SHA1:1DF72F24492345C85D60517BFDE6510CF609F907
      SHA-256:3EFF5FFE90F37E814B839016C729F94BAD790BDB1D9D18817BADAEC4DB3407BD
      SHA-512:7E1FE92C575D2841CAE95AE8F311F8E2861CAE59DBE0525407ECE7BA80A534A0DDE808944ED4E53CF862364B340E326695288EF02E5B0125A5BA8CE3AB862083
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..h.............:.......X....i~........8....`U.....8..z.....~..8.....9........f.+.....g...j.,9........n.X&........b..&..............\.=...&.U...r.....*...................;9....m.....J9.................&.....&.....{...........&.."..{....Y9....PU...........'..........,............U...........9....9......U.....'.....8..v. U..w..{.................U.........`hJ.`....v..`.5.`.......`.h.`.......`...`.......`.#.`.......`...`:.....'.C.G.c.s.w.{...........................+./.;._.c.o.s.{.............................#./.3.;.K.c.k.o...............X..............................................."...%...(...+.......1...4...7...:...=...@...C...F...I...L...O...R...U...[...X...[...^...a...d...g...j...m...p...s...v...y...|.......^...a...d...............................g...................j.. ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):3.4062153517900993
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQ4l/3Ncml9br9+laXF:Svvl/rl9br9+lwF
      MD5:66C886025C39619832DE32CBBB59C320
      SHA1:44C1F5D3E24FD31CF1BF16A57D1E85E39B1A25E9
      SHA-256:B3DABA8E86AB757A149C8E0CF1DA466978447DD909D448B3D2C60A26A50516F5
      SHA-512:24FC8BF2AF7619D30C4166C009B9184B5A0E20ECF8DC65BAAD815A84D6D29D780A3B0FAC59A9DDF9FE866CEDF74E1C09DB8112868670F1288DD983EC3EE9E73D
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~...........7.......=.....X..`... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.212653166597381
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMohxlrr9Srm:SvTr9Am
      MD5:C2E9CF2310BD319B0614A1E34A018123
      SHA1:87D8CA6FDE7F41B372ECEF50697E05A516E04E87
      SHA-256:AB2E5AC853957BED7597A4879F1F589B909D1817747524D566D316EED84762EC
      SHA-512:420280371516D51B3EB4EB58C3F387F3A7A492647D165EAA48448017CB619872BE0261175D9B4E49A02A77F7274585DE3372EED95E96B4DA4C564C1BF8953210
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.............................i~.....=...m...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):108
      Entropy (8bit):3.3360947400379724
      Encrypted:false
      SSDEEP:3:XCbVSm/tlNtls/slvl/CtUm59lQlvUJiotWFS:Sv1sEP65wlcJiA
      MD5:6DE443A230DAD8CE2BFBF7D149F0A3DB
      SHA1:71D6E1E95C1A9211A4B8FEF2B99FE16CFDFA78B8
      SHA-256:A135770CC31B84370915424ED197BE648AC2932C5705C83C4EE4684228F5FC56
      SHA-512:780EB1A30204932390AC442C12181D046FBDDB0A890FCABFE6297E31429CA325248251702216DA1B6CD8E5FE5BC8D7C14BB080AECA7F2D46A67D30A34386A778
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~...F.B.u...........G................ ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):3.3869845825593305
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQ7lMHc5/ar9kJl+lXF:SvMM3r9kr+xF
      MD5:8ADFE63A4EF2890A4683B0FD83BDC8F6
      SHA1:9848C61B5E1ABBC181DCAAC5684E8215303F5713
      SHA-256:6052AF439E8F9B8060E0BEAE1898F522DBA2F576D8312E8333FD18281DF0E2B0
      SHA-512:F4BD3C6CEFE2144F98E8CDE00D57C13726C82B6D1B50B69E3980159B8190413BB1EDC6BDE40B856B12B7F336660AA8C2C2EF9AD5B167FF1CAE7B30ACD1901436
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~...........K.......=.....X..`... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):132
      Entropy (8bit):3.7798152455379004
      Encrypted:false
      SSDEEP:3:XCbVSm/tldgl/cmlplpl/l/d9pnfFPv5Cg4mPPBlF5mfn:SvCl/lp39p3CSPBlKf
      MD5:5D286C21C4D15F50FED5F635140F2B82
      SHA1:BA2822324A9421DDFCF06E1B22F0B3EE0465CFF1
      SHA-256:4BD93820CBDFB828878E5F93A095C88AA28DA86C97156B356C64419182F8E409
      SHA-512:CE7D66521B69B847FF0787867B97939FBB162664D44742C5AC2888F2FD7DAAEBC547338D1B35DA814CC157D3988CDE324265A3A46DAC77BC51D99911E5947246
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .0....................0......i~....... Y......../...s............P..=.........X..`... ... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):3.360495279653912
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQgslll3NcX9br9iMQlXF:SvellSbr9iMQxF
      MD5:4B29BE91DC84E7F6AA49B4DA4C713352
      SHA1:8FF7934886BC6C413D73ED9346D0861FC727A593
      SHA-256:471E0EAA79EB884F8AD830AEE0E90DBB71D23333BFF6B75BBB81D2C07953992A
      SHA-512:D0341D781A179CBC793B461E09739F7B942486196174BA2CDD096C77B05D5214A4A1C8A4D8367C643AD72B047260F6A38F99FE62FD6341C27FF9E1F2FF685A38
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~...........'.......=.....X..`... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):3.424598104200448
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQmMHcvOar99WDqXF:Svbvnr9iAF
      MD5:4D60D12FDE7B39B06BEBA187E81F75E5
      SHA1:54F37C003820A5BE07BF3854027B5DDC2D1DFF57
      SHA-256:74DD8BC4EACBB1639CAB2A1937CAA8450985798B9D4AFFC74AAD0BCBFBA6B822
      SHA-512:B8AB2825F2224723C88B7F95A751F780B1BB3D25B528BAACABDCC4C6D393C5C75B49ED611977DD63BD1BBEED04B2D82495E693966E663F4D4EF7BDD6075BFEC5
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~...................=.....X..`... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):3.360495279653912
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQgslll3NcX9br9iMQlXF:SvellSbr9iMQxF
      MD5:4B29BE91DC84E7F6AA49B4DA4C713352
      SHA1:8FF7934886BC6C413D73ED9346D0861FC727A593
      SHA-256:471E0EAA79EB884F8AD830AEE0E90DBB71D23333BFF6B75BBB81D2C07953992A
      SHA-512:D0341D781A179CBC793B461E09739F7B942486196174BA2CDD096C77B05D5214A4A1C8A4D8367C643AD72B047260F6A38F99FE62FD6341C27FF9E1F2FF685A38
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~...........'.......=.....X..`... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):3.4062153517900993
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQ9lsfcfqlnr9Om+ElXF:SvC2nr9OmNxF
      MD5:819DCB2F55D6C2EAC0E11F7DB8CA73A0
      SHA1:759659B2A8F1686FB974EBF3B21D98C977E1AE80
      SHA-256:69AA0DB5BADBD481311E5346E0DC60C9518F579E8D96720CEAA0FFA12DD76869
      SHA-512:554DC94B82587E452967CE047F701B2C38DBBBE33309803446EB5CF5D2FE404B1445D33EEAC8E73F0BA8C36C706E90FED60D8580EE055B428317A35370852557
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .3_...................3_.....i~.......2_..........=.....X..`... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):244
      Entropy (8bit):3.8405147762768803
      Encrypted:false
      SSDEEP:6:SvDMKtwnr1pqMXn+lDopqMyl++lDopqMyl+i9XnAqX3EPBlO:SLMX+RFMuRFMy9XTHEbO
      MD5:19A24A4CCB8FCD68C5326FA45213036C
      SHA1:93EDE1CC01DF2F24966FEBE20AFE18364E912152
      SHA-256:83CD4BA3C9A6CFC7E610F2F2A39F8334CFC24D6DF152DB81BDBD773F675CFFD7
      SHA-512:7FFA3B70F684F1FD279D977CC1440F5A9546984CDEE92864C7E3B9C7E7034B6CC73453AFC20E4E22FB7F410FC69108C45E31FA37DA9AF427345662819474B2EA
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..Y.....5...5..........Y(....i~...S.t. .H.e.l.e.n.a. .P.o.u.n.d...S.t. .H.e.l.e.n.a. .p.o.u.n.d...S.t. .H.e.l.e.n.a. .p.o.u.n.d.s........Y.....Y.......Y.Y......2.....{.....5..P8..P..=.........X..`(.. *.. ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):132
      Entropy (8bit):3.748616647997833
      Encrypted:false
      SSDEEP:3:XCbVSm/tlw8+mlplplqlOm9bnTVGa9c0uqqeg4mPPBlF5uf:Svgsp+cm9bBGa93BSPBlSf
      MD5:0F8AF8AFB2EB884C5B3F64D61F543A65
      SHA1:9CBA67BF10742A50E14117FB13460A5B4E863FC1
      SHA-256:BE85546033229C488F2B5867D698B7784C34BC0E01FFE5BF5A6029A711ABE843
      SHA-512:52B8EB0956338068B7ECD501D169DD4729356FF4034AA5AE80FE8E34F62A31292A1D531F1A0C6B0E950F9844AA79A33E0DD21E3A4F61FB0B7719CC692CD107C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~.....\.Z.......c....................P..=.........X..`... ... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):3.375012347003209
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQq2/tNcoul9br93EXF:Svhm5u7br9eF
      MD5:2DE5D922F65B17331E3A9686C9016EB2
      SHA1:FEBC918CAB9ABCAEB9A56B1CB19097840164CD4B
      SHA-256:37FB4759AC2A243D5A496F89ED01434261F009AF131D7BCF3F1FE321CD30E1F9
      SHA-512:15A3C4C15D82F0D2463B5AC8066EB3319F18D07BCC9514B807FD3B7D34DF31E99913E48FBCB2AB97350554E8B82D4D381780C0ADB248946DE739A48C8B5CE1E0
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..X....................X.....i~.....F..X..........=.....X..`... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):3.36775381332856
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQn2lll3NcRq9br9hvSXF:SvFl/39br9hwF
      MD5:9DEDE71A7BA5D19B8E38F49D57C7A61C
      SHA1:BA138185D4C22786931D18CA8A26A47B5B0EC4BC
      SHA-256:94F002D9121FF120FED40933720C76CC0DB5360EE1FB53AD4F0CBAB81F715D47
      SHA-512:528E2AAAAC5F7532A5EABD8626A1EF06B7DFD287BB951D691BF509F3F1B15BB816C03AE8E3FA9A6A4C3C8007BA34CB415CAE767B44B281B591377CDC4203852B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..~....................~.....i~........~..........=.....X..`... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.212653166597381
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMohxlrr9SF:SvTr9y
      MD5:43351F1786026F7875F9B7FD7E906670
      SHA1:D0EF80B1795FDBB1C1DC1CDF45A1574301DC9A3B
      SHA-256:40747E88F5C7C216DD4F4EBE5034AC39E2DFC8F4DE75E2DDA34644C3F669B043
      SHA-512:1EAFA0352F0559F3E97A98924E30C7B29994C3CBCE02F435E650BEA424DD5A89DF09BF6D08CFF19CECC32AD126BBACC15B8A36F4B63939DF4EA2B816B0C6FAE4
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.............................i~.....=...X...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):132
      Entropy (8bit):3.748616647997833
      Encrypted:false
      SSDEEP:3:XCbVSm/tlw8+mlplplqlOm9bnTVGa9c0uqqeg4mPPBlF5uf:Svgsp+cm9bBGa93BSPBlSf
      MD5:0F8AF8AFB2EB884C5B3F64D61F543A65
      SHA1:9CBA67BF10742A50E14117FB13460A5B4E863FC1
      SHA-256:BE85546033229C488F2B5867D698B7784C34BC0E01FFE5BF5A6029A711ABE843
      SHA-512:52B8EB0956338068B7ECD501D169DD4729356FF4034AA5AE80FE8E34F62A31292A1D531F1A0C6B0E950F9844AA79A33E0DD21E3A4F61FB0B7719CC692CD107C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~.....\.Z.......c....................P..=.........X..`... ... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):3.4438288734312166
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQAcCnr96gX+lXF:SvBnr96gXwF
      MD5:8ACE823D7120F17D44DC8087C868375D
      SHA1:249F56849ACF7729A97E12BDD10BBABDBCEBFADB
      SHA-256:9AA37AEE2850A9441912D00F6E616F8D43D2BE529DEEE2C2C55C847B84A29942
      SHA-512:1278EA7F6111524137ED7EFEC7AEC3AE6655F695590EDCBEDA6CA15D879F029867D9C74233BA155676490429982C072A73C02A8294F431235FEB57E1D182BA84
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .K....................K......i~.......J...#.......=.....X..`... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):3.394243116233978
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQQscEar9EksaXF:Sv+ar9EkswF
      MD5:BA94F370052DB09825F99DC21C13A818
      SHA1:F7BC0A8C9635D066FAE0115788DDE43DA3ACDC33
      SHA-256:7E1293C620A4A3D213DE5E1DC26A96A20220D67089F44560FD7BF4427A53B647
      SHA-512:23CF1673391B14881EFFA4E64E5F8E50B708371B94702EC5A47275BF74B4E969CA1F0C096CC3A1125CBF3AC8A146846C44EAD4B0629C693DFC8B83AE0199E97A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .y....................y......i~.....).x...........=.....X..`... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):88
      Entropy (8bit):2.683594117260545
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlKelBjlgljl/daAOklr:SBtkJTl4Pokx
      MD5:30216BD52DB9E5F6903C7D289F9EA3CF
      SHA1:32764706890683BDD4418636CFCDFFA3441E0F2F
      SHA-256:C7A5FC96F44A5F07D49ABC3329850B4F96F009A155841DEF1608458ECDF8DE25
      SHA-512:86FCBF850BFC0BAC769B0BFC0D52D55D1AD4EED7FCDCE22E01603479FC263CDAF2D81066165E2B7654035862569D51C4E538723844713EB2DEF30A45CA428CDC
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.............................i~...e.n._.V.U.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.212653166597381
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMNsbxlH/d9SrJin:SvUu/d9Asn
      MD5:B47E9660FE30618F88039419C8475F23
      SHA1:7F17666DC08D5983D42E4845520CA1CBC4088338
      SHA-256:7333C0831AC0A4C4D05C97BC62933652EDDA4990B3DB1639F12667FC667CDE3E
      SHA-512:950310ACF817E4C35725969FFDD8D30B358806C1B0C992BA01710EFE2F032C48DE7AB5238904363AF8F49C5DE864BA7367C3A1AE222A29B57C5F5AFEA51B729E
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.............................i~.....=...m...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):3.424598104200448
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQmMHcvOar99WDqz:Svbvnr9iS
      MD5:05C3D8C04759ADEECBAD23C2BDFB0F38
      SHA1:391DFDB927C9E899D03E36E4194CCCCA7BA0A49C
      SHA-256:6B1389234982B98E25ECEDDF46CDEE506D0CF54262C4A939708642C6B1D7126D
      SHA-512:46129707EC0BE21605331CF8356F7D744548E21F9199B8D0F4986916EABD9BB41365022FD54747E6655C1424AD2BE53503E2382FA5027F350D92993DCCEB463E
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~...................=.....X..`... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):3.424598104200448
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQmMHcvOar99WDqdn:Svbvnr9io
      MD5:B883698CF77CDB996E857F341B1C9BA1
      SHA1:CD942555047C2BDEA5D6184C02FD9A32490A17F9
      SHA-256:DA890EC860D17697A5617E9A5C14FC440C3B2F09B676A55CA0D9E6A0C3470777
      SHA-512:AF5CAA818857C18DFE92AF5F3E150BCD9B2CB6E93623C4785826936F0FEC440AC58BBEB1EFF3ACC3F2C6BAD46D37670422EF9D738E1AB61605744F8585AAFA14
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~...................=.....X..`... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):112
      Entropy (8bit):3.559288179865805
      Encrypted:false
      SSDEEP:3:XCbVSm/tlr6slzbmxrVNlQlomluYS:SvGsluxrVIomm
      MD5:726CEF86D8C1B011252C5A66A94BA04E
      SHA1:D1EC906BEF4E91022BEC578868CC45668BC8E739
      SHA-256:DF8AE86A8D5419C01E79CC462744E59AE4C49EAE6E4644D1BFEF6B5E32AC87B2
      SHA-512:403E51D974D5736494B105A3F1FA2E0FF1500A2CFB39D8D9C0FD31009B553DE19522CA9A17FA61FE5B21DDBCB1137202090BAF6621F579A8F394F5BE22485445
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~.........l..`...`..........=.....X..`... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):3.375012347003209
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQuslltNcRcMbr9yDklAll1Sz:SvsltMbr9QkilI
      MD5:FB4EA48950E7CC41BD80093DAC47DA67
      SHA1:5BB6736C1A64ACBBADCC4BA5C90BC0728D75AE2C
      SHA-256:0271DAD13365259EB62E45A6256F72A7066202FFD4C2918EF1CBAD3666CDEE4C
      SHA-512:E22A79683B03A57AE09EC7D7853DBA93D89E659649EFC33366418C2922BF478745F4C5C2FBDF3C989BDF334E41A22A5AD6A81AA730468798FD0F40A88A3856DF
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .1f...................1f.....i~.......0f..........=.....X..`... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.212653166597381
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMNsbxlH/d9SL:SvUu/d94
      MD5:D6186AF2D25663529A1670149401C51A
      SHA1:CC73AAA889E5F7DA2FCED52A80448C64C5756A9D
      SHA-256:C3DD2043CDD9A4430624CF43FE1D7C65938E1A6D029ED3EE2632796A8D4ABB5A
      SHA-512:C94E2E44C785414BF4894CAECE699225411498CAC344F761A8A047A4F82C15BD26D9F78834D515264805ED6454BCB3EF05E7E622E241F2E2C9678CDD0376CE31
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.............................i~.....=...X...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):3.4412840416380397
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQa2/tNc4ul9br9PsnEsliFqle:SvRmJu7br9PsXIH
      MD5:27B69829128A9AEA476CE90876BECA03
      SHA1:8208E75E95D0CC4A2035BC668C91B576B4562521
      SHA-256:13641991A8FB83034EA5D0FF316CBCF6281F0C28A7DAB5C5BCF5C883AC9352CC
      SHA-512:357D5D189F2540D7826C520C26228891967D46D4F8AE64EAD47C1EC4306CE05C4EB147A6A168043590BC98E6E9C4567B2E44E2476A771FD4A989A87BFDA28389
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..X....................X.....i~........X..........=.....m..`... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):3.4330652630584884
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQaCFcwutxr9orz:Sv5Crufr9o/
      MD5:12C3DF8B34F6047DC34F8A9CF0ECA3F6
      SHA1:795C14C238D93EA6A66DA60AFFDE3FB123397ED8
      SHA-256:BAE05A5C78161EA471EF68C780B785397BA658757C6EEB1F336844B3AD70D0B0
      SHA-512:D0F677BAFEF78B121F28CD6B82F9AA91AC47196886115A6D27F747FBE7F1F8E3E611E0C2F673F6D055C53628ED754EB9D1D4BDE169E67CDF4FFA2E1C86CF349B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~.....D.....;.......=.....X..`... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):3.424598104200448
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQmMHcvOar99WDqz:Svbvnr9iS
      MD5:05C3D8C04759ADEECBAD23C2BDFB0F38
      SHA1:391DFDB927C9E899D03E36E4194CCCCA7BA0A49C
      SHA-256:6B1389234982B98E25ECEDDF46CDEE506D0CF54262C4A939708642C6B1D7126D
      SHA-512:46129707EC0BE21605331CF8356F7D744548E21F9199B8D0F4986916EABD9BB41365022FD54747E6655C1424AD2BE53503E2382FA5027F350D92993DCCEB463E
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~...................=.....X..`... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):112
      Entropy (8bit):3.477119983253645
      Encrypted:false
      SSDEEP:3:XCbVSm/tlfFzbiMXpreNQPsihMYVS:SvVXpKN9BYo
      MD5:36BCDBB7F2D4F58E9B7401E1F1384F9D
      SHA1:2A18EB208FE57FFEA76980870D325DE35E6926E6
      SHA-256:283CCD85A7189582FA49525D1C8F066B0596DE4BF24E1D9772206FEF06804064
      SHA-512:E477A781AA3FE20F274791DD67868920A3B5B49930AE7BD891350E2C2D341F45156DE2A46E296EF69B1ECF2E7D3A8FECF4645D347F2F7FDEAC39114E36641B3F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .i;...................i;.....i~...V.T.....j;h;............=.....X..`... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):3.4485425753126884
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQL/tNch9br9Qkl5/slz:Sv4Sbr9j5EF
      MD5:62E083A9E3C1BACD700A6095B3A14810
      SHA1:E3B3CE33AE8DC6F6F5BD38BB4836B3B4300417D7
      SHA-256:5FAC493F3A9915B55444A4943A346A8A1AEF6604AC3F104BEBBA498BB040F050
      SHA-512:729FBBE9264445DD32DA3C3F21A06A60481AB4363469B4527496BDD9184E909615F5472284C85C1BA47633E5E851DEFB51DD95F9701EEA2F1DEC9D0EFC676276
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..(....................(.....i~.....n..(..........=.....X..`... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):3.405367334969678
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQxNcL7br9D/slz:Svz7br9DEF
      MD5:5DDA0B8154CBC304A15D4F511F049B3A
      SHA1:591C8A22B0328F5A5052CCF6ED1C818E258CC3AE
      SHA-256:81029AA2C6FE3B71B79E3CC25D826A0FF11778E58F53C2CF7B278ED9816B4EB4
      SHA-512:E38D104DA53639A1299D752FC52AA7D5E0F896EA33DB4C86CFA80466F8C09B2C04BFCF02FBCD9285DCC3EE7B43B5BBD03C49A04827B243D121F7C225893AEC57
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..~....................~.....i~.....l..~..........=.....X..`... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):132
      Entropy (8bit):3.7970284625854323
      Encrypted:false
      SSDEEP:3:XCbVSm/tlVmtcmlplplTlr93ldkwll1hl73l7jDAslF:Sv8tlp993lmw9zDlMEF
      MD5:3CAA273CCC454EE69A3C91F94E11C29E
      SHA1:24A54C7DBDC89A6DB85BCC2C959E3131C21A1281
      SHA-256:A28EA23FC85CAE42EACA4678CF0342A038FF39CCCDFC65FA6B7AB0CCB7ECEFFA
      SHA-512:6C2625B29651E4B240E111B5095F49706C7C110DAC6CB8EE3CA39D02A5AF6818C6D7F6BA5D17F0A6B7CC52619017B927A8A308C47C8398E0A75EA8359039D328
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~........8..........~...#.o.............=........._..`... ...P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):120
      Entropy (8bit):3.7082150446225457
      Encrypted:false
      SSDEEP:3:XCbVSm/tlEFutrpll8lC19VkkXUBl1hlaY1ozS:Sv8utGlC19OkXU5zaY1
      MD5:5F1014D7784FE3BFA8417EA8D7B4C247
      SHA1:E22EB6BFFB5CCF95989E4982AEC7F02F009CAD19
      SHA-256:24F545236E1C6BF5D62A7C62C194BE99AD7D4EBCF3C5681B5FC864A2EADD3172
      SHA-512:166B8F926FDD69F9F73E27FE75151E1CFA0270C939FEA7A05DF1F325976A17BBEE51EF21DD49B74DC0B0481644FF9B2E1907A0EC637CEE16255E1DCB8AA95056
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~.....f..U..........o.............=....._..`... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):3.4485425753126884
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQUt9cWlnr93sKk9SAp:SvDt95r93I1
      MD5:35371BB3EBCAE55EC196350C1C608F4A
      SHA1:1BB4EE0D26E57059FCC5D32B5A114753B480921D
      SHA-256:33301B54393153E40A050A5819DCAD5078D4B4AE9EB7E1CA906E7B05F0DF1D23
      SHA-512:C4159219F10DC6FD4ADED5F194A5EF1BB7FDA7ADB508F063D989A52DAF51C5F6B47C737547B7BFC665456E478B5175F4A7AC1BC17A22F0F31487A4DCEF8AE320
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~...........o.......=....._..`... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):164
      Entropy (8bit):3.8935098827237504
      Encrypted:false
      SSDEEP:3:XCbVSm/tlErzmxrOZWpAlWllllK6BnoIF7nF5Y8q3x4k5w2lM9slF:SvamxrppAMPK6aIit3bah9EF
      MD5:7CD5AA960C6BFB7C8FFF96CD2D315564
      SHA1:F14D9F0E0454A6CAEB6D4D2EB20E5DF4D6FCBC63
      SHA-256:F48A782BF243A05698C41EBDCACCA858262DAD9A17761D740756AC69406E0CD2
      SHA-512:BE9283EA427E4F9C0F7FFEDE8F2A537918BDF8DFA9E434B703DEBDDE98CFCCBD6FA98DD3B1835E255BEC85DA616718325F33EABF6A2E8B51B3736D34A1167BCA
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........!...!................i~...q.u.e.t.z.a.l.e.s.....L.....................................P..=........._..`... ... ...P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):3.4438288734312166
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQcmtNceeOMbr9EpqAp:Svzmr/Mbr9Et
      MD5:A5C60D56F43207237479BE610F5BE0CF
      SHA1:1AB7587C63ADCAFEA047ECFBE6C377019D41053C
      SHA-256:A56D216132D5352D4A1012A54C73DC18783EB2DEE6FDB425D6223B232A003875
      SHA-512:A6F25D17150EC39A9A55E50E44FF1772E34B581B55008C3C740B13F1E4086315B1DFD5039D52922F1A613A2A2B03FFC5915C37A0C4195FF3E6923F6B70F50673
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~...................=....._..`... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):112
      Entropy (8bit):3.4168084876986144
      Encrypted:false
      SSDEEP:3:XCbVSm/tlCextbxrsS3hY1ohXF:SvSexLYc
      MD5:6F4C386E2317A667B4C3EF5CFD97D309
      SHA1:1AD06427484402B86ACB7EAA010ACBD9F52FD337
      SHA-256:7B5820ADEEEF375B97F582BC21A64B4B804CD1BD9220F6A0E263C54BEB4C9CF8
      SHA-512:82AD316C884980798B73F4E7C6DA2F81BB7E201E8FFB54F8DBA103C705EED2B0905DA619ACCF36D8233CD2DFE6FE1E39ED66C1963505117CA07702EC59F03AB8
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .4~...................4~.....i~...S./.....5~3~............=....._..`... ~..`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):512
      Entropy (8bit):4.772456815902694
      Encrypted:false
      SSDEEP:12:7RJOmy5z+8sc+8s+IGzIVIcm2ZsOI27kAvH3rNBF:emk+Vc+V+Zsmqxr3rNz
      MD5:0826A2157AE706C4A6A968E592F14FB2
      SHA1:BC8A32BD1C15429DA3E1ED6CA5603F85933AFD36
      SHA-256:D56C9F54B84F30BB7ACD65DABB8D2EEA8A835A48AE4C0394CCAF73E9799C44B0
      SHA-512:6454ADB3FB79C677134946E2866BC5B8CA68C6046BFA2C07DF8B8E2B5590AC18E204C4243DE66DC9FACE666E8AC49EB129BD597401228DB993FBFBADF1C15E76
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................p.. .|S.....x...x...........J....i~...b.a.t...b.a.t.s...f.r.a.n.c.o. .C.F.A. .d.e. ...f.r.i.c.a. .c.e.n.t.r.a.l...f.r.a.n.c.o.s. .C.F.A. .d.e. ...f.r.i.c.a. .c.e.n.t.r.a.l........8........N...........Z.................2.........+.7.{.\..%\.\.,......'.................................................6..`.L.`....+...3.?.o.w.....E...H...K...N...Q...T...W...Z...J............S.`.S.`.........L.`{S.`........3.?.w.......h..Pk..Pp..Ps..Px..P}..P[.. _.. ..=........._..`M.. ]..Pc.. ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):27996
      Entropy (8bit):4.614504697030006
      Encrypted:false
      SSDEEP:384:JixwghJkN9+1vaogHqIKFhHUj7Wet0OueGyINABb0en3dMN/0DJaJo+mKCFsoGsQ:Jl79yLH3uuAi7pPRpF+BvmSQ6866XMgn
      MD5:ED7C6D771A4BABCA93BC6422C1F35913
      SHA1:526ACC093266F03C969A4EBAF0820F06DAB18C18
      SHA-256:200A825E3A04F4870E89FE87396ED8D4F07D7886180E856D0AE4E2D4F52C7DF6
      SHA-512:B5701D0C817816C89B4489167AFF08DD2AAF9BBDE54B1857DCB30430AD6C7ED5E1F5259D44C45E199C2A38A5F81FD067E6B21863E34A003EFE3EEC896EACCF37
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................G.. ..b.....O...O...............i~.......e.k.......h...b.e...k.u.l.d...e.k.....d...e.u.r.o.t...T.a.i. .b.a.a.t...p.l.a.a.t.i.n.a...I.i.r.i. .n.a.e.l...L...t.i. .l.a.t.t...T.a.i. .b.a.a.t.i...L...t.i. .r.u.b.l.a...G.h.a.n.a. .s.e.d.i...H.a.i.t.i. .g.u.r.d...L.a.o.s.e. .k.i.i.p...L.e.e.d.u. .l.i.t.t...M.a.l.t.a. .l.i.i.r...M.a.l.t.a. .n.a.e.l...P.e.r.u.u. .s.o.l.l...S.o.o.m.e. .m.a.r.k...T...r.g.i. .l.i.i.r...U.S.A. .d.o.l.l.a.r...I.i.r.i. .n.a.e.l.a...L...t.i. .l.a.t.t.i...P.e.r.u.u. .i.n.t.i...p.a.l.l.a.a.d.i.u.m...B.i.r.m.a. .k.j.a.t.t...E.e.s.t.i. .k.r.o.o.n...H.i.i.n.a. .j...a.a.n...K.o.n.g.o. .f.r.a.n.k...K.u.u.b.a. .p.e.e.s.o...N.o.r.r.a. .k.r.o.o.n...P.o.o.l.a. .z.l.o.t.t...S.a.m.o.a. .t.a.a.l.a...S.....r.i.a. .n.a.e.l...T.a.a.n.i. .k.r.o.o.n...G.h.a.n.a. .s.e.d.i.t...G.u.i.n.e.a. .s.y.l.i...L.a.o.s.e. .k.i.i.p.i...L.e.e.d.u. .l.i.t.t.i...M.a.l.i. .f.r.a.n.k.i...M.a.l.t.a. .l.i.i.r.i...M.a.l.t.a. .n.a.e.l.a...P.e.r.u.u. .s.o.l.l.i...S.a.i.r.i. .z.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2956
      Entropy (8bit):4.406725586917464
      Encrypted:false
      SSDEEP:48:CnrX51pSqfDsOqQOzyLIi1qVkABdmg0rXNINLIsgl+EtrDVEb4DVCktMcocsdqdn:CnDNSiQfzyLIi1qVkABAtisQEtrDVEba
      MD5:EFC42652F7B90751789113B87FD388B1
      SHA1:223811661ABA35BFD654380275908215D7EF8366
      SHA-256:A921EF4BE3B6891E69ABD1196B4EBC7DA7BA6B66A9E52E236292735D6EA9ED38
      SHA-512:C96C038DF51F289EC0990E93B20B517FFAA5226DFC81259D58D1B874871097CC0EE8FA2BC522BF9477E34919C317A18BCC792D830C34D73D23B0E1D3C998243B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................:............i~...Y.r.....S...l.i. .y... .G.i.n.....D.i.n...r. .y... .L.i.b.....F.Y.l...K. .y... .S.u...s...R.u.p... .y... .M.o.r...s...T.z.e.d... .y... .G.a.n.....D.i.r...m. .y... .M.a.r...g...F.Y.l...K. .y... .K.o.n.g.o...L.o.t... .y... .L.e.s.o.t.....R.u.p... .y... .S.[.s.[...l...R.u.p... .y... .[...n.d...a...S.i.l...K. .y... .K.e.n.i.....Y.[...n. .y... .H.a.p.T...n...B...r. .y... .E.t.s.i...p.i.a...D.i.n...r. .y... .T.u.n.i.s.....D.o.l...r. .y... .K.a.n...d.a...D.o.l...r. .y... .N.a.m.i.b.....K.w.a.t.s.a. .y... .Z.a.m.b.....L...v.Y.l.Y. .y... .S.u.d...n...S.i.l...K. .y... .S.o.m.a.l.....D.a.l.a.s... .y... .G...m.b...a...D.i.n...r. .y... .A.l.e.h...r.....D.o.l...r. .y... .L.i.b...r.i.a...F.Y.l...K. .C.F.A. .(.B.E.A.C.)...F.Y.l...K. .y... .B.u.r.u.n.d.....F.Y.l...K. .y... .K.o.m...r.i.a...F.Y.l...K. .y... .R.u.w.a.n.d.....F.Y.l...K. .y... .d.z.i.b.u.t.....K.w.a.t.s.a. .y... .M.a.l.a.w.....N.....r.a. .y... .N.i.h...r.i.a...P...l... .
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.9159246284584364
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMcmt6E7lMUMbr+0mCn:Svwt6gmbrlmCn
      MD5:A60E02569784AC9D5C76E3021322C822
      SHA1:471960A6448F26BF0216F28F071E3860F1D6A271
      SHA-256:338496AD90DF4581131F024DD945F5D7455F0B9969EA0C924E9F1BC142083B18
      SHA-512:A2D57F8EFBE4E5D0B50FAF54C6C44CEECF0ADE4577872AF3CACE9DF64D1733A68325494694B03E3517877560BF12CC124F662AADDF8C1F68B97862E75FC0CEF2
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.............................i~.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):3.2245297862980866
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQBC8t9llUar9ctl7XllQ/x:Sv98sar9ctlz4x
      MD5:4A4E3D003D05BB8B278D0482597BFFC0
      SHA1:EF4D6632CB69E3D5ED90CD095966880CA30BC12F
      SHA-256:DABB9431C7A2E8250BE1B94B959ECA790C62490E5C5AB82CA5F0381940A491E0
      SHA-512:684EF0B3E3B83A81EF3DD71CFD1384D0FBD8EF842E69800D5B9DBDA0E6E38772068C4C756E576FD7CD72EB220BA01FDB535FA94A6C756D2B4C93E6C90465D6DB
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .%....................%......i~.....F.F.................... $..`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):3.2054117237913244
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQc8t8twUMbr9eFXllQ/gn:SvGt88br9y4g
      MD5:1E989F3CEB870F9ACE7CDB1C12459DA5
      SHA1:C78A750241DCB7EFE69760BF84347A0C68A101E5
      SHA-256:FB43E042B00EEC2D254953C37E777FE897084789DD9C3DED684D25402E419AEB
      SHA-512:ECBDC7549C704B5D8C2155497CA88B060F9681F909FB9C72AC7BC24127FEDDC299E07C2E5739A21CF25B23FD900C04DCFCBB3069E1418FAA4C5179B224E86D7B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~.....A...................... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.463875210299606
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/xr+yhll:SBtkJ1li6gml/xrjJ
      MD5:C64F71AE20060954B9E32C5B9DA51C65
      SHA1:1E33967C51E09874F6A1DE9A9C3539DB9CA82A63
      SHA-256:1F132CA885D786C508137E5A798DCA175FDD0D486A134931FCC3803DB934B735
      SHA-512:CAAAD60303A93E38E881D7FC3C711D7A52ACB59511A65BEE549193067F88B870BFF2DAEBDDFAE6D4ED366F93D3D7003EC5B0AC13890B9187F9A37D2BE8831D17
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.............................i~.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.897999040607968
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDklU8gl8l/dZmM9s0S:SBtkJYlU8g8l/dZmis0S
      MD5:18812932A15AD38E6B9A8F570566656B
      SHA1:405A965EA0765E855D77FE0C6EA7191E46CE23B7
      SHA-256:62C7A572C1EA458431FDC9F85585CE9113EE58B11A5340A7C567077BE20E9A0D
      SHA-512:4FFE48BF81A068FC2979A3A275263E1041C71F86D29EED05DC4CE79C81F42BF29D6B2837F7205DB0C4DEEF7EB8974E585EB405AD605E2EDCEA9B7F2F99286C46
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.............................i~...f.f._.L.a.t.n._.M.R...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.917999040607968
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDklU8gl8l/dZmMd6:SBtkJYlU8g8l/dZmz
      MD5:9C62F30A229149AC950F1786FB0D529A
      SHA1:1A2B897218A0E117C4688552FDA7DB0810979785
      SHA-256:623EB91E2BA74412CFBC5C2F849173566557BDCFB4E37C81CCEEDF058AA1025D
      SHA-512:DA73A2038E6D8A938FAF656EDB8301D21270573F3C299C523780A096B9D42821F8417988BC89811CE267A3B43D2B9B6A411D672130200DE44FE212D92B7CC30D
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.............................i~...f.f._.L.a.t.n._.S.N...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.463875210299606
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/xr+yhll:SBtkJ1li6gml/xrjJ
      MD5:C64F71AE20060954B9E32C5B9DA51C65
      SHA1:1E33967C51E09874F6A1DE9A9C3539DB9CA82A63
      SHA-256:1F132CA885D786C508137E5A798DCA175FDD0D486A134931FCC3803DB934B735
      SHA-512:CAAAD60303A93E38E881D7FC3C711D7A52ACB59511A65BEE549193067F88B870BFF2DAEBDDFAE6D4ED366F93D3D7003EC5B0AC13890B9187F9A37D2BE8831D17
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.............................i~.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):108
      Entropy (8bit):3.354613258556491
      Encrypted:false
      SSDEEP:3:XCbVSm/tlPllmslvl/etd5blHcd3WbS:Sv9/P25q7
      MD5:EDFDD366A4DFFAD79CFF45EF6FCFB82A
      SHA1:451163F2EBE883DE81408F6BBA915289B41BA064
      SHA-256:D364DA1D51DDB165BE99BD14E24A5FEF6F3D31DC9DB124A37EEE96A5AF81022F
      SHA-512:852B989E9F9CBEE6BC33D85545D0C199AC719B3DD905DD6AA02390142442957579CCE98D6DC350D31DDA70D5D72DCBB0EF06AC6E74AC9DDD025F302E40997653
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~...F.d.j............................ ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):3.2017664440253215
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQLt88tJlllxr95Ulaa/lllQ/e:SvU88Dfr9Klaat4e
      MD5:F8D80FD6868C07AF457898561E8F4C3F
      SHA1:AC8103B233797E1A85F5FB788E3082488FB589F3
      SHA-256:F42501F923C7700F356F3B652F854C6E2F464050FF83BBEDDFC359F5A02B1465
      SHA-512:FD5F4532C3DA8BA1340A7CB5E946D1DA126BDDA7D4F0EF11014A865B37B16FF6603A487DF2998E8BB8AB2693BBCC5CD4B4BF2EFF7BDCAAAAE5A3D7A40FD86F4C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ...........................i~........................... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):3.320723765282722
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQQC8t8llxr9I/lllQ/e:SvnC8S/xr9I/l4e
      MD5:9B935877F813A2158ECC72B3081D68E0
      SHA1:74F80FE301B832599BB9CB2C6F6D4BD364B45FAB
      SHA-256:764184F3C340EA43C47DBCCD57EC8B19CAA26716E9357ACF537D701828C11E23
      SHA-512:F3EE16A8A81EDA40C58298D56BC54AD542E36FDAAACC13A7BE1FBC960D1FEA073BC05F632E598693FC0A90C6B347DA2DCA45347A03F7EBC5595F96152C4AFD01
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..J....................J.....i~........J..;................ ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):116
      Entropy (8bit):3.518319734704497
      Encrypted:false
      SSDEEP:3:XCbVSm/tlEF1WyX9B/foEPPk/rlt/WbS:Sv8wyX9uEU/x7
      MD5:3719864E845355E3AC1AF00991891781
      SHA1:FD147748238B438580FFDCA88BE1CF56B77B90D4
      SHA-256:32F686CBD6DE7F4FF7DE32E9F27DF09C1AC6B8DF5CF3B83104A2D9A4310B19D6
      SHA-512:BE93B370190DC51B912E5003CFB621A1632BDACDC6902BE466C0E2765EEBAD593107CA1FA11AD3F3EA9FF888D33FEB5804DA044A1B265EFDAAEFDD8C25C60C9E
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~.......*J................................... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):3.305626015239453
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQ2lU8til5r9coclllQ/e:SvhlU8Al5r9coi4e
      MD5:A6F612B423C5B86E264AA30697698016
      SHA1:2E92ADD395C97940B342A4C838119CB26A379DDB
      SHA-256:F56D1903151E6996EACDA571FCAB55C0A3B2EE8AA47197E1FB830D621404B116
      SHA-512:2B2D995CF082B00A0B2FDE045C355B5E1ADAC2651B190D9400BFD0F356F8D4BBE8E3564DB1B115F4012AE82CD1F19BBACF38E9154EA642D2E63DF44C2A1C4E4D
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..<....................<.....i~.....S..<..K................ ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):108
      Entropy (8bit):3.3743856528799516
      Encrypted:false
      SSDEEP:3:XCbVSm/tlH/sE/slvl/vlrpzdk4hf/WbS:SvnEPFpC4v
      MD5:C63F4F940C5BFEAD79B829A247416BE8
      SHA1:4BDA3981C9AA407683E9117C9B5FAE57781659F3
      SHA-256:591276400E07155857ECE28AE494590F0AB31C4E4867819004B6A30A4F279872
      SHA-512:4130A1C0ED4A9F09366C343A243D250519ADEB75041DBB9CFC939E559B231BC0AED92D47E436A84CEBE42E6AA1CEABCCA951A6466DEEC7E8B760128F79573681
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .q@...................q@.....i~...V.T.....r@p@..................... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):18616
      Entropy (8bit):5.128650268642916
      Encrypted:false
      SSDEEP:384:SHvoffrbUTHBnCnTuNO8i/chcXXb20O3Cxkew6Fhg6V1VgLZBIg65jIBIgDhJ2+:i5qXL20nhX1VcIggAIgDP2+
      MD5:5AC492E2DA12C49E187FECB10F69A8DA
      SHA1:64E42D10D0643D5705B1BA67543B75ECED8D3C1D
      SHA-256:A114D1CA8A05317D6CDC1E66A52DDC67856F15AE479ED3A7F15EAC1914EF0C20
      SHA-512:98BDAB5C77713A1A82A5C9B9BA62C34EFC191FCED1D6EA0A3DFB93BB51ED56AE8D3A97372AC7AE547979EFD99F4A49DBA6FEC4FEE6D5F9244AB856EBBF0415A2
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..g.....&...&...(............i~...S.I.$...G.o.u.d...S.u.l.v.e.r...B.r.i.t.s. .p...n...I.e.r.s.k.e. .p...n...S.y.r.y.s.k. .p...n...C.y.p.r.y.s.k. .p...n...D...t.s.k.e. .m.a.r.k...M.a.l.t.e.e.s. .p...n...E.g.y.p.t.y.s.k. .p...n...G.u.i.n.e.s.e. .f.r.a.n.c...I.r.a.a.n.s.k.e. .r.i.a.l...I.s.r.a...l.y.s.k. .p...n...L.i.b.y.s.k.e. .d.i.n.a.r...O.m.a.a.n.s.k.e. .r.i.a.l...P.o.a.l.s.k.e. .z.l.o.t.y...D.e.e.n.s.k.e. .k.r.o.o.n...N.o.a.r.s.k.e. .k.r.o.o.n...B.e.l.g.y.s.k.e. .f.r.a.n.k...B.o.s.n.y.s.k.e. .d.i.n.a.r...G.e.o.r.g.y.s.k.e. .l.a.r.i...G.r.y.k.s.e. .d.r.a.c.h.m.e...K.i.r.g.i.z.y.s.k.e. .s.o.m...K.o.m.o.r.e.s.e. .f.r.a.n.k...K.r.o.a.t.y.s.k.e. .k.u.n.a...K.u.b.a.a.n.s.k.e. .p.e.s.o...L.i.b.a.n.e.e.s.k.e. .p...n...M.o.l.d.a.v.y.s.k.e. .l.e.u...P.e.r.u.a.a.n.s.k.e. .s.o.l...S.i.l.e.e.n.s.k.e. .p.e.s.o...S.w.e.e.d.s.k.e. .k.r.o.o.n...Y.s.l...n.s.k.e. .k.r.o.o.n...D.e.e.n.s.k.e. .k.r.o.n.e.n...N.o.a.r.s.k.e. .k.r.o.n.e.n...E.s.t.l...n.s.k.e. .k.r.o.o.n...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):19300
      Entropy (8bit):5.000586913903977
      Encrypted:false
      SSDEEP:384:BELRUwy6FqW5aSpszoLYsTrqk2rhMdrNHAkfAQ968lh/y4j4wLiBTyqrx5:wVpszUfAQI540w+B2qrx5
      MD5:82FFC675162421EEDB1B596B8E01CCAF
      SHA1:2FD40735088CF2E3369FC7ED0A622C3FA5F5AD1F
      SHA-256:7D654883517084A91A74FF12C31DFA634E14956F5AB057F6B37B4AA2DDE7A20A
      SHA-512:A374086DE168A47028AE98BE7491519739CA632184E2501EF729A9FC4700189001754A1B241E94A5A44864B52DADF8F5AFDD1E38842BE5E19A82461DBAE242C5
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..i..........................i~.....S...S.i.l.b.e.r...B.o.l.i.v.a.r...C.o.r.d.o.b.a...S.c.h.e.k.e.l...D.D.R.-.M.a.r.k...J.e.m.e.-.R.i.a.l...M.o.l.d.a.u.-.L...i...N...i.i. .Z.a.i.r.e...I.r.a.k.-.D.i.n.a.r...J.e.m.e.-.D.i.n.a.r...R.i.a.l. .O.m.a.n.i...U.A.E. .D.i.r.h.a.m...W.I.R.-.F.r.a.n.k.e...N...i.i. .D.i.n.a.r...N...i.e. .D.i.n.a.r...N...i.e. .Z.a.i.r.e...R.I.N.E.T.-.F.u.n.d.s...S.a.u.d.i.-.R.i.y.a.l...N...i.i. .K.w.a.n.z.a...N...i.e. .K.w.a.n.z.a...A.r.u.b.a. .F.l.o.r.i.n...K.o.m.o.r.e.-.F.r.a.n.c...T.e.s.c.h.t.w...h.r.i.g...A.l.t.i. .M.e.t.i.c.a.l...A.l.t.e. .M.e.t.i.c.a.l...Z.y.p.e.r.e.-.P.f.u.n.d...T.....t.s.c.h.i. .M.a.r.k...B.e.l.a.r.u.s.-.R.u.b.e.l...B.e.l.a.r.u.s. .R.u.b.e.l...F.i.d.s.c.h.i. .D.o.l.l.a.r...F.i.n.n.i.s.c.h.i. .M.a.r.k...I.n.d.i.s.c.h.i. .R.u.p.i.e...I.i.r.i.s.c.h.i. .P.f.u.n.d...M.a.l.i.s.c.h.i. .F.r.a.n.c...I.i.r.i.s.c.h.s. .P.f.u.n.d...L.e.t.t.i.s.c.h.i. .L.a.t.s...M.a.u.r.i.z.i.u.s.-.R.u.p.i.e...S.a.l.o.m.o.n.e.-.D.o.l.l.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):820
      Entropy (8bit):4.814630826299895
      Encrypted:false
      SSDEEP:12:qlFttOax2QZw0nzJJWUNxupOhjQXHmIXclwYZg4YgQYYw0YgwY4DfP:qvT92QdzJJWuxusg5M+hHXHcXHDn
      MD5:1392EA69A62CF00BA85CE95AB6EB8AB9
      SHA1:4C11C54D4042DE6114AD7D3A1EC4BE769E6C896B
      SHA-256:2BE1D03A372174CAE7B1A3FB840FD907DC3B386A36E4919E773F9C0C753E64BF
      SHA-512:BD0C8942F12D7DB14BCD278ED6C0FBB78D11862F2FDEE746793923091216AB54A0D4A5856672C393B576891B4FCA8FFDAEAAE210A060BA073D7674A39EEE1588
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..j.............9.......S....i~.......ez..........,...z.....~..z....i8.....z..f....j..........n......Z8..b.vz....pT........\.x...&..%..r.!z..*.0T....K8........".$...........@T.....8.... T.....z.....z...........T....Tz..".......PT.....z..........`T...........T..................................R......z..v.Cz..w.......2z.....z.......`.).`.......`$..`....v..`HJ.`.......`.j.`.......`.<.`.......`.#.`.......`;..`.......`.5.`9.....'.C.G.c.s.w.{...........................+./.;._.c.o.s.{...........................#./.3.;.K.c.k.o.............S...................................V..............."...%...(...+.......1...4...7...:...=...@...C...F...I...L...O...R...Y...U...X...[...^...a...d...g...j...m...p...s...v...y...\..._...b...|.......................e...h...................k.. ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.463875210299606
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/xr+yhll:SBtkJ1li6gml/xrjJ
      MD5:C64F71AE20060954B9E32C5B9DA51C65
      SHA1:1E33967C51E09874F6A1DE9A9C3539DB9CA82A63
      SHA-256:1F132CA885D786C508137E5A798DCA175FDD0D486A134931FCC3803DB934B735
      SHA-512:CAAAD60303A93E38E881D7FC3C711D7A52ACB59511A65BEE549193067F88B870BFF2DAEBDDFAE6D4ED366F93D3D7003EC5B0AC13890B9187F9A37D2BE8831D17
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.............................i~.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):10328
      Entropy (8bit):5.378216758722473
      Encrypted:false
      SSDEEP:192:3Kf0cw5YaCLA/By5ElFqp0H965qGRdzPIDubtA+NwLztfrXCXuNfF5F49gfXFX:3Kf4O3LApyKlFqp0d65vdzPIDmAuGrX3
      MD5:1C375201EF871D78B9AF4541FCFBAEB7
      SHA1:3F78A9335BB7B06FDB50D2F60524E004687464BF
      SHA-256:6262C801357F2F55A21099750B822A4FBE92F57AD61E9A24DBA67C514EC18BFD
      SHA-512:EF6FF223443F54D6D250E9020CFFC7BB4AD9117854C6132495B6AFEB6411DA7F92AE325E70053AC7F221053141BE7B3B5BA05EF9EE5C66DF2C10CA238E4C8EAF
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..(..........................i~...2.G...../.B.0.K...%.>... .,.9.$...!... ...>.0.M.......@.(.@. ./.B...(...+.<.?...@. .!.I.2.0.../...(.@. .0.?./.>.2...8...&.@. .0.?./.>.2...8...K..... .$.>.2.>...$...>...@. .0.B.,.2.....0.>.(.@. .0.?./.>.2.....(.>.!.>... .!.I.2.0.....<.$.0.@. .0.?./.>.2.....>.(.?./.(. .8.G.!.@.....K.....(. .*.>.....>...!.H.(.?.6. ...M.0.K.(...,.0...B.!.>. .!.I.2.0...,.9.>...>... .!.I.2.0.....?.8.M.0. .*.>.....!...5.(.A...$.B. .5.>.$.B...(.G.*.>.2.@. .0.A.*.....-.>.0.$.@./. .0.B.*.....2.G.8.K.%.K. .2.K...@.....M./.B.,.>... .*.G.8.K...../.>.(.@...<. .!.I.2.0...*.G.0.B.5.?./.(. .8.K.2...,.9.0.@.(.@. .&.?.(.>.0...,.M.0.B.(.G... .!.I.2.0...9.H.$.?./.>... ...0.M.!...(.G.*.>.2.@. .0.A.*./.>...[.C.F.P.]. .+.<.M.0.H.........%.?./.K.*.?./.(. .,.?.0.....H...,.?./.(. .!.2.>.8.@.....H...M.8.?...(. .*.G.8.K.....K.0...M...K. .&.?.0.9.......K.2.M.!.K.5.(. .2.?./.B...2.@.,.?./.>... .&.?.(.>.0...2.G.,.(.>.(.@. .*.>.....!...5.?./.$.(.>...@. .!.K.......8.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):24104
      Entropy (8bit):4.712237459846695
      Encrypted:false
      SSDEEP:384:VgdtirpPXIYuDvJ3cIPJ6LflILdNs5w+Be5wbNNAoiyBvdjQC/HyBvxuH:WarltaJ9//ae58NNhB1QCKBpW
      MD5:F1A01E4D112CCEC206A8D4B4487A9F3C
      SHA1:AA33CAE756D82EDAB0979F6DF594C74E009CBD33
      SHA-256:F2C01BF31365CDDE555E5A8916C157BD07300E9C2568D4A1CB1E705DF6DD290B
      SHA-512:3469C820F73402BB76990447954EAF725A98A197A844ECF677401925527A10AEC2325BED8EB1523D47CF97BAD30F4DF37B8B0627651DF69536AE9DBDB78583F3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................z.. .Ek.........................i~...e.u.r.a.j...e.u.r.o.w.......s.k.a. .k.r...n.a...C.F.P.-.f.r.a.n.k.a.j.......s.k.e. .k.r...n.y...d.a.n.s.k.a. .k.r...n.a...j.a.p.a.n.s.k.i. .y.e.n...k.u.b.a.s.k.i. .p.e.s.o...r.u.m.u.n.s.k.i. .l.e.u...u.z.b.e.k.s.k.i. .s.u.m...Z.A.E. .d.i.r.h.a.m.a.j...c.h.i.l.s.k.e. .p.e.s.a...d.a.n.s.k.e. .k.r...n.y...k.u.b.a.s.k.e. .p.e.s.a...m.e.x.i.s.k.e. .p.e.s.a...b.o.B.h.a.r.s.k.i. .l.e.w...m.o.l.d.a.w.s.k.i. .l.e.u...n.j.e.z.n.a.t.a. .m...n.a...a.w.e.d.s.k.a. .k.r...n.a...a.l.b.a.n.s.k.e. .l.e.k.i...i.r.a.n.s.k.e. .r.i.a.l.e...j.a.p.a.n.s.k.e. .y.e.n.y...l.a.o.s.k.e.j. .k.i.p.a.j...n.j.e.z.n.a.t.e. .m...n.y...o.m.a.n.s.k.e. .r.i.a.l.e...u.z.b.e.k.s.k.e. .s.u.m.y.......s.k.e.j. .k.r...n.j.e...a.w.e.d.s.k.e. .k.r...n.y...g.i.n.e.j.s.k.i. .f.r.a.n.k...g.u.y.a.n.s.k.i. .d.o.l.a.r...t.u.r.k.o.w.s.k.a. .l.i.r.a...a.r.m.e.n.s.k.e. .d.r.a.m.y...a.r.u.b.a.-.f.l.o.r.i.n.a.j...b.o.l.i.w.i.s.k.e. .p.e.s.a...b.o.B.h.a.r.s.k.e. .l.e.w.y...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):152
      Entropy (8bit):4.1638619626994275
      Encrypted:false
      SSDEEP:3:XCbVSm/tlEEl9c8mar2EK/quyUF9l9leLtj4ln1WJpQblNSn:Sv9xmarYLFH9sql1H6
      MD5:E99F8FE932619D1E5334493348CF1FAA
      SHA1:C8EDF32EE0C1355487DAD53962CDC89A1FB04BF2
      SHA-256:8B822DC2CBE588F01B5BEB687D94A357A6067B6642E5CCB11D5EE50FEE18FBCC
      SHA-512:4F6D3B3ED47671D0371BDC7B4135EA77620E7F8AE99F1D784AAE216314F0FA16F5B6DF68E1BB2F2BDC8CCD7DD20F5FC059A1326DD822DDED1847AFE6C9C59BC1
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~...I..... ............... .................................................. ...P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):84
      Entropy (8bit):2.629834328222692
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlZelgylslplglcmW+r:SBtkJQltWpglcm5r
      MD5:F32320EA5FE246573DD5431780C8E7D1
      SHA1:6A5690A8AFD89298CC72539969EFFAE2C28AC0D5
      SHA-256:A0D8434CF75D4905D038721A9A08BD937E892340D562066E635BE15B2732A47C
      SHA-512:54EC429700159CDD16565586F7B6608616C94B9A45934942DF424A21E2B68A1E0F73A799583D839C36467B4ED0F4A940CADE4CB0F892DFF5B676B36B479074B7
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.............................i~...i.d...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):836
      Entropy (8bit):4.807826091118605
      Encrypted:false
      SSDEEP:12:mlUNtOaxijlw0+CzJ1WUNxupJLjQXHm3XcfwYXg4YgQYYwS/YgwYYCS9lgAF:mE9i1+wJ1Wuxu/g+M4PHXHCXnCS/gAF
      MD5:F09BA6EC637887BF827CE42F664D181E
      SHA1:E8B2FB8468FE264361EC4A788641E06461A94764
      SHA-256:CD71CE1AFEB8C8186B7EFE0554748EE91D8F1B9CB38F8E7E96BA39BF29594523
      SHA-512:17A26D4186AAECAE49AE06F9A992580DD3A11A20DB5E22486F2B76A4ED192074CE6911CF920ACA84614EAFE758124C1BC9455282318C07B78CC8783FD8133573
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..j.............:.......U....i~.......ez..........,...z.....~..z....i8.....z..f....j..........n......Z8..b.vz....pT........\.x...&..%..r.!z..*.0T....K8..........$...........@T.....8.... T.....z....~............T....Tz..".......PT.....z..........`T...........z.....T..........................*.......R......z..v.Cz..w.......2z.....z.........`.).`.......`$..`....v..`HJ.`.......`.j.`.......`.<.`.......`.#.`.......`;..`.......`.5.`:.....'.C.G.c.s.w.{...........................+./.;._.c.o.s.{.............................#./.3.;.K.c.k.o...............U...................................X..............."...%...(...+.......1...4...7...:...=...@...C...F...I...L...O...R...[...U...X...[...^...a...d...g...j...m...p...s...v...y...|...^...a...d...........................g...j...................m.. ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2644
      Entropy (8bit):4.1913451471065
      Encrypted:false
      SSDEEP:48:TIcOuOQbkT7O/Mo95FCOpO5O6OM7fO+OR77bFlsrrgBrTG30yQxXnwML+H/Tg+Pi:TI4kEe8FpTG30ykXec+PHC
      MD5:FCC5634A046D061523B1265AC72CCA91
      SHA1:32D73C0D50A349BAB5B3A7024A3131F3868202D9
      SHA-256:1A3BAACABC8033A2818B2ECBB3043C39B1BD51343925147EEB48792D52CEF442
      SHA-512:9B76DC1AE8705E809EE84BE3EDA511AD31305C910BC0E0BE72E3FC0460A90CAE459419E044B0775F004364775C1A3FB3D138F7BB774E11EF12859C61B1484013
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................9.......3....i~...D.A...U.r.u...A.l.y.u.n...A.d.u.l.a.r. .W.D...A.l.i.l.a.n.g.i.n.i...A.b.i.r. .U.t.y.u.p.i...A.s.i.d.i. .A.c.a.n.i...A.d.i.n.a.r. .A.l.i.b.i...A.f.r.a.n.k. .A.s.w.i.s...A.f.r.a.n.k. .A.c.i.n.i...A.p.u.n.d. .A.g.l.i.z.i...A.p.u.n.d. .A.m.a.c.r.i...A.r.u.p.i. .A.h.e.n.d.i...A.c.i.l.i.n.g. .A.k.i.n.i...A.d.i.n.a.r. .A.t.u.n.s.i...A.k.w.a.c.a. .A.z.a.m.b.i...A.l.u.m.i. .A.l.i.z.u.m.i...A.p.u.n.d. .A.s.u.d.a.n.i...A.r.u.p.i. .A.m.u.r.i.s.i...A.r.y.a.l. .A.s.u.[.u.d.i...A.y.e.n. .A.j.a.p.p.u.n.i...A.d.a.l.a.s.i. .A.g.a.m.b.i...A.d.i.n.a.r. .A.z.z.a.y.r.i...A.d.u.l.a.r. .A.k.a.n.a.d.i...A.d.u.l.a.r. .A.l.i.b.i.r.i...A.d.u.l.a.r. .A.n.a.m.i.b.i...A.f.r.a.n.k. .A.j.i.b.u.t.i...A.k.w.a.c.a. .A.m.a.l.a.w.i...A.n.a.k.f.a. .I.r.i.t.i.r.i...A.n.a.y.r.a. .A.n.i.j.i.r.i...A.r.u.p.i. .A.s.e.y.c.i.l.i...A.r.y.a.r.i. .A.m.a.l.g.a.c...A.c.i.l.i.n.g. .A.w.g.a.n.d.i...A.c.i.l.i.n.g. .A.c.u.m.a.l.i...A.d.i.n.a.r. .A.b.a.%.r.i.n.i...A.f.r.a.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):1060
      Entropy (8bit):4.7221842930318525
      Encrypted:false
      SSDEEP:24:eZJ99kEMjDA3WkPsgUA8GQHraBJ7xuxhlusg5Mu60nioHKw1Yy4vN8:eZJ3kEMjk3WkPsEQHk9xClusg+u603Kk
      MD5:8EEE1A017181DBDB2F476DCDB3BAD06E
      SHA1:9D00AF947B0257F63EE7C73A147A586903D433BC
      SHA-256:59BE5709F034598424DFA7D0EDA9732CE8DF91BF15F4304D3A6F86570B9CDD64
      SHA-512:92FFE2B7BB52829E3D3011530B43D4EE7F64DE27965EF04845EC430EA46D19D34B1BE6E31B29F0D0B22AC24F5B5703EA324E2C11BD6A26F5E9AA0B8F6A82C19C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..j.............9............i~...V.a.u.n.d.i. .y.a. .M.i.s.i.l.i...V.a.i.n.d.i. .y.a. .S.u.d.a.n.i...S.i.l.i.n.g.i. .y.a. .U.g.a.n.d.a...S.i.l.i.n.g.i. .y.a. .S.o.m.a.l.i.a...S.i.l.i.n.g.i. .y.a. .T.a.n.z.a.n.i.a...V.a.i.n.d.i. .y.a. .S.a.n.t.a.h.e.l.e.n.a.......ez..........,...z.....~..z.....^.....z..f....j..........n..........b.vz....pT........\.x...&..%..r....*.0T....K8........".c...........@T.....8.... T.....z.....z...........T....Tz.."........~.....z..........`T...........................................v.Cz..w.......2z...............`.).`.......`$..`....v..`HJ.`.......`Kk.`.......`.j.`.......`.<.`.......`.#.`.......`7k.`.......`;..`.......`.5.`9.....'.C.G.c.s.w.{...........................+./.;._.c.o.s.{...........................#./.3.;.K.c.k.o.................r...u...x...{...~...................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):932
      Entropy (8bit):4.788982151830266
      Encrypted:false
      SSDEEP:12:+lEycUANa5Oax1Sjlw0+CzJfUNxupJLjQXHm3XcHQY/g4YgwYYQZqC9137F:+hNA0591S1+wJfuxu/g+MwnnXnaqCf7F
      MD5:20F7805D337BD52D7A12418CB764963E
      SHA1:414B34F58AB8DE66AD29539FDD305E3AA7EEEBE1
      SHA-256:939679C5B4476543E75D3CCCE43CAEF45B4C14BF2586939B6291DAA49FFE3BB6
      SHA-512:4103B49304C8AEE969ECC3511EB61AE85BE1E6B311784E7A1FC9C3B2AA586CB6DB918BD8BF75C704172664979F9E7D1565F85734891A56AFFB076C6DF670326F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..j.............:.......m....i~...S.a.r.a.f.u. .y.a. .C.h.i.j.a.p.a.n.i...D.i.r.h.a.m. .y.a. .F.a.l.m.e. .z.a. .C.h.i.a.r.a.b.u.......ez..........,...z.....~..z....i8.....z..f....j..........n......Z8..b.vz....pT........\.x...&..%..r.!z..*.0T....K8..........$...........@T.....8.... T.....z....~............T....Tz..".......PT.....z..........`T...........z.....T..........................*.......R......z..v.Cz..w.......2z.....z.........`.k.`.......`$..`....v..`HJ.`.......`.j.`.......`.<.`.......`.#.`.......`;..`.......`.5.`:.....'.C.G.c.s.w.{...........................+./.;._.c.o.s.{.............................#./.3.;.K.c.k.o...............m...1...4...7...:...=...@...C...F...p...I...L...O...R...U...X...[...^...a...d...g...j...m...p...s...v...y...|...........s...........................................................v...y...|...................................................... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):5008
      Entropy (8bit):4.886877793642687
      Encrypted:false
      SSDEEP:96:I9hgUnLJ5R/z6xYa+Joas55k23iLMGcZMGjJvLkl8a/kfudw1SbO5X3a7MF:IFz9aENdLgZFDkzZag0
      MD5:3F199424F472D4CAFF20AA10D70EC0C3
      SHA1:8B7FBC7B6282D5D59BA2EFFD389501B191BAD9E3
      SHA-256:21EB2C74131DE72B3A7A3A1A7CABEDD1BC8FC9904AB28FC04E71F93AB229665D
      SHA-512:CABF7A8F94C72200B764C2B4804E3B57D98D530A3D36F49C7D6C2DF58B828C654B0CF392283F4EEEE8CB40DBC0FF148F45364CC96C66CDC3AB59B85665A6CCE2
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~........ ..S.i.l.i...O.u.g.i.a...K.u.a.n.z.a...2...1...4.8...9...L.i.l.a.n.j.e.n.i...B.i.r. .e.t.i.o.p.i...I.u.a.n. .x.i.n.e.s...L.i.r.a. .t.u.r.k.u...D.i.n.a.r. .l.i.b.i.u...K.u.r.o.a. .s.u.e.k.u...D.o.l.a. .m.e.r.k.a.n.u...F.r.a.n.k.u. .s.u.i.s.u...I.e.n.i. .j.a.p.o.n.e.s...Z.l.o.t.y. .p.o.l.a.k.u...L.i.b.r.a. .e.j.i.p.s.i.u...L.i.b.r.a. .s.u.d.a.n.e.s...P.e.z.u. .m.e.x.i.k.a.n.u...R.u.p.i.a. .i.n.d.i.a.n.u...X.e.l.i.n. .k.e.n.i.a.n.u...B.a.h.t. .t.a.i.l.a.n.d.e.s...D.i.n.a.r. .a.r.j.e.l.i.n.u...D.i.r.e.n. .m.a.r.o.k.i.n.u...D.o.l.a. .k.a.n.a.d.i.a.n.u...D.o.l.a. .l.i.b.e.r.i.a.n.u...D.o.l.a. .n.a.m.i.b.i.a.n.u...F.r.a.n.k.u. .r.u.a.n.d.e.s...K.u.a.x.a. .z.a.m.b.i.a.n.u...K.u.r.o.a. .n.o.r.u.e.g.e.s...R.i.a.l. .b.r.a.z.i.l.e.r.u...L.o.t.i. .d.i. .L.e.z.o.t.u...D.i.n.a.r. .d.i. .B.a.r.a.i.n...D.i.n.a.r. .t.u.n.i.z.i.a.n.u...F.r.a.n.k.u. .b.o.r.u.n.d.e.s...F.r.a.n.k.u. .k.o.n.g.o.l.e.s...K.u.a.x.a. .d.i. .M.a.l.a.u.i...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):364
      Entropy (8bit):4.294839676088542
      Encrypted:false
      SSDEEP:6:SviaSSpfr98gF8Mzlh2NjNxklNXNLXVn+r4pwOVQXqxs8Lp4Xi6fXBFn:2SS78gVlhib+ZXo4agwYJSXi6fBFn
      MD5:AAC55F615221DA508B258FCD517BBA24
      SHA1:B942A5A847FBC777638DE99EE017905882A6AB81
      SHA-256:3B88AFE697D2A8D855FDD591800BE0C4AD03CCAAABF931451239771BCCDFC51F
      SHA-512:FDC03E9543757D6A3B4214BC2689BA234D39B467BCCB17B3DC75A027485FC8B90813E56F1B731ABABCB2F0D4B55A6D0AFBC2BD17CACF66FA0DADF6993CF2BC6F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................K.. ........S...S.........../....i~...................&...\...................................W.........+...o.......\.........................&...............................................W.........+...o.........................................W.........+...o...-..P0..P3..P6..P9..P<..P?..PB..PE..P............/.. ...P=.. H..P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2404
      Entropy (8bit):4.21439333941771
      Encrypted:false
      SSDEEP:48:bsOEqrA+YnU8F8EP5QwsknLT7A4jUi/i4GFoj2ridQzgVeWnnCn:bp9rA+gU8Fv513vBjbhGFoj2eFVeWCn
      MD5:AC9586A6D853904F6949275BD92C9A6A
      SHA1:F026ACAFC78522944C9AC217CB294DA608035A46
      SHA-256:7B40D21D049043F6AEF7BE0B9779FA00BB34653059DF800A9D26EB70BFEF52FA
      SHA-512:F4725F4D08DCB759FCB439E4060158D2854F4F2CEF0DFE93505A6DC6358EA6CE070298FC9858910A1BFC72D8CDA57B9AD30C67B788E34AB80C88596EC9FCE5E0
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................M.. ........Q...Q...:............i~...y.u.l.o...s.e.d.i. .y.a. .G.h.a.n.a...l.o.t.i. .y.a. .L.e.s.o.t.o...l.u.p.i.a. .y.a. .I.n.d.i.a...p.a.u.n.i. .y.a. .M.i.s.l.i...b.i.l. .y.a. .U.h.a.b.e.s.h.i...d.i.n.a.l.i. .y.a. .L.i.b.y.a...d.o.l.a. .y.a. .L.i.b.e.l.i.a...f.a.l.a.n.g.a. .y.a. .G.i.n.e...l.i.y.a.l. .y.a. .S.a.u.d.i.a...l.u.p.i.a. .y.a. .M.o.l.i.s.i...p.a.u.n.i. .y.a. .S.u.d.a.n.i...d.i.l.h.a.m. .y.a. .M.o.l.o.k.o...d.i.n.a.l.i. .y.a. .S.u.d.a.n.i...d.o.l.a. .y.a. .M.a.l.e.k.a.n.i...f.a.l.a.n.g.a. .y.a. .K.o.n.g.o...n.a.k.f.a. .y.a. .E.l.i.t.l.e.a...d.i.n.a.l.i. .y.a. .A.l.j.e.l.i.a...d.i.n.a.l.i. .y.a. .T.u.n.i.s.i.a...d.o.l.a. .y.a. .A.u.s.t.l.a.l.i.a...f.a.l.a.n.g.a. .y.a. .B.u.k.i.n.i...f.a.l.a.n.g.a. .y.a. .J.i.b.u.t.i...f.a.l.a.n.g.a. .y.a. .K.o.m.o.l.o...f.a.l.a.n.g.a. .y.a. .L.w.a.n.d.a...f.a.l.a.n.g.a. .y.a. .U.s.w.i.s.i...n.a.i.l.a. .y.a. .N.a.i.j.e.l.i.a...p.a.u.n.i. .y.a. .U.i.n.g.e.e.z.a...d.i.n.a.l.i. .y.a. .B.a.h.a.l.e.n.i...e.s.k.u.d.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):96
      Entropy (8bit):2.8008721598698436
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlu112lFvlslpl9lcmNIlh+T/+k:SBtkJK0lslL8mNIl0Ck
      MD5:9DD8151D818086771071512D5D9FF53F
      SHA1:AF9D1CA60F5409F23BA1BB9313C07D7EDA5450A1
      SHA-256:A93CC1B747B7EDD0A3D8EEC3E93B7B8DB002C0F761461233FC5EE403CE9BA983
      SHA-512:80C17F667BD2128E552E59738162AD142EECAC4A37140E7E7648E69084C072329CB26A21471F1E0FE1E4D1B8372A0C8069FC0342F23DFFCF94CCEDFAB9AA40F3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.............................i~...2...1...4.8...5.6.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2136
      Entropy (8bit):4.392005258298755
      Encrypted:false
      SSDEEP:48:ItKPgrqPYL1O9ebsttOuRID/Kl31fPW14CwlUUNl2TGQQ/gVQOYDm/1:XPgrqPYL1dbYO7KfxWUNoQ4VQOYU1
      MD5:A183C17F3D86F1A50A0ABAD447046767
      SHA1:AB019CA7552CEB0A2DA87827A426298827D945A3
      SHA-256:FE719F9605B06633985335ECCCE90086EF63114FACBFA688F6146B981377BA58
      SHA-512:2B5C4E0043808952593E56C4C32BFFC0DAAF5FAF51C54CEAC0EC0442180D95908F9C31F53091B56BC16A7F1546B3D192327352E8451A5195BAE94A5D663EDDE5
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .sl.............:.....f.|....i~...L.e.w.o.n.e...S.e.d.i. .e.y.. e.G.a.n.a...L.o.t.i. .e.y.. e.L.e.s.o.s.o...Y.e.n.i. .e.y.. e.J.a.p.a.n.i...B.i.i.r.u. .e.y.. E.s.y.o.p.y.a...D.o.o.l.a. .e.y.. e.K.a.n.a.d.a...F.a.r.a.n.g.a. .e.y.. e.G.i.n.i...K.w.a.n.z.a. .e.y.. A.n.g.o.l.a...D.a.l.a.s.i. .e.y.. e.G.a.m.b.y.a...D.i.n.a.a.l.i. .e.y.. e.L.i.b.y.a...D.o.o.l.a. .e.y.. e.L.i.b.e.r.y.a...F.a.r.a.n.g.a. .e.y.. e.K.o.n.g.o...S.i.l.i.n.g.i. .e.y.. e.K.e.n.y.a...D.o.o.l.a. .e.y.. e.N.a.m.i.b.i.y.a...F.a.r.a.n.g.a. .e.y.. e.K.o.m.o.r.o...P.a.w.u.n.d.i. .e.y.. e.M.i.s.i.r.i...P.u.l.a. .e.y.. e.B.o.t.i.s.w.a.n.a...R.u.p.i.y.a. .e.y.. e.B.u.y.i.n.d.i...D.i.n.a.a.l.i. .e.y.. A.l.i.g.e.r.y.a...F.a.r.a.n.g.a. .e.y.. e.J.j.i.b.u.t.i...F.a.r.a.n.g.a. .e.y.. e.b.u.r.u.n.d.i...N.a.k.i.f.a. .e.y.. E.r.i.t.u.r.e.y.a...P.a.w.u.n.d.i. .e.y.. e.S.u.d.a.a.n.i...D.i.n.a.a.l.i. .e.y.. e.B.a.a.r.e.e.n.i...D.o.o.l.a. .e.y.. A.w.u.s.i.t.u.r.e.l.y.a...P.a.w.u.n.d.i. .e.y.. e.B.u.n.g.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):1152
      Entropy (8bit):4.689701312866842
      Encrypted:false
      SSDEEP:24:JadneOOsz4RDMJ8rxeYtUUECUAmRdCJ1vXuxusg5MEn2Gsn:JadnEszsDMCrxBtJUHRgfPlsg+U2Go
      MD5:F7549BA4E2B54F0B20C5BA3ED9DADFDE
      SHA1:76EDFFE824583140DE9260FE557E44E584A64159
      SHA-256:AF88C435B7F8A71DAEFFD949AA22EA804C94B7EA6B48203D9AD80C575EDBB869
      SHA-512:CEB0D078053DDFE408A0A6EC38D50298B1CD9153DCEB38E73B3202C94A6528F2537652C4B6F20132597067A0BB979BC8B88AFF8EED81226764B707C7B608818B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..j.............9............i~...D.o.l.a...Y.e.n. .m.a.r. .J.a.p.a.n...S.e.d.i. .m.a.r. .G.h.a.n.a...D.o.l.a. .m.a.r. .K.a.n.a.d.a...P.a.u.n.d. .m.a.r. .M.i.s.r.i...D.o.l.a. .m.a.r. .L.i.b.e.r.i.a...S.i.l.i.n.g. .m.a.r. .K.e.n.y.a...B.i.r.r. .m.a.r. .E.t.h.i.o.p.i.a...P.u.l.a. .m.a.r. .B.o.t.s.w.a.n.a...P.a.u.n.i. .m.a.r. .U.i.n.g.e.r.e.z.a.......ez..........,...z..............z..f....j..........n..........b.vz........&.....r.!z..*.0T....K8........"....................8.... T.....z.....z...........T....Tz..".......PT.....z..........`T...........T..................................R.........v.Cz..w.......2z.....z.........`.).`....~..`fk.`.......`$..`.......`Tk.`....\..`xk.`....v..`HJ.`.......`.j.`.......`.<.`.......`.#.`.......`;..`.......`.5.`9.....'.C.G.c.s.w.{...........................+./.;._.c.o.s.{...........................#./.3.;.K.c.k.o.........................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):3176
      Entropy (8bit):4.059150453036504
      Encrypted:false
      SSDEEP:96:quxuRuW4u/uyukunLuuuEuNucusu9uRutuCuHux6ubuYWuYuujuhu2uSusuZuNui:quxuRuVu/uyukuLuuuEuNucusu9uRutF
      MD5:11579580FF3CF5452330D88EDA9EDCEB
      SHA1:A5EAEAD3D1F90889631FCDB0EACF4FE703DB62A2
      SHA-256:D120179E43075CE550A4E3C40BF69E578379FE494204301AA0BDA3DA6FDEE44B
      SHA-512:F6A139A1E6D1611947564C0919392401351C3295D55A65EADE888A1D9305F888D658BFC4C39D1AF7E4DB8A78608B2E6C3318E69F7BC98D536C5EDDFCB9A75CF8
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................9............i~...I.r.o.p.i.y.i.a.n... .e. .G.i.n.e...I.r.o.p.i.y.i.a.n... .e. .C.h.i.n.a...I.r.o.p.i.y.i.a.n... .e. .G.h.a.n.a...I.r.o.p.i.y.i.a.n... .e. .I.n.d.i.a...I.r.o.p.i.y.i.a.n... .e. .K.e.n.y.a...I.r.o.p.i.y.i.a.n... .e. .K.o.n.g.o...I.r.o.p.i.y.i.a.n... .e. .L.i.b.y.a...I.r.o.p.i.y.i.a.n... .e. .M.i.s.r.i...I.r.o.p.i.y.i.a.n... .e. .S.a.u.d.i...I.r.o.p.i.y.i.a.n... .e. .l.e.o.n.i...I.r.o.p.i.y.i.a.n... .e. .A.n.g.o.l.a...I.r.o.p.i.y.i.a.n... .e. .B.u.k.i.n.i...I.r.o.p.i.y.i.a.n... .e. .G.a.m.b.i.a...I.r.o.p.i.y.i.a.n... .e. .J.a.p.a.n.i...I.r.o.p.i.y.i.a.n... .e. .J.i.b.u.t.i...I.r.o.p.i.y.i.a.n... .e. .K.a.n.a.d.a...I.r.o.p.i.y.i.a.n... .e. .K.o.m.o.r.o...I.r.o.p.i.y.i.a.n... .e. .L.e.s.o.t.o...I.r.o.p.i.y.i.a.n... .e. .M.a.l.a.w.i...I.r.o.p.i.y.i.a.n... .e. .M.o.r.i.s.i...I.r.o.p.i.y.i.a.n... .e. .M.o.r.o.k.o...I.r.o.p.i.y.i.a.n... .e. .R.w.a.n.d.a...I.r.o.p.i.y.i.a.n... .e. .S.a.m.b.i.a...I.r.o.p.i.y.i.a.n... .e. .S.u.d.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):168
      Entropy (8bit):3.8675109447643528
      Encrypted:false
      SSDEEP:3:XCbVSm/tloFelfdll8lCtVXMXlWtKlFiO6PePllnuW5vTVntRb1hp0lFuQFn:Svo6mlCtVXMsKlv62eW5b4/F
      MD5:02EE73C7EDDE3DC0377FCE196E3FA6A0
      SHA1:F4CC1350E289EC27383C3BBDAFBFDBB9D96B1B70
      SHA-256:11D7D17E54504159416F09275A922376D8E961E3D3AD5380CDD959A513E8E33F
      SHA-512:AAC5AD50A6DA2D3E43FE918F5274F2DD98DA622222C9C9D4B84AC239A5C122A2BDF44C2C93307D5866AAEB5E3075D166C589A9D6B94B3529E1C27BB550949C27
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........"..."................i~...s.h.i.r.....i.k.u. .i.k.a.p. .m.T...T.....v.............................................. ...P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):6440
      Entropy (8bit):5.321424177187323
      Encrypted:false
      SSDEEP:192:e2YmABKNZXPhwk3f/7VRt/giMw7qX8FoX:e8ABKN8Sjnt/JJ7qXb
      MD5:C7C7AD6300F54EEB29208C8051E2A48E
      SHA1:FE566931939B0F2789E2BF2B6846E37DEFE5E8E5
      SHA-256:BD1A97A7CD9271408CA39E365B93572A47A9043FFD5844E6D25959FDB2A4BE30
      SHA-512:C982A08641087A4EEC661F29DD13C23AE8039CAA037C9880E540EEC429E2A9746CC2E387F38FF3C1C43A43DA4975E65B9CE52CE72270F24BA3E3D46E490F6121
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................8.. ..h.....B...B................i~...D.o.l.a.r. .A.S...2...1...4.9...2...Y.e.n. .J.e.p.u.n...D.i.n.a.r. .I.r.a.q...P.a.u.n. .M.e.s.i.r...P.a.u.n. .S.u.d.a.n...P.a.u.n. .S.y.r.i.a...P.a.u.n. .L.u.b.n.a.n...K.r.o.n.e. .N.o.r.w.a.y...P.a.u.n. .B.r.i.t.i.s.h...R.i.e.l. .K.e.m.b.o.j.a...Z.l.o.t.y. .P.o.l.a.n.d...D.o.l.a.r. .B.a.h.a.m.a.s...D.o.l.a.r. .J.a.m.a.i.c.a...D.o.l.a.r. .S.u.r.i.n.a.m...F.r.a.n.c. .C.o.m.o.r.i.a...K.r.o.n.a. .I.c.e.l.a.n.d...P.a.. a.n.g.a. .T.o.n.g.a...S.y.i.l.i.n.g. .K.e.n.y.a...R.u.b.e.l. .B.e.l.a.r.u.s...P.a.u.n. .G.i.b.r.a.l.t.a.r...P.e.s.o. .D.o.m.i.n.i.c.a.n...S.o.m. .K.y.r.g.y.s.t.a.n.i...S.y.i.l.i.n.g. .S.o.m.a.l.i...S.y.i.l.i.n.g. .U.g.a.n.d.a...D.i.r.h.a.m. .M.a.g.h.r.i.b.i...H.r.y.v.n.i.a. .U.k.r.a.i.n.e...L.i.l.a.n.g.e.n.i. .S.w.a.z.i...L.i.t.a.s. .L.i.t.h.u.a.n.i.a...C.o.l.o.n. .C.o.s.t.a. .R.i.c.a...S.y.i.l.i.n.g. .T.a.n.z.a.n.i.a...C.o.r.d.o.b.a. .N.i.c.a.r.a.g.u.a...D.o.l.a.r. .N.e.w. .Z.e.a.l.a.n.d...D.o.l.a.r. .T.a.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):3.309432036254817
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQw68t1ar9nRillQ/6n:SvW83ar9nRi46
      MD5:B0E942760DB021CF5F6A685A52F93393
      SHA1:C82429E77F6595E40CEFB6B20AA5E0A71CA07625
      SHA-256:CF21EE5E58ED6E2911AABD6D9FEA7B7258C3483B46ED4706A6CDBA9254E06CBC
      SHA-512:9E347D9C136C9DD64F6E6EE52D8AAFA34BDF719ECB3721459484C923CB89E118686A4E57478B10BE7B6A9BE3FCE5ECB07F3300993EED928BA979016CBF8779BE
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~...........O................ ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):3.3446273605383543
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQ7sC8t0/Uar9wRPfllQ/6n:SvSf82r9wRX46
      MD5:F674503A784DB3D59664FE097D5ADDBE
      SHA1:6163F03FEDFBE16B37BA26CE2B3DED856E02C831
      SHA-256:F9557DA8973FE1AA3F34253D0B457197517AF1D0FACEF3D8CC279D8E55A11F0C
      SHA-512:C5B9815666E193317E3FD48448BC74B7D5590D4B825199DF00BAEDC4E30DDAE93032B754D81CBB2D9D50F47DDFE444166298A566DD2385648B11C6D7FBB5B595
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .AU...................AU.....i~.......@U................... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):6108
      Entropy (8bit):5.1704416133368865
      Encrypted:false
      SSDEEP:96:5zCgTf95C//8IsjzazUNUDUw+hR8K37nxagtim79N9tsJsobneEebd:595c0rCPUw+hRD31fB9CJso7eB
      MD5:C8A7A2441DD1A2B6DAEF1D704226696E
      SHA1:C32AA99E2C8A2E69C948129E58E92FD28E3CE41D
      SHA-256:E2EA7FA417899321094A555CA858C189E691CF7C12CE6FEFD57B59BE8E0AB141
      SHA-512:BFD3E299B00494F78EA58278795CD8090C5FCED8638B5687EB068180D58E827B5F6DBDBE4739EB7A3B01E375EBD4CC44498BF6A945C83B0847269D4EE2906ADA
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~...L.i.r.a. .M.a.l.t.i.j.a...M.u.n.i.t.a. .M.h.i.x. .M.a.g.'.r.u.f.a. .j.e.w. .M.h.i.x. .V.a.l.i.d.a...M.u.n.i.t.a. .m.h.i.x. .m.a.g.'.r.u.f.a. .j.e.w. .m.h.i.x. .v.a.l.i.d.a.................V.V.....................n.n.........r.r...............v.v...R.R...Z.Z.........z.z...R.R.........V.V.....................~.~.........^.^...z.z...............f.f...............Z.Z.........2.2...j.j...j.j...............n.n.........b.b...........)...............~.~...F.F...b.b...r.r.........J.J...f.f...............................................................j.j.........n.n..."."...............t.....r.r.........v.v.........z.z...&.&.....................*.*.........~.~...............2.2...v.v.....................b.b...............N.N.....................f.f...6.6.....................6.6.......................................:.:...>.>.......................................:.:...B.B.............................................F.F.......
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2552
      Entropy (8bit):4.169327394737595
      Encrypted:false
      SSDEEP:48:EtVvGUGWKAQsUj0XSAbcCA1LmkBtZKUPl7hpCa/kHlZbnZ57qXIgVIy:xfzt5Aw55mFMlfCa8HlZjZZaVIy
      MD5:3ADC590CE77F36881EE933974FF2B2F3
      SHA1:230B8CB512EE56978149C3F20DF3A2CEFCED36C6
      SHA-256:36B5EE66B95FDC5E5EC1018E9D230D1AD30C8818A8DADD22F9C9A457636FF43B
      SHA-512:C4C0EB48F167AB6B8CA6CF07C95CF8AD80A5F36E565F820FEFA39D99DEBB0156B87947E1D02D49D17FBE77710BBC8D2501CA189E2B185CCB42E36B1D40488360
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................r.. ........v...v...:............i~...s.o.l.a.i. .B.E.A.C...s.o.l.a.i. .E.u.r.o...s.o.l.a.i. .G.a.n.a...s.o.l.a.i. .S.y.i.K...S.o.l.a.i. .M.a.r.o.k...S.o.l.a.i. .S.w.i.s.s...s.o.l.a.i. .B.C.E.A.O...s.o.l.a.i. .E.g.y.p.t...s.o.l.a.i. .G.u.i.n.e...s.o.l.a.i. .I.n.d.i.a...s.o.l.a.i. .J.a.p.o.K...s.o.l.a.i. .K.e.n.i.a...s.o.l.a.i. .K.o.n.g.o...s.o.l.a.i. .L.i.b.y.a...S.o.l.a.i. .H.e.l.e.n.a...S.o.l.a.i. .M.a.l.a.w.i...S.o.l.a.i. .R.w.a.n.d.a...S.o.l.a.i. .U.g.a.n.d.a...s.o.l.a.i. .A.n.g.o.l.a...s.o.l.a.i. .E.r.i.t.r.e...s.o.l.a.i. .K.a.n.a.d.a...S.o.l.a.i. .A.m.e.r.i.k.a...S.o.l.a.i. .A.r.a.b.i.y.a...S.o.l.a.i. .M.a.u.r.i.c.....S.o.l.a.i. .S.a.i.c.h.e.l...S.o.l.a.i. .S.a.u.d.i.y.a...S.o.l.a.i. .Z.a.m.b.i.y.a...s.o.l.a.i. .A.l.g.e.r.y.a...s.o.l.a.i. .B.a.r.e.n.y.a...s.o.l.a.i. .B.u.r.u.n.d.i...s.o.l.a.i. .E.t.i.o.p.i.a...s.o.l.a.i. .G.a.m.b.i.y.a...s.o.l.a.i. .K.o.m.o.r.y.a...s.o.l.a.i. .L.e.s.o.t.h.o...S.o.l.a.i. .N.a.m.i.b.i.y.a...S.o.l.a.i. .N.i.g.e.r.i.y.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.463875210299606
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/xr+yhll:SBtkJ1li6gml/xrjJ
      MD5:C64F71AE20060954B9E32C5B9DA51C65
      SHA1:1E33967C51E09874F6A1DE9A9C3539DB9CA82A63
      SHA-256:1F132CA885D786C508137E5A798DCA175FDD0D486A134931FCC3803DB934B735
      SHA-512:CAAAD60303A93E38E881D7FC3C711D7A52ACB59511A65BEE549193067F88B870BFF2DAEBDDFAE6D4ED366F93D3D7003EC5B0AC13890B9187F9A37D2BE8831D17
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.............................i~.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.463875210299606
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/xr+yhll:SBtkJ1li6gml/xrjJ
      MD5:C64F71AE20060954B9E32C5B9DA51C65
      SHA1:1E33967C51E09874F6A1DE9A9C3539DB9CA82A63
      SHA-256:1F132CA885D786C508137E5A798DCA175FDD0D486A134931FCC3803DB934B735
      SHA-512:CAAAD60303A93E38E881D7FC3C711D7A52ACB59511A65BEE549193067F88B870BFF2DAEBDDFAE6D4ED366F93D3D7003EC5B0AC13890B9187F9A37D2BE8831D17
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.............................i~.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):116
      Entropy (8bit):3.4731032476541825
      Encrypted:false
      SSDEEP:3:XCbVSm/tlEFu4gG98G4PPfXkhlt/WVGFn:Sv8vH98pnfUzzF
      MD5:8EC60D7E1E4F6BDD711B9202D84A910B
      SHA1:F38271A99673959E89952ABA17CBAC11300789DE
      SHA-256:4753735BDA4C84D96BDB31FE7308CCF3E51EFD4F69CE5D979061AE1BB96ABCBF
      SHA-512:2A351102B47C019D100B7A62EBEC2FBFBFF897AFEF61BBA479893F5093AF69BC80F2EBFB59D5AAC9826C62E75EAF13DA6C54854C0227F2A3EA2BB300B776561F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~.....:.....\.........+...................... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):708
      Entropy (8bit):4.586640180253403
      Encrypted:false
      SSDEEP:12:tyoaYzmu+SDy4hH4Bfky4p45ky4O4uIy6TT3HktNpkZDzgICpA4S:twSe4hYB94aL4LnWpQIICLS
      MD5:4DD053ED8488B02A8264823DC7E50691
      SHA1:0B270780E4D4B76FCA61A5C81B31E98AD44D0DC1
      SHA-256:0B775254239B2E0CB70F743F8441354B0201D4CACF940EB1B9E0A46034936895
      SHA-512:A9D1A615846F376548049A23A88E1135F1707FCB323EA1F89536545E10DB1030D6E95FCD1CD6B8AD6204503BFFD630B0F45D7E7C8045EF9F7565C7380A522F35
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..........................i~.....0.@...!.>.<...A.>.<.K...5.2.@.>.9.K.......(.-.K. ...>.;.;.0.@.......(.-.K. .4.>.;.;.0.@.......(.-.K. .4.>.;.;.0.@.K.....@.0.7.8.;.8.0.3. .@.5.0.;.....@.8.B.0.9.=.0.3. .$.C.=.B.......7.>.=.3... .2.0.;.N.B.....1.@.0.7.8.;.8.0.3. .@.5.0.;...1.@.8.B.0.9.=.0.3. .D.C.=.B...=...7.>.=.3... .2.0.;.N.B.....1.@.0.7.8.;.8.0.3. .@.5.0.;.K...1.@.8.B.0.9.=.0.3. .D.C.=.B.K...=...7.>.=.3... .2.0.;.N.B...9.K.......%.........\.4.....................C.......R...................a...........s.......Q.................p.................W.........o.................................W.........o......P...P...P...P...P...P...P............... ... ...P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):41240
      Entropy (8bit):4.439275441009488
      Encrypted:false
      SSDEEP:384:4MWl4GCF3R4k4NRAzE/d9rPqTsMexxQ9WPrzhlhBxNub88L2lCypZ2VshQd:ICFmc8ywMGCuNL/pwVvd
      MD5:4E193E33C0CB5628701FD1C9C9E1CEE9
      SHA1:39ACD137987D552F2E2CAC2776CF8AF0CA008F53
      SHA-256:3D1029D5A6C0807CFAC45A2B9077E5FAC91EC14D52FD8E65653C8A63AC6E6FD1
      SHA-512:6D538F1DCAA611CC873B6C155BA993AB32094792BB288A2DA53202A250432C9DC0A6B1EB182EDFD1984466A220F10A9A404D44DBAE37C3CD409CFA7A006A2FCE
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................4(. ..f.....>(..>(..........."...i~...E.C.U...z.B.o.t.o...p.a.l.l.a.d...p.l.a.t.y.n.a...f.r.a.n.k. .C.F.P...f.r.a.n.k.a. .C.F.A...f.r.a.n.k.i. .C.F.A...l.i.r. .w.B.o.s.k.i...b.a.h.t. .t.a.j.s.k.i...s.o.m. .u.z.b.e.c.k.i...f.r.a.n.k...w. .C.F.A...f.r.a.n.k...w. .C.F.P...l.o.t.i. .L.e.s.o.t.o...p.a.t.a.c.a. .M.a.k.a.u...c.e.d.i. .g.h.a.D.s.k.i...d.i.n.a.r. .i.r.a.c.k.i...f.u.n.t. .e.g.i.p.s.k.i...j.e.n. .j.a.p.o.D.s.k.i...j.u.a.n. .c.h.i.D.s.k.i...l.e.j. .r.u.m.u.D.s.k.i...l.e.k. .a.l.b.a.D.s.k.i...l.i.r.a. .t.u.r.e.c.k.a...l.i.t. .l.i.t.e.w.s.k.i...r.i.a.l. .i.r.a.D.s.k.i...r.i.a.l. .o.m.a.D.s.k.i...s.o.m. .k.i.r.g.i.s.k.i...z.B.o.t.y. .p.o.l.s.k.i...B.a.t. .B.o.t.e.w.s.k.i...m.a.r.k.a. .f.i.D.s.k.a...b.i.r.r. .e.t.i.o.p.s.k.i...f.u.n.t. .l.i.b.a.D.s.k.i...f.u.n.t. .s.u.d.a.D.s.k.i...f.u.n.t. .s.y.r.y.j.s.k.i...k.i.p. .l.a.o.t.a.D.s.k.i...k.o.r.o.n.a. .c.z.e.s.k.a...k.o.r.o.n.a. .d.u.D.s.k.a...l.e.j. .m.o.B.d.a.w.s.k.i...l.e.w. .b.u.B.g.a.r.s.k.i...m.a.n.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):3.3715072703051296
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQ0ElHc0ar9Hs9k9ScVn:SvZRr9XHV
      MD5:C194FF74C6B65FAE4832F1ABDAA218A1
      SHA1:712282E2B74418EE0CD6FC661A72A88486A9E3B2
      SHA-256:0E986C574F9E6AA4F786ED2A4A1B825759062EB04FED0938679010A2E6CBA24B
      SHA-512:715B11D01C31819B2BFB80EC36624F4D59F1670853E265365D95405EEE53583D55FA25CAC03CBE7EDD72287062C963A293E713AA117BB81C2E4A0C8698E8E6AC
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~...................=........`... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):112
      Entropy (8bit):3.4368702719143505
      Encrypted:false
      SSDEEP:3:XCbVSm/tlud4tbwmyPmKPrR1mCFofGFn:Sv+/mjKTRxFo+F
      MD5:EE2F8917C4703ED35301B8302B298E2D
      SHA1:9BF02E717B3D8B199D63D92C4776E24032F9BC5B
      SHA-256:42A9D4F0CE1791C474F85337BA0896FDB2312AB5CF2035B70AB28D6AB1DFEF82
      SHA-512:2512CF617BD7A2BC1721A5169EA5EA8D6B8FCC2C479CB7CC9592F8AF9A80A9CCE4F0A08D0290E424C67EA894EB0D10CAEA8547413265835D471C99F9F2B30D85
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~...M.T.n..................=........`... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):116
      Entropy (8bit):3.4571882910706795
      Encrypted:false
      SSDEEP:3:XCbVSm/tldc4jUMXsSGTkRolJpxK9Cfn:SvPjdgTkRoz+y
      MD5:91E165EABC558593B37DC907C2363727
      SHA1:93FC06CEE99BA16800A6CDAFD0726ED42047118A
      SHA-256:C9589538FCEB262D36E1F687FEC5870853CFC51D63F5F6C27E5969B274C9B238
      SHA-512:CB31FCCA7B53F825683BE4895E6F137CB1E024A40C80D95650223382ED0BFB0C4C7ADC1E2407E084D05AB1C3AD3AF89C97297CDB6E0E7E9591A4D91DB8B2F1B5
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~...S./.......6.......................... ...P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):4372
      Entropy (8bit):5.024738835036758
      Encrypted:false
      SSDEEP:48:rDb3gZi8lV09u1gAmcN0wBLVcXyRubMNpRPNpT8zWgjHZ98053f7qhnxBxB1YX0O:rH3qi5+gAyY1/TH4c053zqhnx84+97td
      MD5:CE5342334637D420ADBEEAAB1563E387
      SHA1:8695516224B0998CA0C1A8C0420D63D9AF1C17D0
      SHA-256:D2CABE6B3BDC84B56F8C091DC908714FFEA4C7EE2598B97CD1F5E4647D018258
      SHA-512:AC2A1C5F4F1B720F42786E381B6ECFD75EDD214D0FBA5BC83483D513F71EDFDAC6EDC3F5680B868319466E75DE450DFAD10D958CBA287112AA593984D6A439AC
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................;.. ....i...=...=...........;...InstalledLocales.af.af_NA.agq.ak.ar.ar_AE.ar_DJ.ar_ER.ar_KM.ar_LB.ar_SA.ar_SO.ar_SS.asa.ast.az.az_Cyrl.az_Latn.az_Latn_AZ.bas.be.bem.bez.bg.bm.bn.bo.bo_IN.br.brx.bs.bs_Cyrl.bs_Latn.bs_Latn_BA.ca.ca_FR.ccp.ce.ceb.cgg.chr.ckb.cs.cy.da.dav.de_CH.de_LI.de_LU.dje.dsb.dua.dyo.dz.ebu.ee.el.en.en_001.en_150.en_AE.en_AG.en_AI.en_AT.en_AU.en_BB.en_BE.en_BI.en_BM.en_BS.en_BW.en_BZ.en_CA.en_CC.en_CH.en_CK.en_CM.en_CX.en_CY.en_DE.en_DG.en_DK.en_DM.en_ER.en_FI.en_FJ.en_FK.en_FM.en_GB.en_GD.en_GG.en_GH.en_GI.en_GM.en_GY.en_HK.en_IE.en_IL.en_IM.en_IN.en_IO.en_JE.en_JM.en_KE.en_KI.en_KN.en_KY.en_LC.en_LR.en_LS.en_MG.en_MO.en_MS.en_MT.en_MU.en_MW.en_MY.en_NA.en_NF.en_NG.en_NL.en_NR.en_NU.en_NZ.en_PG.en_PH.en_PK.en_PN.en_PW.en_RW.en_SB.en_SC.en_SD.en_SE.en_SG.en_SH.en_SI.en_SL.en_SS.en_SX.en_SZ.en_TC.en_TK.en_TO.en_TT.en_TV.en_TZ.en_UG.en_VC.en_VG.en_VU.en_WS.en_ZA.en_ZM.en_ZW.es_419.es_AR.es_BO.es_BR.es_BZ.es_CL.es_CO.es_CR.es_CU.es_DO.es_E
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):24380
      Entropy (8bit):4.718477782947421
      Encrypted:false
      SSDEEP:384:dvdWxbAQaQQxdMODSYSYNeMXxXCcT85onhisI9TIx/8g+oo1eymmBTB6bfC50r:dvCAvVeOtS5MhXCcTSLTIx/h5mY
      MD5:84CCB1F6770ED93059C5E781CB0E9D9E
      SHA1:40ADA8F09F839F36BBFA39F38C464C9690178AD5
      SHA-256:B36FAC95691F1C1F747750B15EE68A1E3888B8004168E495169DF0D2BD8534DF
      SHA-512:B446363EAD158FB35428CBCAEE5946FF4E8194354FF9076C8FDB333A9ACF33A73D274D4BD98B3CB725DAE6E317540BB60D66D1A1F4FEE61D029F760D6B5631AD
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..b.....................z....i~...a.r.g.i.n.t...p.a.l.a.d.i.u...p.l.a.t.i.n.....z.a.i.r. .n.o.u...z.a.i.r.i. .n.o.i...f.r.a.n.c.i. .C.F.P...m.a.n.a.t. .a.z.e.r...s.o.m. .k...r.g...z...{.0.}. .d.e. .{.1.}...c.e.d.i. .g.h.a.n.e.z...f.r.a.n.c.i. .M.a.l.i...k.i.p. .l.a.o...i.a.n...k.u.n.a. .c.r.o.a.t.....r.i.a.l. .o.m.a.n.e.z...y.e.n. .j.a.p.o.n.e.z...t.a.l.a. .s.a.m.o.a.n.....a.f.g.a.n.i. .a.f.g.a.n...c.e.d.i. .g.h.a.n.e.z.i...c.o.r.o.a.n.e. .c.e.h.e...c.o.r.o.a.n... .c.e.h.....d.i.n.a.r.i. .Y.e.m.e.n...d.o.l.a.r. .f.i.j.i.a.n...l.e.u. .r.o.m...n.e.s.c...l.i.r.e. .m.a.l.t.e.z.e...l.i.r.e. .s.i.r.i.e.n.e...l.i.r... .m.a.l.t.e.z.....l.i.r... .s.i.r.i.a.n.....m.a.n.a...i. .a.z.e.r.i...p.e.s.o. .c.h.i.l.i.a.n...p.e.s.o. .c.u.b.a.n.e.z...r.i.a.l. .y.e.m.e.n.i.t...s.o.m.i. .k...r.g...z.i...t.e.n.g.e. .k.a.z.a.h.e...t.e.n.g.e. .k.a.z.a.h.....z.l.o.t. .p.o.l.o.n.e.z...a.r.i.a.r.y. .m.a.l.g.a.....b.i.r.r. .e.t.i.o.p.i.a.n...d.i.n.a.r. .s.u.d.a.n.e.z...d.i.n.a.r.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):37816
      Entropy (8bit):4.615966856428233
      Encrypted:false
      SSDEEP:384:yKdeOm8jlvhrjl2dVK2sEN+FOVcCy4qPCmGQBtIUHPm:BoJulvhrjQdVK2yX4qPTf0UO
      MD5:0A898D04EBF2E9C7EEBB86D9430F0CF6
      SHA1:BB516A6BF5A411D1AEF14094842A47311CFB3BAB
      SHA-256:F7EE4E84B49780925AE392BD4391B9A947333DFD91D7A6FEC6B69B10C46A071F
      SHA-512:3A9EE20AB8A2BACFC22287C5BE4A22406A4A8A287885F19F3C779298B1818AF5CA64395E9AC831836A0693CF50428E75DDE1AA35E90B98FD701F1335217663DC
      Malicious:false
      Reputation:low
      Preview: ..'........ResB.................$. ..b......$...$...............i~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
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):132
      Entropy (8bit):3.60831568269038
      Encrypted:false
      SSDEEP:3:XCbVSm/tlJFKEUmlulWd9glXliw3swle8vfJ14fn:SvTUo9g1iwp9n0f
      MD5:CC74A2097053DC548206C81764063E94
      SHA1:74A461B6439B0C1EBF728D88595953A15CEF968E
      SHA-256:21AD8327F53E7313F5D10DBDE8387142224D5BC1A19FD83AD620A78463FAB4CD
      SHA-512:ADC7BBA96E869A725CEB8496FF09DBAD2A8AA0AC28FD193E5D5E45A9637EE1AB5ED1A7EAD812BE4246A9301BEDE9D633F01101E55E84558C9F379B3B1B69DE74
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .1;..........................i~.....S.P...g.S..........`0;.`..g........................ ...P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):3.276980911276452
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQ4lf8t86Uar94IvlllQ/6n:Svzlf8W6xr9Xl46
      MD5:0828EB96C1B6E0F15F5C95D0564A64AD
      SHA1:9B72702525956135133A07C4D2B1C1A2BCBBE583
      SHA-256:B6AFE46C829E2D15754F70FEFC455724BB87335394E9BAEFB6529A50EBA7F0BD
      SHA-512:F507AAE3DC873E1A49C5D640384187CE01B0508954A315743F3835A65497ECF20234FDC5EEC90FB611A93BC1380372D94317A9B0D6509AEFA03BF0936CC88B66
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..Q....................Q.....i~........Q..w................ ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):112
      Entropy (8bit):3.448304786330961
      Encrypted:false
      SSDEEP:3:XCbVSm/tlVh5tb59VPtjf+lbp4lF7Cfn:Svd9V1Bcf
      MD5:030FC17C5A0B806EA7CE68877FD66081
      SHA1:1EDBC17FF5B099F241BCFF57EC4E327D57C2FDD4
      SHA-256:AFA2AAAABC93D20AE86EED279BAD1C6711264220B072B25825395DB6E0391B41
      SHA-512:A2434CFCFE52DEA2ABF783F1135BEE0B6B720FEA51379E6F259D346FBA5A43238FC1849B879756C07C7460D5DAA136264790BE6F295E0EAD8521E553E1568D51
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~.................................... ...P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):836
      Entropy (8bit):4.807826091118605
      Encrypted:false
      SSDEEP:12:mlUNtOaxijlw0+CzJ1WUNxupJLjQXHm3XcfwYXg4YgQYYwS/YgwYYCS9lgAF:mE9i1+wJ1Wuxu/g+M4PHXHCXnCS/gAF
      MD5:F09BA6EC637887BF827CE42F664D181E
      SHA1:E8B2FB8468FE264361EC4A788641E06461A94764
      SHA-256:CD71CE1AFEB8C8186B7EFE0554748EE91D8F1B9CB38F8E7E96BA39BF29594523
      SHA-512:17A26D4186AAECAE49AE06F9A992580DD3A11A20DB5E22486F2B76A4ED192074CE6911CF920ACA84614EAFE758124C1BC9455282318C07B78CC8783FD8133573
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..j.............:.......U....i~.......ez..........,...z.....~..z....i8.....z..f....j..........n......Z8..b.vz....pT........\.x...&..%..r.!z..*.0T....K8..........$...........@T.....8.... T.....z....~............T....Tz..".......PT.....z..........`T...........z.....T..........................*.......R......z..v.Cz..w.......2z.....z.........`.).`.......`$..`....v..`HJ.`.......`.j.`.......`.<.`.......`.#.`.......`;..`.......`.5.`:.....'.C.G.c.s.w.{...........................+./.;._.c.o.s.{.............................#./.3.;.K.c.k.o...............U...................................X..............."...%...(...+.......1...4...7...:...=...@...C...F...I...L...O...R...[...U...X...[...^...a...d...g...j...m...p...s...v...y...|...^...a...d...........................g...j...................m.. ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):240
      Entropy (8bit):4.337546316588306
      Encrypted:false
      SSDEEP:6:SvTl//l1vWt2DkThj5vmzU+9/OkDc5YL9LLgbfBF:4HWU6j5vmznOkDEYL9LMbL
      MD5:3D5B99E8470EC21F627C8453DA480C72
      SHA1:6F4F2FB089A0565DF90E42AA4F64DC6FC34AED9B
      SHA-256:27E2AC546C139873EB16767286C90C6027FB935EB50F342C53D2C87B70A263DD
      SHA-512:D974B040ABFB16B4880EF78AE0DC584CC4FCFF4F0213BEC8B28A9650797642314280F6D0710CBCC8E5D17431973A1F2337E86EA0D1DCBDAD7F30B0777113614D
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................,.. ........4...4...........$....i~.....%.(. .4.C.>.;.;.0.@.0.....@.0.A.A.K.K.9.0. .A.>.;.:.C.>.1.0.9.0.............................................o...#...&.......o...,..P/..P............$.. )..P(.. 2..P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):3184
      Entropy (8bit):4.009649867978744
      Encrypted:false
      SSDEEP:96:VpGbUkgX2TBNUH3ZpIYz+7hHqH2H+CGjJvjmnzk5PsJ+4AyHFdIXfVHZPzc6vguL:sUkA2TBKXZpIYz+7hKWeCGjJvjmnI5PR
      MD5:9D908D79C457772F1210E708881D3352
      SHA1:B5206B61F24DA701A52FC3C255C0F06ED1D2D257
      SHA-256:A64389DAA078FB7CFD8544C7FAA53D451ACFD84DC6A09B985442E7B007B02D29
      SHA-512:CF2EB99E43E6B34C56C51E1628095F60D1BFD07A478EF7603A1DAD4E0BF59E551C901C95DA68114FAC31BC67432E3AB7A02313728AA34B324705EF8C0DCAC11F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..#.............9.....#......i~...D.o.l.a. .e.e.l. .L.i.b.e.r.i.a...P.a.u.n.t. .e.e.l. .S.u.d.a.n.i...D.o.l.a. .e.e.l. .M.a.r.e.k.a.n.i...D.o.l.a. .e.e.l. .Z.i.m.b.a.b.w.e...N.j.i.l.i.n.g.i. .e.e.l. .G.i.n.e...N.j.i.l.i.n.g.i. .e.e.l. .C.h.i.n.a...N.j.i.l.i.n.g.i. .e.e.l. .G.h.a.n.a...N.j.i.l.i.n.g.i. .e.e.l. .I.n.d.i.a...N.j.i.l.i.n.g.i. .e.e.l. .K.e.n.y.a...N.j.i.l.i.n.g.i. .e.e.l. .K.o.n.g.o...N.j.i.l.i.n.g.i. .e.e.l. .L.i.b.y.a...N.j.i.l.i.n.g.i. .e.e.l. .M.i.s.r.i...N.j.i.l.i.n.g.i. .e.e.l. .A.n.g.o.l.a...N.j.i.l.i.n.g.i. .e.e.l. .B.u.k.i.n.i...N.j.i.l.i.n.g.i. .e.e.l. .G.a.m.b.i.a...N.j.i.l.i.n.g.i. .e.e.l. .J.i.b.u.t.i...N.j.i.l.i.n.g.i. .e.e.l. .K.a.n.a.d.a...N.j.i.l.i.n.g.i. .e.e.l. .K.o.m.o.r.o...N.j.i.l.i.n.g.i. .e.e.l. .L.e.s.o.t.o...N.j.i.l.i.n.g.i. .e.e.l. .M.a.l.a.w.i...N.j.i.l.i.n.g.i. .e.e.l. .M.o.r.i.s.i...N.j.i.l.i.n.g.i. .e.e.l. .M.o.r.o.k.o...N.j.i.l.i.n.g.i. .e.e.l. .R.w.a.n.d.a...N.j.i.l.i.n.g.i. .e.e.l. .S.a.u.d.i.a...N.j.i.l.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):9364
      Entropy (8bit):5.225150716244356
      Encrypted:false
      SSDEEP:192:2I0H5647jBH3V7R1XtnXo76WD2IZ8siBjaEj+mi9:2HZrBl7R1XVJBjhj+mM
      MD5:921B49506470F58E8B1B53E2C6286CC4
      SHA1:4B4E0B6EEC20EFEDA2CE45E3016701DA49B37778
      SHA-256:FCB3F4F60866BEA6B4034D7412515592F36C58C48F5363CFD6AC21C2690C720A
      SHA-512:F9ED955871E1AED9DC4B4CA961368DEC822EC494F3DD36FED464A130D1BA8C0DEF033C99055CCDF0CA444D908D61CAF59E058914900D8F8C3B248247EAC374B6
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..Q.....................V....i~...*.1...J. .D.1.'...1.H.3.J. .1.(.D...3.4.D.J. .1.~.J...A.,.J. ...'.D.1...~.J.1.H. .3.H.D.....D.J. .~.J.3.H...C.F.P. .A.1.J.F.....'.F...J.F. .1.~.J.../.'.F.4. ...1.H.F...B.7.1.J. .1.J.'.D...J.E.F.J. .1.J.'.D.....'.&.J. .(.'.G.*.....J.F.J. .J.H.".F.....J... ...1.H.F.'.....F.J. .A.1.J.F.....'.1.E.'.F.J. ...1.E...'.D.(.'.F.J. .D.J.....'.....'.*.D. .3...H...(.J.D.J.2. ...'.D.1...,.'.~.'.F.J. .J.J.F...3.9.H./.J. .1.J.'.D...3.H.&.3. .A.1.J.F.....9.E.'.F.J. .1.J.'.D...E.'.D./.J.~. .D.J.H...F.J.~.'.D.J. .1.~.J...G.J.}.J. ...H.1...J...~.H.D.4. .2.D.'.}.J.....J.H.(.F. .~.J.3.H.....J.'.F.'. ...'.D.1...".E.1.J...J. ...'.D.1...'.1./.F.J. ./.J.F.'.1...'.1.H.(.F. .A.D.H.1.F...'.J.1.'.F.J. .1.J.'.D...(.1.'.2.J.D.J. .1.J.D...(.1.E.H./.J. ...'.D.1...*.H.F...F. .~.'.F...'...*...H.F.3. ./...F.'.1...,.(.H.*.J. .A.1.J.F.....3.'.E.H.".F. .}.'.D.'...3.1.(.J.'. ./.J.F.'.1...3.H.E.'.D.J. .4.D.F.....9.1.'.B.J. ./.J.F.'.1...E.5.1.J. .~.'.&.H.F...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.897999040607968
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDklU8gl8l/dMNl6lLMhk:SBtkJYlU8g8l/d66JGk
      MD5:8E09780D6328508528DB22AEBEAF32FB
      SHA1:99B4A5839E27A40B666E7DDF17B390A92B6A5221
      SHA-256:0E8549291B006F7636CDD4EE7763B91C526C8391BE5A3422873A70D63EFE83A2
      SHA-512:0AA73AE239A6B5B8FDD5DB3999B5604AD5BA884EAB33F6409CDD7EB7DA8C7BA5B68C913D4BD418F3E97C6110CD19CEB729CE1EBF54E8023F9E09BD5EC54FFCDD
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.............................i~...s.r._.L.a.t.n._.B.A...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):912
      Entropy (8bit):4.994000974815492
      Encrypted:false
      SSDEEP:24:kOG4+SH+cmjfu16bQVuqkPlE9g+MDLYXHX/KXnUMtv:mSenjf6a7X0gVD03iXU4
      MD5:3824BCF45CF52B4B40990164AC1B9D03
      SHA1:4BABA32CCB5DD2900EC77DAC1BA549FF4743F7D7
      SHA-256:926B62B8568086D42EFAB81199C3C6723921A6D0D67C1FAC1DD9CD68172BFAA3
      SHA-512:F2DE263C9FEEF45BC9F26CA867DB802A0FF89647CD3AB6E0B7CAE49732400BD1B3A1A6AFEB856FE3A9C566AEC248DEC57580C008671E1A3B330009CDDC9C402A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .*J.............:.......k....i~...S-T-S-..M-I-b-S-O-..<-T-0-O-=- .O- .V-I-O-b-0-..0-7-S-M-0-T- .O- .c-I-N-1-0-1-a-I-.......x....@y...........x..z. y..~.......x.....7..f..x....v7..j......0y..n.]S.....%..b.?......7........&.....r..y..*.......L7....h7.....S.....7...........7....lS....{S....C.....V.....Z7.....S..".............Py.....x...........S.....x.....S.................y.........".....>7..........x..v.....w........x....\..`2..`....v..`)J.`.......`.<.`.......`...`.......`J..`.......`45.`.......`CJ.`:.....'.C.G.c.s.w.{...........................+./.;._.c.o.s.{.............................#./.3.;.K.c.k.o...............+.......1...4...7...:...=...@...C...F...I...L...O...R...U...X...[...k...^...a...d...g...j...m...p...s...v...y...|.......n...........................................................q.......................t...........w...z.......}.............. ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2688
      Entropy (8bit):4.105742011442069
      Encrypted:false
      SSDEEP:48:BGzsgdTywCf/2DHGdqtA3aPboz+wp21Umtr7F0bCddFr7ogVvXXX3+:ssU+7f/2DGdD3aPboz+waUmtr7F0mdd6
      MD5:BAB56F22917D77B2E2BD1753D1215932
      SHA1:D2E6EEE295F388D5ADC950FD5328B9F37D7CBFCF
      SHA-256:6AC667347A956A659DAF44F6E7D1D08FEF43376734ECADDB8D62DE9532F0858D
      SHA-512:22030D1FB5E1CB53845C5A9108E90DF4188A99C47BA3C76DA2526F6D6787326DFEEE989B0CC8372A76DC5DCFD8C724384C1A4B60186B9438F272DD6C9729F23D
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................:.......;....i~...u.r.u...l.i.y.u.n...l.i.l.a.n.j.i.n.i...f.r.a.n.k. .c.i.f.a...s.i.d.i. .n. .c.a.n.a...a.j.n.i.h. .n. .m.i.c.[...a.d.i.n.a.r. .n. .t.u.n.s...a.r.u.b.i. .n. .l.h.i.n.d...a.r.u.b.i. .n. .m.u.r.i.s...a.y.a.n. .n. .c.c.i.n.w.a...a.y.a.n. .n. .l.y.a.b.a.n...b.i.r. .n. .i.t.y.u.b.y.a...f.r.a.n.k. .n. .k.u.n.g.u...f.r.a.n.k. .n. .q.u.m.u.[...f.r.a.n.k. .n. .c.i.n.y.a...l.u.t.i. .n. .l.i.c.u.m.u...a.c.i.l.i.n. .n. .k.i.n.y.a...a.d.i.n.a.r. .n. .d.z.a.y.r...a.d.i.n.a.r. .n. .l.i.b.y.a...a.d.r.i.m. .n. .l.m.c.r.i.b...a.j.n.i.h. .n. .s.s.u.d.a.n...a.r.u.b.i. .n. .s.s.i.c.i.l...k.w.a.c.a. .n. .m.a.l.a.w.i...a.c.i.l.i.n. .n. .u.c.a.n.d.a...a.c.i.l.i.n. .n. .c.c.u.m.a.l...a.d.i.n.a.r. .n. .b.%.r.a.y.n...a.d.i.n.a.r. .n. .s.s.u.d.a.n...a.d.r.i.m. .n. .l.i.m.a.r.a.t...a.d.u.l.a.r. .n. .k.a.n.a.d.a...a.f.r.a.n.k. .n. .r.w.a.n.d.a...a.f.r.a.n.k. .n. .s.w.i.s.r.a...a.k.w.a.c.a. .n. .z.a.m.b.y.a...d.a.l.a.s.i. .n. .g.a.m.b.y.a...f.r.a.n.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.8446240823663436
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlgelU8gl8l/dMXltDelOpG:SBtkJZlU8g8l/dMoleG
      MD5:9107D4EEED5BE9E2DC1199A9DAA9BA61
      SHA1:42CCE7BB3F740ACCB0114EC93FBB199271B99A45
      SHA-256:82FEFA4EF189E698F8444D5A2DEF07A8067444321718F521A47CB44D14DE2F92
      SHA-512:4ACC1BA39FF5F77DE961974E19A204F2B2DED8A4AC932A9BF4262CDA5AD42E96882A75E89B18B77FFB8C18A5ACFEECB6A160310E4B908D05D7EE5DD6D9905D02
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.............................i~...s.h.i._.T.f.n.g._.M.A.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):57992
      Entropy (8bit):4.573804019962586
      Encrypted:false
      SSDEEP:1536:SMchF2PbODZWMWBmMagLKOwFUIOFzI62AYjfRbeKBu6GxFv3U2z4obj4H:CzbZnW5C4tywv3UL
      MD5:E01C63C31993FD27550D0EDC1A9EF563
      SHA1:8FC6EF9B0A786C3AF6F965EE17F5AA6BE87E6123
      SHA-256:8850EF5B32EA979AC3282632FC68EA273FE2558202DD8B4CB7D2DCF44154FE48
      SHA-512:663E5CDB7F60EC4D7A9566BD6D76676DD018CC6ACFA34755D7F2C9528E9AE051117C8AE6B3C55D0295A4C208406C685792640F047E4AA278AAC298FF62E559A1
      Malicious:false
      Reputation:low
      Preview: ..'........ResB.................8. ..b......8...8........ .&1...i~...S.D.R...N.I.S...p.a.l...d.i.u.m...s.t.r.i.e.b.r.o.....r.s.k.a. .l.i.b.r.a.....i.l.s.k... .p.e.s.o.......n.s.k.y. .j...a.n...C.F.P. .f.r.a.n.k.o.v...f.o.n.d.y. .R.I.N.E.T.....r.s.k.e. .l.i.b.r.y...a.l.b...n.s.k.y. .l.e.k...f...n.s.k.a. .m.a.r.k.a...i.r.a.c.k... .d.i.n...r...i.r...n.s.k.y. .r.i.a.l...m.a.l.t.s.k... .l...r.a...o.m...n.s.k.y. .r.i.a.l...p.o.>.s.k... .z.l.o.t.....r.u.m.u.n.s.k... .l.e.i...s...r.s.k.a. .l.i.b.r.a...t.u.r.e.c.k... .l...r.a...S.A.E. .d.i.r.h.a.m.o.v...f...n.s.k.e. .m.a.r.k.y...m.a.l.t.s.k... .l...r.y...n.e.z.n...m.a. .m.e.n.a...p.o.>.s.k... .z.l.o.t.....s...r.s.k.e. .l.i.b.r.y...t.u.r.e.c.k... .l...r.y.....r.s.k.e.j. .l.i.b.r.y.....i.l.s.k... .p.e.s.o.s.......n.s.k.e. .j...a.n.y...a.r.m...n.s.k.y. .d.r.a.m...b.u.l.h.a.r.s.k... .l.e.v...d...n.s.k.a. .k.o.r.u.n.a...e.t.i...p.s.k.y. .b.i.r.r...i.n.d.i.c.k... .r.u.p.i.a...j.e.m.e.n.s.k... .r.i.a.l...k.a.t.a.r.s.k... .r.i.a.l...k.e.n.s.k... .a.i.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.9159246284584364
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMe/ut6E7l+Vbr+0mli:Sv6t6gYbrlmli
      MD5:1960AD3959332481F6D916F056B52339
      SHA1:CEA9C67AFC66F20E4104CB6AA2DF781BCCADFD5A
      SHA-256:DCB5A6234F2F38BECE4039140F59EA549C5CEF8191CDA68FDAE9D5B6106D9B4F
      SHA-512:C7BE9FB55877D5418AFB221F94F131E02A2C88C55216E2A1B9967B3DDE70B47336D8878B97CB64228A7DDDA55DC4665517F1F8E8DF2B997E2895AFE62F9A3986
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.............................i~.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.8697433784015027
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMl06E7l9llxr+uh9:Svu06g9llxr/n
      MD5:CE55127B1FCC3888A81797703F5EBB94
      SHA1:41C9A2D294B61F92B88107680AD46243B40C3699
      SHA-256:10DAC042284C569D4DA24E29FD3C0274B89A0B32FA06CADA191F2D3873553FCA
      SHA-512:D62C664647CFED4859287CA9F3948FACA795B1D300AE885B446A65134D36AA6FD216A6CA19FDD6BA97A76A3297A27CD7F742789421D6E1281CF4C917B923C835
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.X....................X......i~.......W.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.463875210299606
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/xr+yhll:SBtkJ1li6gml/xrjJ
      MD5:C64F71AE20060954B9E32C5B9DA51C65
      SHA1:1E33967C51E09874F6A1DE9A9C3539DB9CA82A63
      SHA-256:1F132CA885D786C508137E5A798DCA175FDD0D486A134931FCC3803DB934B735
      SHA-512:CAAAD60303A93E38E881D7FC3C711D7A52ACB59511A65BEE549193067F88B870BFF2DAEBDDFAE6D4ED366F93D3D7003EC5B0AC13890B9187F9A37D2BE8831D17
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.............................i~.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.9486907468225554
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMLs06E7lA5r+uh2vn:Svz06gA5r/gvn
      MD5:A1A03E4AE0BB3120DAA7F925F9754736
      SHA1:244855F29A028C974B0E908CD8E4CEE11F65E56C
      SHA-256:FD67C6594B5413B30F3D04973480904EC2179107B767666C37A8A55C90918EA6
      SHA-512:04C5B3FFB40B64422F94929E0181879CB7DE1E8D07D5B2C59ACA1E5E88A33503BA3A6E377C064C5675D0522C49F6853BD28E5141B9227846336F2686D551E987
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.............................i~.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.897999040607968
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDklU8gl8l/dMNl6lSU5Wul/kB:SBtkJYlU8g8l/d66/5WutkB
      MD5:AD95203D99A7C8F9EDD9D394D1CBB580
      SHA1:9E28470FEAA13EAF13FE2EE15CDE3355CCFBB39B
      SHA-256:BE427B86712AAD38000658279D1EB25EAF9BE9D839A97EC6143E8E9723B01E87
      SHA-512:9D94B0CA833F5CC51C76B0394A4F3247AE282BBDFA1849F8E3536548955AF53DF80D24C3F34E97D1FAD9C17914FF81C1760848126138E65150719AD6E763187F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.............................i~...s.r._.C.y.r.l._.X.K...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.9486907468225554
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMLs06E7lA5r+uh2vn:Svz06gA5r/gvn
      MD5:A1A03E4AE0BB3120DAA7F925F9754736
      SHA1:244855F29A028C974B0E908CD8E4CEE11F65E56C
      SHA-256:FD67C6594B5413B30F3D04973480904EC2179107B767666C37A8A55C90918EA6
      SHA-512:04C5B3FFB40B64422F94929E0181879CB7DE1E8D07D5B2C59ACA1E5E88A33503BA3A6E377C064C5675D0522C49F6853BD28E5141B9227846336F2686D551E987
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.............................i~.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):20696
      Entropy (8bit):4.281117984299618
      Encrypted:false
      SSDEEP:384:d968do9Rh2/kHr5C00gT50gNDl74TJ+qNe3r676aHHO:IKgNh4JBJU
      MD5:D067C8CE3452D85AD93C2F10BA372D81
      SHA1:13330649673116449AB65AEC08A4DA8E3DEEBE26
      SHA-256:14982A5C5EE07293DCBD3DA536B20CFC2BBB7BDC0B88912D38100A59E5B43EC0
      SHA-512:E4A5BF0CE83ADD26E89A9ED41642BD8C62DFCD0AAE43896633303D440AA13E832C870BD982F00313A981312BB260C8C11A3D2CCCEDBAC0B9D1A138596D8058DF
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................$.. ..j..........................i~...S.o.l. .y.a. .P.e.r.u...S.o.l. .z.a. .P.e.r.u...P.e.s.o. .y.a. .C.u.b.a...D.o.l.a. .y.a. .F.i.j.i...K.i.p. .y.a. .L.a.o.s.i...P.e.s.o. .z.a. .C.u.b.a...R.i.a.l. .y.a. .I.r.a.n...d.o.l.a. .y.a. .F.i.j.i...d.o.l.a. .z.a. .F.i.j.i...k.i.p. .y.a. .L.a.o.s.i...k.i.p. .z.a. .L.a.o.s.i...r.i.a.l. .y.a. .I.r.a.n...r.i.a.l. .z.a. .I.r.a.n...P.e.s.o. .y.a. .C.h.i.l.e...r.i.a.l. .y.a. .Q.a.t.a.r...D.i.n.a.r. .y.a. .I.r.a.q...P.e.s.o. .z.a. .C.h.i.l.e...R.i.a.l. .y.a. .O.m.a.n.i...R.i.a.l. .y.a. .Q.a.t.a.r...R.i.a.l. .y.a. .Y.e.m.e.n...T.a.l.a. .y.a. .S.a.m.o.a...c.e.d.i. .y.a. .G.h.a.n.a...c.e.d.i. .z.a. .G.h.a.n.a...d.i.n.a.r. .y.a. .I.r.a.q...d.i.n.a.r. .z.a. .I.r.a.q...r.i.a.l. .y.a. .O.m.a.n.i...r.i.a.l. .y.a. .Y.e.m.e.n...r.i.a.l. .z.a. .O.m.a.n.i...r.i.a.l. .z.a. .Y.e.m.e.n...t.a.l.a. .y.a. .S.a.m.o.a...t.a.l.a. .z.a. .S.a.m.o.a...D.o.l.a. .y.a. .G.u.y.a.n.a...R.e.a.l. .y.a. .B.r.a.z.i.l...D.o.l.a. .y.a. .B.e.l.i.z.e...D.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):3.272176235559989
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQC2l/88tuq5r9VUillQ/6n:SvJC/88Iyr9546
      MD5:F7CC579D402A7319CC4673C12D1317ED
      SHA1:193ECB9B1A3A797CDFD31A8734F34E0D7D747D72
      SHA-256:34648DAE797C375677666B965AE5701BBE64C6E1242C13D7F1E3CE0CFEE8EBA9
      SHA-512:1D822DD38EB48000D2F196DA8DB6DF77EC4491FAD52DB53CC1E159B5853AAC5A7759A4611D2D19BFD19343202AB7D4E62C3E37A205CBA42BDE05CDB3F1C7B365
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .S....................S......i~.....B.R...k................ ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):17184
      Entropy (8bit):4.686950440861322
      Encrypted:false
      SSDEEP:384:gg6mRRdJebKkyOVIUvy5QF24rNLw/snW19CDKj2/TLmXWf:ddusfMKjOLd
      MD5:9F553ACCE6CEAD76C65B70125AC45AB0
      SHA1:72D47638F170575C63C74B88F52DB732BB978F93
      SHA-256:0105681B01A06828ACD598DCF8B267C12E1A7F5FD6398C256B7CF66B0F2FBE2D
      SHA-512:3A1304C6315759E169D32F6750AA4E3A451B3F0CB312DB1F2139BCAFA1513A573BD2C0804DEC8E955D309056BBA4C72BC678A6DF70A9FC648263AD70A0E49FAC
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~..................... ..................................... ....................... ........................... ......................... ..................... ............................. ..................... ............................. ....................... ......................... ............................. ............... ........... ....................... ............................. ........................... ......................... ........................... ............................. ......................... ............................... ....................... ............................... ............................. ........................... ............................. ................................. ........................... ............................... ........................... ............................... ........................... ........................... .....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):124
      Entropy (8bit):3.5980244129747705
      Encrypted:false
      SSDEEP:3:XCbVSm/tluMmvn95lWhiTCkznwOt/V/+Fn:Sv7mvn95l+iTCkLwOt9/+F
      MD5:169F2FF7D98CB2A54449E789069B9A06
      SHA1:5513F0CE09DE00CAEAA0050967FDE6477A670F38
      SHA-256:5B658B61B81993EC1F7D12FAAF2DA0A165B72E8ACA451C57C2A5441955D95DD0
      SHA-512:C666A467DD062CC22442AA4D42BB18DE3A22E794D203EF15B9E3026560244726871BC0B57E7765A0FD9CD301A64CFDF67C3A466F6BAE779D385018EA1360F134
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~...................NS......o........................ ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):904
      Entropy (8bit):4.60945162615726
      Encrypted:false
      SSDEEP:12:5bAWyfWyci/eihnaMLqKHzFaMXMB7milLDL4lln4EfDkKVL2bUvvzrz2GTjnHXsF:hAT1/damNc0+NX4X4ukY2Azrz2GTr8F
      MD5:2F40F00FA94A048A0CE73AA75C55B2DA
      SHA1:B879C9C4FC85A2AB99A54203CE6D657F5340114E
      SHA-256:5BCB82754164C667256BAF6AF1D6037ECDCDB2DAEAE4B7BCAD44C271DCC148B4
      SHA-512:B9F69C43765F9AA3295D213CA0D507C70DD742504DF841EC00BC98C4F4BB55E5D11A7E049D4E512D2E3103E4A07F0F3E3FDB9289976159C9BBEE1EAD30ECBFDE
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~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c.....?.................................W.........+...o.......\...............................z.....Q.............................-...........W.........+...C.o...............................................W.........+...C.o.....0..P3..P6..P9..P<..P?..PB..PE..PH..PK..P............... ...P... N..P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):2.9886793699589003
      Encrypted:false
      SSDEEP:3:XCbVTtkJtldelFal9lcmdk/9Y4V:SBtkJUlY8md+B
      MD5:85CEE841BDC8B2D3A0B6544576DBEAD7
      SHA1:05C1647984FB86E890697B162A14E86D77506A9E
      SHA-256:2C2D2E70731EE8D8A596F4DAAE3C37AFDBDA3E1D4749C1CAE3CC0A0F089457BE
      SHA-512:80E6371924D1358C1CE7698E9EE1242E1B1121D48C00CCED521D0E60ABF4F62BF6D2BFFB15039DB7C0C335BA0A0BCF39A59C23AFE591BC95220ACF20572096A1
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .............................i~...b.u.d.d.h.i.s.t.....S.......J....P
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):92
      Entropy (8bit):2.768295007707197
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlF112lYlilljXZl916:SBtkJclIil9XZl9s
      MD5:4A961CCB7DD7A06BCD13A045A1B5A1E4
      SHA1:7F4A21794BE6C657423B6A14995EB9CB9700B788
      SHA-256:06919C5A4235F272011337486F6316740FC36D66C1966EE60961B5FF2592E04A
      SHA-512:F232D010796C3F65C9B1DF10CE98DB4EF4CAC6D91F74388A13EF6F009372C5043D7D602F72D380F71E00E1FF6C03571BDA9CB800D55257DBF50975E6CE5C9019
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.............................i~...f.i.l._.P.H...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):368
      Entropy (8bit):4.213539328812314
      Encrypted:false
      SSDEEP:6:SvyCllhbrul8+vTCkXz3EEW+ElHEleEeezlvPKYVAClfWLlmVehszUbtk1dkREF:BmK8+L1EdElQtxsc8Ihs1+Rs
      MD5:88C867D25268AC1462F923C728294CAB
      SHA1:4447F50A2AB23E12DC3C2D9E82D3161ADA35F2C8
      SHA-256:888C29490B9F2E42E14C42FF5DCAA69ED6873DF6B5C9465CF9F7247B47F290C5
      SHA-512:2FFC654CDE020005755FC091D04F0785FC17B876AB2A4CB9AE901FBE169507C8513FDF60ABF28DE05615EB8791700ADFAB3B1AA295B2EFAB7E60AF48B53C5F00
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................L.. ........T...T...........;....i~...A.U.D.$...N.Z.D.$...P.a.. a.n.g.a. .T.a.. e.. i.l.o...T.a.l.a. .f.a.k.a.h.a...a.m.o.a...P.a...a.n.g.a. .f.a.k.a.t.o.n.g.a.......................?.@...../.......................@...../.................'.W...O.......?...B...E...H...K...N.....'.O.......T..PW..PZ..P]..P............;.. Q..PE.. `..P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):25244
      Entropy (8bit):4.889800301143363
      Encrypted:false
      SSDEEP:768:LJsomVIGBnJGp2F3JPKEow0+GJuWYT+XI4CBPiI75Of:LJsomVIGBnJGp2F3J1ow0+Gmi44Sb9Of
      MD5:B4769B615A8F5D94CAC4D9EE8B305ABB
      SHA1:3BE922C8EC92D36E7B9CB4B036F45F8D981F7896
      SHA-256:4AB0B84C8AF30FC853A97B267A24022E5458C58F643F4CDEDF90EFF2FE0EEF63
      SHA-512:2C6E390F46EFB9D1F5CDE00E10C013F0B97D299D77D1AD5512AD332CE11FE2B09FC4DC2F513F88B5464C94BDC6DC66F9DA54348F6CE99DC10A3305CE6701EC36
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..b...................K.....i~...A.l.t.1.n...G...m..._...P.a.l.a.d.y.u.m...P.e.r.u. .0.n.t.i...P.e.r.u. .s.o.l.....P.e.r.u. .S.o.l.....W.I.R. .A.v.r.o.s.u...W.I.R. .F.r.a.n.g.1...A.B.D. .d.o.l.a.r.1...C.F.P. .f.r.a.n.g.1...J.a.p.o.n. .y.e.n.i...R.o.m.e.n. .l.e.y.i...A.B.D. .D.o.l.a.r.1...C.F.P. .F.r.a.n.g.1...F.a.s. .F.r.a.n.g.1...J.a.p.o.n. .Y.e.n.i...B.u.r.m.a. .K.y.a.t.1...F.a.s. .d.i.r.h.e.m.i...F.i.j.i. .d.o.l.a.r.1...G.i.n.e. .f.r.a.n.g.1...H.a.i.t.i. .g.u.r.d.u...I.r.a.k. .d.i.n.a.r.1...R.u.s. .r.u.b.l.e.s.i...S.1.r.p. .d.i.n.a.r.1...T...r.k. .l.i.r.a.s.1...0.r.a.n. .r.i.y.a.l.i...^.i.l.i. .p.e.s.o.s.u...F.a.s. .D.i.r.h.e.m.i...F.i.j.i. .D.o.l.a.r.1...G.a.n.a. .S.e.d.i.s.i...G.i.n.e. .F.r.a.n.g.1...G.i.n.e. .S.y.l.i.s.i...H.a.i.t.i. .G.u.r.d.u...I.r.a.k. .D.i.n.a.r.1...M.a.l.i. .F.r.a.n.g.1...R.u.s. .R.u.b.l.e.s.i...S.1.r.p. .D.i.n.a.r.1...0.r.a.n. .R.i.y.a.l.i...^.i.l.i. .P.e.s.o.s.u...F.i.n. .M.a.r.k.k.a.s.1...M.a.l.t.a. .L.i.r.a.s.1...Y.e.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.917999040607968
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDklU8gl8l/dKSlH3s0S:SBtkJYlU8g8l/d/d3s0S
      MD5:DDBF4F267F436E5B2BF36BA490D37A57
      SHA1:AAFBD9B971C2E02CB86BB9789AD00C3128E54084
      SHA-256:FD7452416A9A0690CCC83D32596EAFC58C9F279402582FD2934F81D4D1DF69FB
      SHA-512:044BE61439C98901029DC0F8BCC246396E6E836D35E6DEB26ED34B190EBAD43FC1C3A9FFD522E9AB86A29A07A1A5C573C80099BEFED69B3EF739FCD946B2482B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.............................i~...u.z._.A.r.a.b._.A.F...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.9159246284584364
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMe/ut6E7l+Vbr+0mli:Sv6t6gYbrlmli
      MD5:1960AD3959332481F6D916F056B52339
      SHA1:CEA9C67AFC66F20E4104CB6AA2DF781BCCADFD5A
      SHA-256:DCB5A6234F2F38BECE4039140F59EA549C5CEF8191CDA68FDAE9D5B6106D9B4F
      SHA-512:C7BE9FB55877D5418AFB221F94F131E02A2C88C55216E2A1B9967B3DDE70B47336D8878B97CB64228A7DDDA55DC4665517F1F8E8DF2B997E2895AFE62F9A3986
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.............................i~.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):836
      Entropy (8bit):4.807826091118605
      Encrypted:false
      SSDEEP:12:mlUNtOaxijlw0+CzJ1WUNxupJLjQXHm3XcfwYXg4YgQYYwS/YgwYYCS9lgAF:mE9i1+wJ1Wuxu/g+M4PHXHCXnCS/gAF
      MD5:F09BA6EC637887BF827CE42F664D181E
      SHA1:E8B2FB8468FE264361EC4A788641E06461A94764
      SHA-256:CD71CE1AFEB8C8186B7EFE0554748EE91D8F1B9CB38F8E7E96BA39BF29594523
      SHA-512:17A26D4186AAECAE49AE06F9A992580DD3A11A20DB5E22486F2B76A4ED192074CE6911CF920ACA84614EAFE758124C1BC9455282318C07B78CC8783FD8133573
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..j.............:.......U....i~.......ez..........,...z.....~..z....i8.....z..f....j..........n......Z8..b.vz....pT........\.x...&..%..r.!z..*.0T....K8..........$...........@T.....8.... T.....z....~............T....Tz..".......PT.....z..........`T...........z.....T..........................*.......R......z..v.Cz..w.......2z.....z.........`.).`.......`$..`....v..`HJ.`.......`.j.`.......`.<.`.......`.#.`.......`;..`.......`.5.`:.....'.C.G.c.s.w.{...........................+./.;._.c.o.s.{.............................#./.3.;.K.c.k.o...............U...................................X..............."...%...(...+.......1...4...7...:...=...@...C...F...I...L...O...R...[...U...X...[...^...a...d...g...j...m...p...s...v...y...|...^...a...d...........................g...j...................m.. ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):584
      Entropy (8bit):4.407512034023909
      Encrypted:false
      SSDEEP:12:blmebAeeQMe4OCtqFNwuL8iJmRWiJXbR8TM0Ftavt7uNcsCSFz:bLAQ7rKR9R8o03avBuNcsC2z
      MD5:A8EE52CBA875B8C8E3CE9AC7FE4B8180
      SHA1:8C8CA9D1DDEF698405887FA0386CED852F5E528A
      SHA-256:C73552857FB89A29804AD6684FAEA24FFC6301C4A55D039DEE0D6A878A139EC1
      SHA-512:F0D266D850F7AC7023707759463FAAACE788CB407A76B3EDA5FEAB72275AB86DE7855674630C811F5342AC46A8904A8A3EF7F675A3F0EA3D75552A1CE18A1E1B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .2....................2.g....i~...I.n.d.i.a.i. .R.u.p.i.e...I.n.d.i.a... .R.u.p.i.e...C.h.i.n.e.s.i.a.i. .Y.u.a.n...C.h.i.n.e.s.i.a... .Y.u.a.n...U.n.b.e.k.a.n.n.t.i. .W...r.i.g...B.r.a.s.i.l.i.a.n.i.a.i. .R.e.a.l...B.r.a.s.i.l.i.a.n.i.a... .R.e.a.l.......|.....M.....h...\.._....3...........1......X....k.........|.......\.M.......h.h........_._......@.3.................1.1........X.X......k.k...............W.........+...o...n...q...t...w...z...}.................W.........+...o......P...P...P...P...P...P...P...P...P............g.. u.. ...P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):1892
      Entropy (8bit):4.384562017949789
      Encrypted:false
      SSDEEP:48:nYSLiPgL11tOOaIRiq31vQcolFDow2T+5QsgV3zb:nYSLiPgL15DRiPZopDTV3zb
      MD5:B89B57691C731C580E4B2597F2016B73
      SHA1:8BE9AF989ED73CB75497C3EC31E4D06D1F13D475
      SHA-256:04A7133D4591A127D31C2C411B2B3AB0602E3CC1DC612D2F729C497928604A6F
      SHA-512:E0D20BFBDD093454B95126A70936F678871B987CA3E43BEF6F93A55764E04261AA5F92603506B5F56844729B4FAC5BB31C9526C8C453F438AC1406708F3BFE25
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .sl.............9.......D....i~...L.e.w.o.n.e...L.o.t.i. .y.a. .L.e.s.o.s.o...Y.e.n.i. .y.a. .J.a.p.a.n.i...D.o.o.l.a. .y.a. .K.a.n.a.d.a...F.a.r.a.n.g.a. .y.a. .G.i.n.i...K.w.a.n.z.a. .y.. A.n.g.o.l.a...B.i.i.r.u. .y.a. .E.s.y.o.p.y.a...D.a.l.a.s.i. .y.a. .G.a.m.b.y.a...D.i.n.a.a.l.i. .y.a. .L.i.b.y.a...D.o.o.l.a. .y.a. .L.i.b.e.r.y.a...P.a.w.u.n.d.a. .y.a. .M.i.s.i.r.i...P.u.l.a. .y.a. .B.o.t.i.s.w.a.n.a...R.u.p.i.y.a. .y.a. .B.u.y.i.n.d.i...D.i.n.a.a.l.i. .y.. A.l.i.g.e.r.y.a...F.a.r.a.n.g.a. .y.a. .J.j.i.b.u.t.i...F.a.r.a.n.g.a. .y.a. .b.u.r.u.n.d.i...D.i.n.a.a.l.i. .y.a. .B.a.a.r.e.e.n.i...N.a.k.i.f.a. .y.a. .E.r.i.t.u.r.e.y.a...P.a.w.u.n.d.a. .e.y.. e.S.u.d.a.a.n.i...D.o.o.l.a. .y.. A.w.u.s.i.t.u.r.e.l.y.a...P.a.w.u.n.d.a. .y.a. .B.u.n.g.e.r.e.z.a...E.s.i.k.u.d.o. .y.a. .K.e.e.p.u. .V.e.r.e.d.i...P.a.w.u.n.d.a. .e.y.. e.S.e.n.t.i. .H.e.r.e.n.a...Y.u.w.a.n.i. .R.e.n.i.m.i.n.i.b.i. .y.a. .C.a.y.i.n.a...F.a.r.a.n.g.a. .y.a.m.u. .A.f.i.r.i.k.a. .y.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.8446240823663436
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlgelU8gl8l/dGKlAl6lazlI/kx:SBtkJZlU8g8l/dDal6leGkx
      MD5:75B011D02D63B77CA0C21C3F35552109
      SHA1:2D1B0EC3BD811D1D74B726036BAF731F4E9C9194
      SHA-256:A564B942279C3F05AC249F7148F6C925C5199A10DFF6702F57C97965A2247D7E
      SHA-512:061B71932A3020B9030EB5C291F30E87683110FA75E7CF6496C398609104A1F95E82670DFF8AB5763510D1A1D3C07A4258FC296C6F9C66A6F8BDD800F4DE272C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.............................i~...y.u.e._.H.a.n.s._.C.N.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.948690746822556
      Encrypted:false
      SSDEEP:3:XCbVSm/tlM0E/66E7lXr+uhL:SvO/66gXr/N
      MD5:26EA16780F22AEE7F9C7214AE43A2112
      SHA1:7B1B1CB9DA311A503EF14177139AD5E19F569A01
      SHA-256:4CF80C1BEB6035861DB18C3E0EE97998B37948A3087B9D3984B19517E5567749
      SHA-512:CB3FAA598B8862EED58EAE2874666D58E161B9A5559D47BE9618F5744FA4DC38E56C8FF9A75D9E49D00611D19C5AAE558D087D3C91D61D60917EFD18050629E9
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.#....................#......i~.......".
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.937999040607968
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDklU8gl8l/dFZRysr:SBtkJYlU8g8l/dFZv
      MD5:9646047BCCEACAEAB2803D2396A9C46D
      SHA1:FA843E3E3DEDE95B251AE0858A52C2C1773D28F0
      SHA-256:41176DB75B4AA71856B7284865D41DD2C37DD8FEFF838DEC665F4B29D2915BEB
      SHA-512:A3786F18538D2080E2FE5C8C0E6675C33B8A958D59520B0A0B62E737B258E5A0AFB3453B4C9DB100226FFA3AAB178427C979B8E6F5ED4EA2EE3CBC58509CE594
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.............................i~...z.h._.H.a.n.t._.M.O...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXEl0t6E7lFEKe:SvKM0t6gCKe
      MD5:CF788FA9793FEA6104E904FBA48B9ADE
      SHA1:5105A53F269A6C445FE58F0AB7BB501BF5790960
      SHA-256:D49D36962528CD70E638FE62C2A675838D5F6D13C229F6A107530D58C458D100
      SHA-512:B07CED3B04E2CE33B0FA215AE03002E666D5408F31ADE8FE84F46E2A7474D277B40887F090D5DB6ABEA58B6A8DF385F952DD614979AD903AAF31B524A06AA93B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):19332
      Entropy (8bit):5.419925826094204
      Encrypted:false
      SSDEEP:192:BCH7yddL0RIuwGjIaE89EGh2hupscziGV5UzhxKUyShhpCSMx9UGauBrKeS:BCH7yL/uwGUzBhuphz5exHyShhaxmGXi
      MD5:7F2F2773D81477A2BA2DC5334E418CC1
      SHA1:490CD01A6D1A2B249BE2EDD25BF649C9DF09C72C
      SHA-256:28990FB74EE58F9136E37FD097DB00A50A662FD8791AEBBD4677C74DA34AC1A8
      SHA-512:5D0508B329D13E227D52038208F1599EC05FC0573E55132CE814398B0868E0CF9E6D44339E72A9F30DC2909E2EC29D2705D56D616E45474BB425DA122296B1B9
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................V................A.w...D.i...S.o...W.T...D...i...O.r.t...T./.J...W./.M...T.o.b.i.....s.a.r...l.Y.r.r...A.f.f.e...F.r.a.u...H.a.h.n...H.a.s.e...H.e.r.z...H.u.n.d...K.a.n.a...M.a.n.n...T.i.e.r...P.a.o.n.i...P.a.o.p.i...T.h.o.u.t...$.a.m.l.e...*.Y.d.a.r...A.b.e.n.d...N.a.c.h.t...h.e.u.t.e...I.j.j.a.r...S.i.w.a.n...V.o.r.m.....N.a.t.u.r...P.f.e.r.d...R.a.t.t.e...S.e.p.t.....S.p.o.r.t...T.a.s.t.e...Z.i.e.g.e...j.e.t.z.t...G.Y.n.b.o.t...H.a.t.h.o.r...M.e.s.o.r.i...T.a.+.[.a.[...l.Y.q.Y.m.t...M.i.t.t.a.g...M.o.r.g.e.n...a.b.e.n.d.s...n.a.c.h.t.s...K.i.s.l.e.w...N.a.c.h.m.....T.a.m.m.u.s...n.a.c.h.m.....A.n.d.e.r.e...B...f.f.e.l...D.r.a.c.h.e...F.l.a.g.g.e...K...r.p.e.r...P.e.r.s.o.n...P.f.e.i.l.e...R.e.i.s.e.n...S.m.i.l.e.y...W.e.t.t.e.r...Z.e.i.t.z.....A.s.h.a.d.h.a...C.h.o.r.d...d...E.s.s.f.a.n.d...M.e.s.c.h.i.r...V.a.g.u.m.e.n...m.o.r.g.e.n.s...S.c.h.e.v.a.t...T.i.s.c.h.r.i...F.l.a.g.g.e.n...G.e.b...u.d.e...G.e.p.a.a.r.t...O.b.j.e.k.t.e.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):588
      Entropy (8bit):4.57320275301365
      Encrypted:false
      SSDEEP:12:oXEfyl2CBXlU+pjxrUxXlU05p4wP8TppiPPUotr8oVs0:oXuRaOkxAxOUP83iPcAIG
      MD5:E670379BAD562D53F6C9D9E05A7EE576
      SHA1:4960472CE76A72BB21E0A03D0E3CD15685FAF82D
      SHA-256:837DC87AEB9BDC01B18DDE833EF23D10AA2406491CED00BFC4EA47F8FFAD8B8B
      SHA-512:5C586A977B20DE758210770FFB935DAD159BE32D8CF51EBE0B31A3DCCA844D65A6A1C898FF1725495B460290A7F7F62B572FD4464AA4813FF4C86600F0E74C40
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................\........D.i...S.o...T.a.g. .d... .J.....W.o... .i... .M.....W... .i... .M.o.n.....W.o.c.h.e. .i.m. .M.o.n.a.t...W.o.c.h.e.n.t... .i... .M.o.....W.o.c.h.e.n.t... .i... .M.o.n.....W.o.c.h.e.n.t.a.g. .i.m. .M.o.n.a.t.........y......................T.Ts#.Q................H..s.b....*..................%....Z.....I.....9.........H.!.W.C.M..B..........i..Pn..P....\.. ..!.s.......b.. ....d.. ..`.f.. .......P....>...........'.6.L...{..P~..Pj.. ...P...P...P...P...P...P...P..O.......W.|.. ....[...o.w...D....`...``.. ...`h.. l.. ~..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXEl0t6E7lFEKe:SvKM0t6gCKe
      MD5:CF788FA9793FEA6104E904FBA48B9ADE
      SHA1:5105A53F269A6C445FE58F0AB7BB501BF5790960
      SHA-256:D49D36962528CD70E638FE62C2A675838D5F6D13C229F6A107530D58C458D100
      SHA-512:B07CED3B04E2CE33B0FA215AE03002E666D5408F31ADE8FE84F46E2A7474D277B40887F090D5DB6ABEA58B6A8DF385F952DD614979AD903AAF31B524A06AA93B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):10024
      Entropy (8bit):5.547764666835321
      Encrypted:false
      SSDEEP:192:ctlyalAJEBJMInGA64W/H5q3aiAlt0VV50dg5QyL4pkbB6HTWlp1+:crWP5/9thQQDelp8
      MD5:B3F6199FDE5D1E86BD090D721D01C041
      SHA1:812E437F5F438312739F106D0B4A7C74D61937C5
      SHA-256:B2CE4567252D640C2B266DB61A85F1C9DF924E45EDDCC334FAB7C94D93BF542A
      SHA-512:15167646D16A155B878020507C8C1C06FF7B9BEE0BCB8936CE629F6FC2A6C09523D39B601AF47A72D0E4B823548A3A810CE6FDD3464DBDB3CE521362CB5031E7
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................1...............n.j...p.....p.....s.r...p...n...p...t...s.o.b...s.r.j...s.t.w...w.a.B...a.w.g...m...r...a.w.g.....c.o.r.a...m.a.j.....m.a.j.a...m...r.....m...r.c...n.o.w.....B.o.n.i...a.p.r.y.l...m...r.c.a...w.i.t.[.e...w...t.p.....z.n.o.w.a...z.i.n.s.a...s.r.j.o.d.a...a.p.r.y.l.a...e.p.o.c.h.a...g...z.i.n.a...j.u.l.i.j.a...j.u.n.i.j.a...l...t.o.s.a...t.o. .p.......t.u. .n.j.....t.u. .s.o.....t.u. .s.r.....t.u. .w.a.....n.j.e.z.e.l.a...w.a.B.t.o.r.a...a.w.g.u.s.t.a...j.a.n.u.a.r.a...o.k.t.o.b.r.a...t.e.n. .p.......t.e.n. .s.t.....t.u. .n.j.e.....t.u. .s.o.b.....t.u. .s.r.j.....z.a. .{.0.}. .z...z.a. .{.0.}. .g...z.a. .{.0.}. .m...'.z.e.g.'... .H...a.m.e.r.i.s.k.i...b.r.i.t.i.s.k.i...f.e.b.r.u.a.r.a...m.e.t.r.i.s.k.i...n.o.w.e.m.b.e.r...n.o.w.e.m.b.r.a...t.e.n. .p...t.....t.e.n. .p...t.k...t.e.n. .s.t.w.....t.o. .p...n.j.....t.u. .w.a.B.t.....p.[...n...l...c.....p... .C.h.r...n.....p.[...C.h.r...n.....t.e.n. .t.y.z.e.D...t.u. .s.r.j.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2172
      Entropy (8bit):5.152976967217277
      Encrypted:false
      SSDEEP:48:s3ASPkvcjdXeM82L8hGwQeyYalIGMhmVbWpFVkme:sXKidXebJvyDlVXdW7I
      MD5:D30165FDE0C4929AE82A4BD11846D1AA
      SHA1:D0E4AB8445DA08A0E7FEBD99C8BCBB09DDFB9091
      SHA-256:5C0DCF5801B243528806DF4E40B332712CE4FA79C7D8FA656B808CE7C7F8B62D
      SHA-512:2480C3C355F9EDE0093E42E38C9C34F6423B1BF74E97046CD0EA95F8353734A694C399FA33232A7520AC99D6C8659146293F1AE6B822176595A24FAE7157A503
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................................W.....t...s.T.K...d.i.K...d.i.S...e.l.....e.m.i...e.s.a...e.s.T...k.w.a...m.a.d...m.b.....m.u.k.....t.i...K.g.i...W...n...m.T...s...n.y.[.t...n.d.u.1...n.d.u.2...n.d.u.3...n.d.u.4...s.T.K.[...K.g.T.n...S...Y.s...i.d.i.S.a...k.w.a.s.....k...[.l.[...m.b...Y.s...m.T...s.....n.d.T.k.T...p...n.d.....p...n.d.....K.g.i.s.....e.b.y...m.u...d.i.S...S.....t.i.n...n.....K.g.a.n.d.[...K.g.T.n.d.[...W...n.[.s.....d.i.m.T...d.i...e.l...K.g.[.....e.s.a.S.a.s.....m.a.y...s.[.....m.u.k.T...s.....n.y.[.t.[.k.i...w.[...K.g.[.....d.i.K.g.i.n.d.i...e.m.i.a.s.e.l.e...e.s.T.p.[.s.T.p.[...[.h. .q. .v. .x. .z.]...m.a.d.i.S.[...d...S.[.....e.p.a.s.i. .a. .b...n.y.....k...[.l.[. .n...t...m.b.......m...n.y... .m... .d.i.s.a.m.a...n.d...m.b.k. .n.y... .S.o.s.....S.o.s.o. .S.w... .y...S.e. .l.....m.b...s.a. .k.w...d.i. .a. .Y...s...n.d...m.b.k. .n... .l...n.d.[... ...S.a.....n.d...m.b.k. .n... .l...n.d.[... ...l...l.o...n.d...m.b.k. .n... .l...n.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):10376
      Entropy (8bit):5.1589056607368
      Encrypted:false
      SSDEEP:192:QWCjUNAvEMlKNZgsaHq8EWktI55Ha2aJ761id7lYl1:BCQNpDaK8E/toHD1GlQ1
      MD5:43924655E6FE7A25523653D0B54F7BD6
      SHA1:4403ED81E4633A7D4086F4C3DFDA9635DD9ECAF5
      SHA-256:90E119321C04C1E8849149CB409F38C9022072D8AAD4974E68629FA9B2B90CE7
      SHA-512:326B7BA34792B96E87327C72F0706F150134E2EA76B4F4A3F2AE1F278F6EE947FCB317A30130471C46A574EB338A9481A2C179B545A90159ABA7F661A7FFF60F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................/.......)........c...z.......e...B.K...E.K...k.1...k.2...k.3...k.4...Y.K...u.k...K.d.i...f.i.....K.d.T...k.T.s...b.l.a...d.z.o...f.i.V...k.u.V...m.e.m...y.a.w...a.f.T...a.n.y...d.a.m...d.e.a...d.z.d...d.z.m...d.z.v...k.e.l...m.a.s...t.e.d...........m.n.n...k.u.V.a...k.T.t.a...d.a.m.a...f.i.V.a...k.e.l.e...m.a.s.a...e.g.b.e...f.i.f.i...c.e.t.r.T...f.T.K.l.i...c.l.e.t.i...b.l.a.V.a...d.z.o.m.e...d.z.o.v.e...d.z.o.V.a...a.f.T.f.).e...a.k.p.e. .0...d.z.o.d.z.e...k.T.s.i.V.a...t.e.d.o.x.e...y.a.w.o.V.a...s.e.k.e.n.d...{.0.}.l.i.a.....e. .s.i.a...s.i.a.m.l.T.m...a.k.p.e. .0.0...a.n.y.T.n.y.T...m.e.m.l.e.V.a...a. .'.g.a.'. .h...a.k.p.e. .0.0.0...b.i.l.i.T.n. .0...m.i.l.i.T.n. .0...f.i.V.a. .s.i.a...k.u.V.a. .s.i.a...0. .t.r.i.l.i.T.n...b.i.l.i.T.n. .0.0...m.i.l.i.T.n. .0.0...c.l.e.t.i. .s.i.a...Y.e.s.u. .K.T.l.i...a.V.a.b.a...o...o...b.l.a.V.a. .s.i.a...d.z.o.V.a. .s.i.a...K.k.e.k.e.a. .m.e...b.i.l.i.T.n. .0.0.0...d.e.a.s.i.a.m.i.m.e...k.T.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):20080
      Entropy (8bit):5.594840726632198
      Encrypted:false
      SSDEEP:384:CWjQdrQwga499PIt1nj7RVVV/QnSlR8L/M7FyBUJB13:YgjGj7RVVV4ZxUt
      MD5:AE5A517806D5DD37E2AB2EF0367F226D
      SHA1:32AC730310CE8BDCB2AC320C7382B332DF1608FF
      SHA-256:58C4267DE832932A98607547B1860B352E7506098DA9D7306ECDF7230FE13CC5
      SHA-512:067D7E55FD64D6CF856F1D5722D056DD7A5E047727AB1195C415DDC3F99BA89CCF6F97EA2DD915B3E26E8D8CA8BB0F98775513E099242247E5850BE8E99B3539
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................z.. ................V....................................................................1.....2.....3.....4.....................................................................................................................................................................................................................................................................................................................g.r.e.k.........................................................................................................................................................................................................................................................................................................../...................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXEl0t6E7lFEKe:SvKM0t6gCKe
      MD5:CF788FA9793FEA6104E904FBA48B9ADE
      SHA1:5105A53F269A6C445FE58F0AB7BB501BF5790960
      SHA-256:D49D36962528CD70E638FE62C2A675838D5F6D13C229F6A107530D58C458D100
      SHA-512:B07CED3B04E2CE33B0FA215AE03002E666D5408F31ADE8FE84F46E2A7474D277B40887F090D5DB6ABEA58B6A8DF385F952DD614979AD903AAF31B524A06AA93B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):3412
      Entropy (8bit):5.584446588534467
      Encrypted:false
      SSDEEP:96:Hg0uiTualeUQgHi2rp+Ff1oNmck+lV9YL9r:Hg0uiT1AxNDcF98r
      MD5:3FEC1D99E7260B742A5FE169CF298877
      SHA1:909CAC90785875A4815C9FB0C9B09CD1180919C3
      SHA-256:49765DE09FBCD1BF53A893F6509FF2EF0884D7CCBC6077915B0DF38D336DD179
      SHA-512:C4D496CC65E80F9B578451E241D25FE47B80D35BFA3459361A00EB99606283309ACFA974AEB619BA4219840B7CFE93CCE6473038A9FBB29AB9A6F6FCBB61272C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................H.. ........M...M... .......$........w.k. .o.f. .m.o...l.a.s.t. .F.r.i...l.a.s.t. .M.o.n...l.a.s.t. .S.a.t...l.a.s.t. .S.u.n...l.a.s.t. .T.h.u...l.a.s.t. .T.u.e...l.a.s.t. .W.e.d...n.e.x.t. .F.r.i...n.e.x.t. .M.o.n...n.e.x.t. .S.a.t...n.e.x.t. .S.u.n...n.e.x.t. .T.h.u...n.e.x.t. .T.u.e...n.e.x.t. .W.e.d...t.h.i.s. .F.r.i...t.h.i.s. .M.o.n...t.h.i.s. .S.a.t...t.h.i.s. .S.u.n...t.h.i.s. .T.h.u...t.h.i.s. .T.u.e...t.h.i.s. .W.e.d...i.n. .{.0.}. .w.k...i.n. .{.0.}. .y.r...i.n. .{.0.}. .h.r...i.n. .{.0.}. .m.o...d.a.y. .o.f. .w.k...d.a.y. .o.f. .y.r...i.n. .{.0.}. .m.i.n...i.n. .{.0.}. .s.e.c...{.0.}. .h.r. .a.g.o...{.0.}. .m.o. .a.g.o...{.0.}. .w.k. .a.g.o...{.0.}. .y.r. .a.g.o...{.0.}. .m.i.n. .a.g.o...{.0.}. .s.e.c. .a.g.o...w.k.d.a.y. .o.f. .m.o...{.0.}. .F.r.i. .a.g.o...{.0.}. .M.o.n. .a.g.o...{.0.}. .S.a.t. .a.g.o...{.0.}. .S.u.n. .a.g.o...{.0.}. .T.h.u. .a.g.o...{.0.}. .T.u.e. .a.g.o...{.0.}. .W.e.d. .a.g.o......h.B7w.3E.K....,...B.B..................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):960
      Entropy (8bit):5.757935503161978
      Encrypted:false
      SSDEEP:24:Ns6sVBu5RklU8DaUDkHcgkFGDjuMSGt9f:+RVBu5AU8eUQ8VGDifu9f
      MD5:74DA98DDF2F132C0276E5E05A7EC5824
      SHA1:1B8FFBC90C4E6ABCD36C222C9C4447EBF6BB3916
      SHA-256:F380F07C082FB6D5CC4034BB096A6100B076BC7C6FBD809E44D55EEF4765DE25
      SHA-512:E56B4E82D0B3BCA0770D47016710DCA56FD3A4B986696170657B4DFAB74FEE9D2C75D0A2073DFDBAF4D9192442E82E626BFAE9A6C496A417E6240E325A6BC535
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ...................................h.B7w.3E.K....,...B.B......................!..... ...........!..V..?....C..4.4D....,.,.,.V...,....$.......$./.LO....$...v.....$.lNlN..............$...8.8.8.....$...?.........$....q.=.....$..........h.B7w.3.wEy.......B.B....................................!............&...DJ..4!....Cpi..?..N.C..4.4..{.pi........$.......$./.LO....$...v.....$.lNlN..............$...n.n.n.....$......a.....$.....zN.....$............h.B7w.3.wW*eh.....B.B........................W.!......... ....D!.pi.....C..4.4.4.)...eh......$.......$./.LO....$...v.....$.lNlN..............$...8.8.8.....$.............$.....N......$................!......... .2..P7..P<..PA..PF..PK..PR..PY..P`..P......5........P... ........!......... ....P...P...P...P...P...P...P...P...P......5.g...u..P... ........!......... ....P...P...P...P...P...P$..P+..P2..P......5........P... ......`.... ... ... ..o.w...f$.`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.147089260374425
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXElzxlf6tP9hn:SvKMH6tX
      MD5:DBED6CBF5B4E215E7BC058594652C5C6
      SHA1:14FF2242EB58DED4AE8DA0315F21AD1894CC848D
      SHA-256:DF819C5400D36259BCA9E3F7FBDAFB6F2DA2FFA00C5CF03695D3A1A5A20E8592
      SHA-512:0312DC0174E32ABA5FDC8EDC21D06DD613F0BC9BB24E1E502902379B997406D4B5E2A0C17E48BF582594C5D0988FA8DD3FD9A1CCC9FC386C4E453683196F2EC8
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.....................................o.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXEl0t6E7lFEKe:SvKM0t6gCKe
      MD5:CF788FA9793FEA6104E904FBA48B9ADE
      SHA1:5105A53F269A6C445FE58F0AB7BB501BF5790960
      SHA-256:D49D36962528CD70E638FE62C2A675838D5F6D13C229F6A107530D58C458D100
      SHA-512:B07CED3B04E2CE33B0FA215AE03002E666D5408F31ADE8FE84F46E2A7474D277B40887F090D5DB6ABEA58B6A8DF385F952DD614979AD903AAF31B524A06AA93B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2468
      Entropy (8bit):5.602184732072754
      Encrypted:false
      SSDEEP:48:Y4cP2obFaRzrvhr5tcvpZ7Fzrbb+IWdoz6oSw+:Y9tU99yPbbiq+oI
      MD5:6AFBCEAB26E9CDB7A0C3978067D715EA
      SHA1:157A048D6EED10EC0B881D98025FFAE2A741D565
      SHA-256:919F775692A2A75954C984F924CD13957534C8C3093B662641634D1A8B9B3556
      SHA-512:17F287355174E167333397B21ED5894E8994333EA3CAE26689AF10F2C49351390AEC6387CF58ABD06314872946127B19A94176B2E63F3EF4C7E0BC8823C95E79
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................T.. ........a...a...........E........F.....T.h...T.u...W.....S.u.....T.h.....T.u.....M.o.1...M.o.2...M.o.3...M.o.4...M.o.5...M.o.6...M.o.7...M.o.8...M.o.9...[..!]...m.i.d.d.a.y...a.t. .n.i.g.h.t...w.k. .o.f. .m.o.....i.n. .{.0.}. .h.r.s...i.n. .{.0.}. .w.k.s...i.n. .{.0.}. .y.r.s...i.n. .{.0.}. .m.i.n.s...i.n. .{.0.}. .s.e.c.s...{.0.}. .h.r.s. .a.g.o...{.0.}. .w.k.s. .a.g.o...{.0.}. .y.r.s. .a.g.o...{.0.}. .m.i.n.s. .a.g.o...{.0.}. .s.e.c.s. .a.g.o...w.k.d.a.y. .o.f. .m.o.........3...........W.s...z.^.................!.%.).-.1.".'.,...P<>Id=.HD<L=.V.H.<X=2a.W.... ........$..h.h....$.......$............h.B7w.3.wW*ehc....B.B........!..N......:.........V....\........q.l,....:.........V....\........q.l,............/.T|.c^..ca.9............./.T|.c^..ca.9............./.M|.c^..c@.9.../.9.../.9.../.9...=.1.5.M.a.E.A...I...9.I..... ......1.B.|......."...L..b...c....>.?...Z....H...f...4...J..:....J..9.9....J.2F2F..J.S...J.....J.S...J.......J..7t.....J..F......
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.147089260374425
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXElzxlf6tP9hn:SvKMH6tX
      MD5:DBED6CBF5B4E215E7BC058594652C5C6
      SHA1:14FF2242EB58DED4AE8DA0315F21AD1894CC848D
      SHA-256:DF819C5400D36259BCA9E3F7FBDAFB6F2DA2FFA00C5CF03695D3A1A5A20E8592
      SHA-512:0312DC0174E32ABA5FDC8EDC21D06DD613F0BC9BB24E1E502902379B997406D4B5E2A0C17E48BF582594C5D0988FA8DD3FD9A1CCC9FC386C4E453683196F2EC8
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.....................................o.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):136
      Entropy (8bit):4.168303237889532
      Encrypted:false
      SSDEEP:3:XCbVSm/tlkAll/tXl7ggOZMCyP98Dn8n8UltslulflFWSkf:SvUA/bXOyxP98j8nxltVTFif
      MD5:8E8F7836852A74DE789DD0F4C71797DB
      SHA1:7509333C6D134B2BAD48486057F91336DC1AA009
      SHA-256:D338E130FAFE30C63A1DDE8B6478A23DCE8D1A3716B776C44FBF9E132A392C32
      SHA-512:4C39DD6462EA0F1F0D674BB06E8A5153A86903A91B0C04166A06C7DF3B511E6CE83CBFE19D7175C010867F97DCB80723C398B4985D68BA162C30DD15B52D1FD9
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ...................................k..)...4.wW*eh.....B.B................`.... ....o.w....`...`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.147089260374425
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXElzxlf6tP9hn:SvKMH6tX
      MD5:DBED6CBF5B4E215E7BC058594652C5C6
      SHA1:14FF2242EB58DED4AE8DA0315F21AD1894CC848D
      SHA-256:DF819C5400D36259BCA9E3F7FBDAFB6F2DA2FFA00C5CF03695D3A1A5A20E8592
      SHA-512:0312DC0174E32ABA5FDC8EDC21D06DD613F0BC9BB24E1E502902379B997406D4B5E2A0C17E48BF582594C5D0988FA8DD3FD9A1CCC9FC386C4E453683196F2EC8
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.....................................o.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):136
      Entropy (8bit):4.168303237889532
      Encrypted:false
      SSDEEP:3:XCbVSm/tlkAll/tXl7ggOZMCyP98Dn8n8UltslulflFWSkf:SvUA/bXOyxP98j8nxltVTFif
      MD5:8E8F7836852A74DE789DD0F4C71797DB
      SHA1:7509333C6D134B2BAD48486057F91336DC1AA009
      SHA-256:D338E130FAFE30C63A1DDE8B6478A23DCE8D1A3716B776C44FBF9E132A392C32
      SHA-512:4C39DD6462EA0F1F0D674BB06E8A5153A86903A91B0C04166A06C7DF3B511E6CE83CBFE19D7175C010867F97DCB80723C398B4985D68BA162C30DD15B52D1FD9
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ...................................k..)...4.wW*eh.....B.B................`.... ....o.w....`...`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):324
      Entropy (8bit):5.179858701245657
      Encrypted:false
      SSDEEP:6:SvC/seapWsuikw/t1FbQ0dv3t4bwT8j8n7k0dv3t4PqhUG/AOKtklh/F:jcWPiVF1FM0dv9g2w0dv9CTGYOjlh/F
      MD5:4ABA537E3FDD9E3F6905F9B5960B211A
      SHA1:E376900C0F2416AF7F87387049E06494BD9B22DD
      SHA-256:934557876DE04EFF7088A7176872A60AEDDDD4AA8623473BCE50F0E784E0BEE9
      SHA-512:6F8A125D0827DFC2005C94663BED3C3DACF9498B76CF72208E85C8BC0FF4A6F63AC495388F6ED3B729CB27C4733446F5883B9FD0F8FBD1879F15B262A337FE12
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................B.. ........I...I...........2.............)......../.NN..'...................I.......Y.0.*..*X..5.7.*.*.P!7.5.5[PVB...OJ*.*.7.wW*eh.....B.B....................I.......Y.0.*..*X..5.7.*.*.P!7.5.5[PVB.............P...P....2.. .......P........(...6..P....`...8.. :.. ......o.w......`6.. ...`>..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.147089260374425
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXElzxlf6tP9hn:SvKMH6tX
      MD5:DBED6CBF5B4E215E7BC058594652C5C6
      SHA1:14FF2242EB58DED4AE8DA0315F21AD1894CC848D
      SHA-256:DF819C5400D36259BCA9E3F7FBDAFB6F2DA2FFA00C5CF03695D3A1A5A20E8592
      SHA-512:0312DC0174E32ABA5FDC8EDC21D06DD613F0BC9BB24E1E502902379B997406D4B5E2A0C17E48BF582594C5D0988FA8DD3FD9A1CCC9FC386C4E453683196F2EC8
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.....................................o.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.147089260374425
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXElzxlf6tP9hn:SvKMH6tX
      MD5:DBED6CBF5B4E215E7BC058594652C5C6
      SHA1:14FF2242EB58DED4AE8DA0315F21AD1894CC848D
      SHA-256:DF819C5400D36259BCA9E3F7FBDAFB6F2DA2FFA00C5CF03695D3A1A5A20E8592
      SHA-512:0312DC0174E32ABA5FDC8EDC21D06DD613F0BC9BB24E1E502902379B997406D4B5E2A0C17E48BF582594C5D0988FA8DD3FD9A1CCC9FC386C4E453683196F2EC8
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.....................................o.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):136
      Entropy (8bit):4.168303237889532
      Encrypted:false
      SSDEEP:3:XCbVSm/tlkAll/tXl7ggOZMCyP98Dn8n8UltslulflFWSkf:SvUA/bXOyxP98j8nxltVTFif
      MD5:8E8F7836852A74DE789DD0F4C71797DB
      SHA1:7509333C6D134B2BAD48486057F91336DC1AA009
      SHA-256:D338E130FAFE30C63A1DDE8B6478A23DCE8D1A3716B776C44FBF9E132A392C32
      SHA-512:4C39DD6462EA0F1F0D674BB06E8A5153A86903A91B0C04166A06C7DF3B511E6CE83CBFE19D7175C010867F97DCB80723C398B4985D68BA162C30DD15B52D1FD9
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ...................................k..)...4.wW*eh.....B.B................`.... ....o.w....`...`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):380
      Entropy (8bit):5.237337917003197
      Encrypted:false
      SSDEEP:6:Sv5A3R71Oy8Z8j8nR6Dhl8MWjdlQ/fQIyB9aaD1j8nj21/oaW2fnOWxY1Nl2Tuzq:uQ7Ey+8j20Dohlz71DR2q1/fOWxgNlY3
      MD5:CC4B528BFCE9E4180F75444B2ABC9D14
      SHA1:812E4AEC36C4F1FBF9E16679ECA725139D7C3BB2
      SHA-256:C50BC11E7BDA0553223F4F956DC09173CA9503EEB94048F8721A6E034BC7D2BA
      SHA-512:B794303A40FD964AFFF66FFC104BCC2E0E18ACC262F88E3393B20AACFF3A8B0297F4CF0C17162F11AE01598BDEFAE8EBD59F992386CCE9462E409AFA4D451417
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................R.. ........W...W...........7..........k..)...4mhEy.......B.B......!.........../.ZT.......O.O....$...K.K.K.....$...a..#.....$...I.I.I......*..k..)...4.MW*eh.....B.B........!..... ..N..h./..4....$.............$...i.}k.......... ......P...P$..P+..P......5........P7.. ........N..PU..P..j.....5...2...5...C..PC.. ....`...>.. G.. ....o.w....`...`N..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):136
      Entropy (8bit):4.168303237889532
      Encrypted:false
      SSDEEP:3:XCbVSm/tlkAll/tXl7ggOZMCyP98Dn8n8UltslulflFWSkf:SvUA/bXOyxP98j8nxltVTFif
      MD5:8E8F7836852A74DE789DD0F4C71797DB
      SHA1:7509333C6D134B2BAD48486057F91336DC1AA009
      SHA-256:D338E130FAFE30C63A1DDE8B6478A23DCE8D1A3716B776C44FBF9E132A392C32
      SHA-512:4C39DD6462EA0F1F0D674BB06E8A5153A86903A91B0C04166A06C7DF3B511E6CE83CBFE19D7175C010867F97DCB80723C398B4985D68BA162C30DD15B52D1FD9
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ...................................k..)...4.wW*eh.....B.B................`.... ....o.w....`...`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.147089260374425
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXElzxlf6tP9hn:SvKMH6tX
      MD5:DBED6CBF5B4E215E7BC058594652C5C6
      SHA1:14FF2242EB58DED4AE8DA0315F21AD1894CC848D
      SHA-256:DF819C5400D36259BCA9E3F7FBDAFB6F2DA2FFA00C5CF03695D3A1A5A20E8592
      SHA-512:0312DC0174E32ABA5FDC8EDC21D06DD613F0BC9BB24E1E502902379B997406D4B5E2A0C17E48BF582594C5D0988FA8DD3FD9A1CCC9FC386C4E453683196F2EC8
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.....................................o.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXEl0t6E7lFEKe:SvKM0t6gCKe
      MD5:CF788FA9793FEA6104E904FBA48B9ADE
      SHA1:5105A53F269A6C445FE58F0AB7BB501BF5790960
      SHA-256:D49D36962528CD70E638FE62C2A675838D5F6D13C229F6A107530D58C458D100
      SHA-512:B07CED3B04E2CE33B0FA215AE03002E666D5408F31ADE8FE84F46E2A7474D277B40887F090D5DB6ABEA58B6A8DF385F952DD614979AD903AAF31B524A06AA93B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):224
      Entropy (8bit):4.7322474492350795
      Encrypted:false
      SSDEEP:6:SvzJOy/Ca8nVNH4NCuj8nVb5Kt8Mqfg+p0Ffn:WAyaa2VUh2Vb0ttoght
      MD5:5D7C90813EC91CAE25B29B5E02A72AF7
      SHA1:8A20CF947002A414D246D0E1FC3716A88260E9F9
      SHA-256:A14CD0E7BECE613DB790919136940C447991C40C1BF626DA792D360F12B30D5A
      SHA-512:402B5E8C0161DC4D5DFAD4FA270F0CCBC190DB73B461633ED5D8FF36F672317D384D01E22898DD853086C590EEA31A48B93E0F8070792C9647207593A3702833
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................+.. ........0...0......................k..)...4.wDyuP.....B.B............E ..uP..k..)...4.w.y.5.....B.B............E ]..5.................P............$..P....`...... #.. ....o.w....`...`'..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.147089260374425
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMQpxlzJstP9hj:SvfJstz
      MD5:84781FB37996AE5ED3C3E0E3BEB4455A
      SHA1:ECD887370A4453E67A642A46BEF4BB4593C0CEDD
      SHA-256:B94B6BAE10B1B207ADFB721F38C9BDABF1B3619C2C82AFE24C7A0F823F9CA38E
      SHA-512:FFFC82BE344ACDAFA125A7A9BA3D79939F695B3C8A1AA66D8C0092847B7487385C979175F37D7DF39EB3334F56621DF78D3B2B087E7AE5D40972DD37ED42B109
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.....................................o.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.147089260374425
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMQpxlzJstP9hj:SvfJstz
      MD5:84781FB37996AE5ED3C3E0E3BEB4455A
      SHA1:ECD887370A4453E67A642A46BEF4BB4593C0CEDD
      SHA-256:B94B6BAE10B1B207ADFB721F38C9BDABF1B3619C2C82AFE24C7A0F823F9CA38E
      SHA-512:FFFC82BE344ACDAFA125A7A9BA3D79939F695B3C8A1AA66D8C0092847B7487385C979175F37D7DF39EB3334F56621DF78D3B2B087E7AE5D40972DD37ED42B109
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.....................................o.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):136
      Entropy (8bit):4.168303237889532
      Encrypted:false
      SSDEEP:3:XCbVSm/tlkAll/tXl7ggOZMCyP98Dn8n8UltslulflFWf:SvUA/bXOyxP98j8nxltVTFu
      MD5:9195559CD1C871889BAE26AD19CA0C24
      SHA1:7106DB267CC6F7D978D00D4A9829010B1E653375
      SHA-256:AB6683282CD7CD5A8A819796FF415A8C97933EB2A77E5F6B8B42048DD336EB70
      SHA-512:231CFF0AE144AF4382B9F869807492ECE979A809F0F4A912B8B41E09EBF4CC6F173EC62A507AF72C28BF825A7F74624B1AB776F293D632038E7B3590C9B885C5
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ...................................k..)...4.wW*eh.....B.B................`.... ....o.w....`...`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.147089260374425
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMQpxlzJstP9hj:SvfJstz
      MD5:84781FB37996AE5ED3C3E0E3BEB4455A
      SHA1:ECD887370A4453E67A642A46BEF4BB4593C0CEDD
      SHA-256:B94B6BAE10B1B207ADFB721F38C9BDABF1B3619C2C82AFE24C7A0F823F9CA38E
      SHA-512:FFFC82BE344ACDAFA125A7A9BA3D79939F695B3C8A1AA66D8C0092847B7487385C979175F37D7DF39EB3334F56621DF78D3B2B087E7AE5D40972DD37ED42B109
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.....................................o.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):844
      Entropy (8bit):4.992526813261028
      Encrypted:false
      SSDEEP:24:F6/kXVvq3/CUwFN2hLneL9xkl0oJsQC1NIgjf:RVS3qUk2hW9U/yFf
      MD5:148368AC58E622FF8C24F0A9F1E72712
      SHA1:FF7ED58F8363C5852D661E5D4D78F0E876DD3BA0
      SHA-256:5F4C811D317284CE9189258AC4FD0C7BBB810717BC8FEBC45F0D2E9322D9BF19
      SHA-512:0300C955FF9452225D734EEA66E46E95CC10148301B889169ADA4BD2170940E8868B10992E8F3833426E8A8587B96EAE43FCEDCA92E3EC6E4E2A81D525C07A76
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................................l.a.s.t. .w.k...l.a.s.t. .y.r...n.e.x.t. .w.k...n.e.x.t. .y.r...t.h.i.s. .w.k...t.h.i.s. .y.r...l.a.s.t. .m.t.h...l.a.s.t. .q.t.r...n.e.x.t. .m.t.h...n.e.x.t. .q.t.r...t.h.i.s. .m.t.h...t.h.i.s. .q.t.r...i.n. .{.0.}. .m.t.h...{.0.}. .m.t.h. .a.g.o......h.B7w.3.wEy..3C...B.B........R.....$..h.h....$.........$........$.......$....h.h.h...h.B7w.3.wW*ehc....B.B........$..h.h....$.........$.........$.......$.............H.............J.........J.........H.............J....>....J.c`.K....H...........H.................. ....P...P...P...P...P......5.~......P... .......... ....P...P...P...P...P....5.......... ....`...... ... ...........P...P...........`...P... ...........P...P...........P... .......P.......P........r...... ... ... ... ....o.w........`...`... ...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):136
      Entropy (8bit):4.168303237889532
      Encrypted:false
      SSDEEP:3:XCbVSm/tlkAll/tXl7ggOZMCyP98Dn8n8UltslulflFWf:SvUA/bXOyxP98j8nxltVTFu
      MD5:9195559CD1C871889BAE26AD19CA0C24
      SHA1:7106DB267CC6F7D978D00D4A9829010B1E653375
      SHA-256:AB6683282CD7CD5A8A819796FF415A8C97933EB2A77E5F6B8B42048DD336EB70
      SHA-512:231CFF0AE144AF4382B9F869807492ECE979A809F0F4A912B8B41E09EBF4CC6F173EC62A507AF72C28BF825A7F74624B1AB776F293D632038E7B3590C9B885C5
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ...................................k..)...4.wW*eh.....B.B................`.... ....o.w....`...`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.147089260374425
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMQpxlzJstP9hj:SvfJstz
      MD5:84781FB37996AE5ED3C3E0E3BEB4455A
      SHA1:ECD887370A4453E67A642A46BEF4BB4593C0CEDD
      SHA-256:B94B6BAE10B1B207ADFB721F38C9BDABF1B3619C2C82AFE24C7A0F823F9CA38E
      SHA-512:FFFC82BE344ACDAFA125A7A9BA3D79939F695B3C8A1AA66D8C0092847B7487385C979175F37D7DF39EB3334F56621DF78D3B2B087E7AE5D40972DD37ED42B109
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.....................................o.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMQut6E7lIt6EKC:SvQt6gOKC
      MD5:2E5503409EC26800FCF6A9B1D64DBE57
      SHA1:5962F8204C362DFEF2B60CDA43363D4811D686C6
      SHA-256:D5D3C00CA62F706F59183248BBE5FE5C6FB721E544D3A665A8BD03B4B5F73478
      SHA-512:649675774963C12D5776F5D8D12580F79ACD476C21056662D5391AC262E82A56ADC751807EA94F8D59979733BBED2616A8BF1BCA16AF5D89350AA473E21108BE
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMQut6E7lIt6EKC:SvQt6gOKC
      MD5:2E5503409EC26800FCF6A9B1D64DBE57
      SHA1:5962F8204C362DFEF2B60CDA43363D4811D686C6
      SHA-256:D5D3C00CA62F706F59183248BBE5FE5C6FB721E544D3A665A8BD03B4B5F73478
      SHA-512:649675774963C12D5776F5D8D12580F79ACD476C21056662D5391AC262E82A56ADC751807EA94F8D59979733BBED2616A8BF1BCA16AF5D89350AA473E21108BE
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.147089260374425
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMQpxlzJstP9hj:SvfJstz
      MD5:84781FB37996AE5ED3C3E0E3BEB4455A
      SHA1:ECD887370A4453E67A642A46BEF4BB4593C0CEDD
      SHA-256:B94B6BAE10B1B207ADFB721F38C9BDABF1B3619C2C82AFE24C7A0F823F9CA38E
      SHA-512:FFFC82BE344ACDAFA125A7A9BA3D79939F695B3C8A1AA66D8C0092847B7487385C979175F37D7DF39EB3334F56621DF78D3B2B087E7AE5D40972DD37ED42B109
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.....................................o.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):276
      Entropy (8bit):4.716134931707854
      Encrypted:false
      SSDEEP:6:SvwSmfStaFlqE2WhkTFkTFk75IVYTeME/Bscf+q+N:nnmIVYYCcft+N
      MD5:2A5A5D2CCC801C8DBE46AF8F04EA2D26
      SHA1:EF6FC7AC4C1D37633FC55FA252B33B6902B2E4E9
      SHA-256:DFAE3560E283006682100489719D46DA98D20D794B2DEDF947C709D051C85C2F
      SHA-512:09BD05607F6456E445316A074ABE4BC30AF2A6522F6FF8D1CB05E70A75D998BFE34262CF45CDF6572E5354C864044BA241041220A6888D90A881F70046062586
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................5.. ........=...=..........................NN.......4.....4..k..)...4......c....................4.........4.........4.....4.......P....... ...........P...P$..P....#.. ..j.v...................(.. ..`.*.. ....)..P......o.w...(..`!.. ...`1.. 3..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.147089260374425
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMQpxlzJstP9h8:SvfJstM
      MD5:8502B5B5CF8FF0AC0239AD4177A21BE1
      SHA1:94D80D600D5E0E241979FF136C9369E6699A4E0A
      SHA-256:29BD99C48E6B952990C208543342883CAB53EB68202F225EB293747A8451EEFF
      SHA-512:99EE900C8FC4BE3C17772F11D2E537A046D60E730DFCD1E246C7540988691E08A6188C6759720F66AB71108577AE791B3590BB7C7EA55F64F9F8A47578528039
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.....................................o.(...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):256
      Entropy (8bit):4.44420201856998
      Encrypted:false
      SSDEEP:6:SvSB+ZlIsgFldkTFkTFk0hUG/HAvxlk9jbCikap6oV:gOvMGfALGUap6oV
      MD5:801F9E284F6D1E5FEB62097AE9B98E57
      SHA1:AC8108D2DBD09245B770D51EAE0BCC4E22278662
      SHA-256:C2697FA67D09E9A699DDB83063981A7C184384E56AC5046CFFB5B5855B9DC3F8
      SHA-512:5F76375EB9FBEE0BF2E33C5BF600A624B86B236FCCBF8F7075CEA2F11AA480D948C816F6DAF2DAC63585E657A03E29D353080361245DBDA65DA7FDCA34CC7180
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................0.. ........8...8................................NN.......4.....4.........4.........4.........4.....4.............P...P....... ...........P...P...P.... .. ..j.v...........%.. ..`.'.. .......P......o.w...(..`... ...`,.. ...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):236
      Entropy (8bit):4.547719704207099
      Encrypted:false
      SSDEEP:3:XCbVSm/tlBFQlllWJlvtIP9SB+kTFkTFkyB84ePsZlxjmGkmvzGMmE/exz9sSN/5:Sv8l/WrOkB+kTFkTFkBixiCzGk+2+/SK
      MD5:B79F5A39332B878BA4B05DEBD7B0F367
      SHA1:8069441A0E3C184705054FD57B26DE0F1F59B0AA
      SHA-256:6503CD2C7AAA9F95F33C378A2F0CD12AF4D5B5DA4EE5BBECD62789E9C5C4A42F
      SHA-512:B56A2B9DC4D9D937A8EF67E9205E62FA51364AC04BA8A245D2DD8ED4F6E59DEC41520BE32E5DC6B61E0891E1D397C280142FD3B389538920AAC942B1423422E1
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................,.. ..N.....3...3..........N..............4.....4.........4.........4.........4......H............N.N.............P...P...P....... ..j.v.............. ..`.!.. .......P....(.. ....o.w.....(..`...`&.. *..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):880
      Entropy (8bit):5.200318139086651
      Encrypted:false
      SSDEEP:12:c+dflKt57gHBiYIH5HEektCFxExtkKNovPfK6gQ0dAs:JAZgCH5kektkEI44Pf10d9
      MD5:8A1F8F9C2B643A831246038949D38A86
      SHA1:175C7AC6E783B3A58565B31EC3F65CB099DE1D09
      SHA-256:9DA5B83F7DAA17CF642C7440F371BD2AB86170424125E991645F5DAD40C5AA9E
      SHA-512:6641903C46A1FF3352F6C48783077DCD83D1FD1C56EAD865A58C3B1A8B0B36B3CB1E7820A06341BE3408C21DC21CDC016135D54AC409C6B35E35D789A8193CA0
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................................D.i.c.....E.n.e.....M.a.y.........0...B.......0...K.......0...M.......0.0...B.......0.0...K.......0.0...M.......0.0.0...B.......0.0.0...K.......0.0.0...M.......0.0.0.0...M.......0.0...M.R.D.......0.0.0...M.R.D.......Y4....J.........J.#.#.....J.9.9.....J.........J.*.*.....J.A.A.....J.I.I.....J.R.R.....J.[.[.....J.........J.........J.1.1...k..)...4....k..\...............4.....4..k..)...4....eh9....................4.........4.........4....z..O..3.........i...).....Z.K...|.?.9.j..G.!.#."......1G..........eG6.......!.....a...q.k...T"..@".!....E.P.V.].e.n.x.............n..Ps..Px..P}..P...P...P...P...P...P...P...P...P....... ........k..P... ....... ...................P...P...P....... ........................................... ... ..j.v.....H................ ... ....`...... ... ......o.w...(..`... ~ .`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):344
      Entropy (8bit):5.134834454312531
      Encrypted:false
      SSDEEP:6:SvzxYe41GgLk28RWvkP2qRnslkzRgTFkTFkKklWF6/ZlMQOXhtVFn:Pe4Li0vkPf2CkIF6R+Zn
      MD5:382D40B9353199767794FEF42ADE4B90
      SHA1:FBB58513DE85802CD6AB6D673E66A69B9CC18E16
      SHA-256:7A099DC250854B3559F585EEC33EF9AE3F7B535837E0306380E70A67932A2A9C
      SHA-512:9CA9F327F9826C68D2FF708BC9B44781C236DBC0E25F020375132850BCCA28F44651DF0EC1C5464A4457299B7FF018F64BFB79E17B127214339BC673D109FD98
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................I.. ........N...N...........2........M.M./.d.d./.y.y......h.B7w.3....FB.b..............!.......8..8q;DBFB.....4.....4...h.B7w.3.....$................!..... .8..8.).$.$.........4.........4.........4.................P........B..PG..PL..P....6.. ..j.v.......#...&...)...7..P;.. ....`...2.. =.. ....o.w.(..`...`E..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):264
      Entropy (8bit):4.6054641400735505
      Encrypted:false
      SSDEEP:6:Svoql/Al/G/NgB+kTFkTFkQEMHCjswlym4GIVgGN:pqtBeBkEMijsQyOAlN
      MD5:599E0BAE3F8E59F315CC28AC651D000F
      SHA1:90B395C9F6B64CD5270EBA837BC0438FF152176F
      SHA-256:6A5A231A16944B786BDA22C49A3B0DCC1F983C87F56EB0CCE11206CBE67AE36E
      SHA-512:FAC93DBDAB0EF16C98977656B0126A4154A4181095BD935DAAE5DB6A18246D0AE182C38AE07C59629B784DC93D0F04A63AD07CA2E6522995539C5F299D6DDA2F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................3.. ..N.....:...:..........N.........a.n.t.i.e.r........4.....4.........4.........4.........4......H........N...N.N.....4.............P...P...P....... ..j.v...........$.. ..`.&.. .......P........-.. (..P....o.w.....(..`...`+.. /..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):1252
      Entropy (8bit):5.561173248216956
      Encrypted:false
      SSDEEP:24:oXbwyqMsKJrL6OTqZNRoL/ufRpfDX6ULOsAtMqZQ:oXbwynqO+jobMRpfHOPt6
      MD5:8C8D7A6AFED45C5BFECF17C268CED17C
      SHA1:C8BAE7DE7F7866C3663B9C0CA5B5D8C3811E18EB
      SHA-256:80F8D3D6C774C045A38056EC2C9323B8E69FA03DB6D720B16E02318C3B8F2D7C
      SHA-512:724F6B78755E8064F6BB4F67C6A92932229B7DC0F7C1A366BF0EDB2F6374DA5BA7EC6A7C3D3241D4352F7EEB5DF643C94687423B016A4E56EEB9D79F54AFE8EF
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................*.. ........1...1....................+...9...B...E.....1.....1.....1.....1.....5.(.-...B.H.3...'.3./...+.H.1...,./.....,.F.H...,.H.D...-.E.D...-.H.*.../.3.E.../.D.H...,.H.2.'...9.B.1.(...3.1.7.'.F...E...2.'.F...(.'.E./.'./...A.(.1.H.1.....3.F.(.D.G.T...F...E.G.. 4.(...1.(.9. .3.H.E...1.(.9. .'.H.D...1.(.9. ./.H.E...(.9./.'.2...'.4.*...1.(.9. ...G.'.1.E...(.9./. .'.2. ...'.4.*.....[.. . .N. .P. .O. .R. .V. .p. .. .. .%. .|. ... ... ... ... ... ... .C. ... ... .I. .J.].......Y4........Y4........................................ .'....)..G...j..4..eN....N..).M.i.O...............#2...................#2...................#2..........F..............#2..................%.......5........... ... ..........'...............%.s.....5.................%.s.....5........... ... ..........'...............%.s.....5..............".*...<..........".*...<...................................... ...............P.......P........... ... ...........P...P....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2024
      Entropy (8bit):5.174909093296085
      Encrypted:false
      SSDEEP:48:MU5RKptfOKtdSVtIlb8tyY4Acxfi6ZW/OmZQzVVp:7RKpdOKfSVOlb894Acs7mzPp
      MD5:9BFD201E21A532D247D2DC903B956E0A
      SHA1:8EAB8685683F9AA577A96D270B4B5173BBB372AC
      SHA-256:46C81B7792A250AF3558E439E5DEDB8F5CFEF5B92E19FC28A671DE15B8411A9E
      SHA-512:2939D5D19470347C21814E5E39F24A6594AF8C669D4B3EEE6CA927E8D7120A4154C75BA5B0AD2508912F8F5C03844465E2697DE9DDB49B901162309AAEA0A107
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................................C.-.I...H.-.I...a.a.S...b.o.w...c.o.l...d.u.u...h.b.i...j.o.l...j.u.k...k.o.r...m.a.w...m.b.o...m.o.r...m.w.d...n.a.a...s.e.e...s.i.i...s.l.t...d.e.w.o...j.u.k.o...H.a.K.k.i...H.o...o.m...L.e.w.r.u...W.a.k.t.u...b.o.w.t.e...c.o.l.t.e...j.o.l.a.l...k.o.r.s.e...m.b.o.o.y...m.o.r.s.o...s.i.i.l.o...s.u.b.a.k.a...H.a.n.n.d.e...J.a.K.n.g.o...S.a.h.n.g.a...a.a.S.n.d.e...d.u.u.j.a.l...m.a.w.n.d.e...s.e.e.W.t.o...s.i.i.l.t.o.....a.l.n.d.e...k.i.k.i.i.W.e...J.a.m.a.a.n.u...Y.o.n.t.e.r.e...H.i.t.a.a.n.d.e...M.a.j.a.a.n.g.o...T.e.r.m.e.s. .1...T.e.r.m.e.s. .2...T.e.r.m.e.s. .3...T.e.r.m.e.s. .4...m.a.w.b.a.a.r.e...y.a.r.k.o.m.a.a...H.a.d.e. .I.i.s.a...[.q. .v. .x. .z.]...n.a.a.s.a.a.n.d.e...n.j.e.s.l.a.a.r.e...h.o.o.r.e.-.b.i.i.r...C.a.g.g.a.l. .I.i.s.a...D.i.i.w.a.a.n. .w.a.k.t.u.....a.l.W.i. .y.o.n.t.e.r.e...7.[.A. .B. ... .C. .D. ... .E. .F. .G. .H. .I. .J. .K. .L. .M. .N. ... .J. .O. .P. .R. .S. .T. .U. .W. .Y. ...]...7.[.a.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.870450165586334
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDklU8gl8l/6RYMmlle3:SBtkJYlU8g8l/Pnlg
      MD5:B0883BC684E2083DCFB7987BF29CB154
      SHA1:93CA18C6EF789971AC3965F1B55FD4311A782661
      SHA-256:E8FBBF9C040D66A6F79C5F2143599852A26E7F63E476F1D8AEB8AF38651017D1
      SHA-512:6F36CC2841D7A7E75C27063806AC56E1CC0E38C1ED3862DDF0F243B4A19FDE47C53E371F80AE670DF5D2196DE96B3804FF478DD8551AC37639F29C77194EF679
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.................................f.f._.L.a.t.n._.C.M...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.870450165586334
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDklU8gl8l/6RYMpe3:SBtkJYlU8g8l/Pf
      MD5:107782CB49500FC51B8E89C6BFE16DD1
      SHA1:86062C938918B822D5FCCE2AF25914255ED05A03
      SHA-256:C18C8F96F8A5A6109B9AB88A9FA1458ACB0DA75FA74ED4B5AE71C5D30F7E8C54
      SHA-512:DE56C5EDC926BC62988B40D24F08516EADDE9301F28FE9F28645190C45892EDB54B4812241297E027706DE0DF0A6A551A65516C0A99AFE921230BE6E971D4374
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.................................f.f._.L.a.t.n._.G.N...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):132
      Entropy (8bit):3.971696932789431
      Encrypted:false
      SSDEEP:3:XCbVSm/tlgSlE/cmlvlllQ9grNrceRn2T22Pc3nslulflFpDN/F:SvQSlcPZZrzn2T22Pc3nVTFjF
      MD5:51874CD570FDE1EF76584D484F003123
      SHA1:972492DE9F6DB03504D92666FAA793A12174356C
      SHA-256:6712CA123B9C3B3C192B15BED74912047AA9F473113C7E79EADA47DB4F3DCE08
      SHA-512:4257742E18BE5FB2B23D26BADB2B264ECA1752EADAB99CFFD2DE930697F797E010A6F3E935EB3C9F884CA710BAE5EEBC472A14EACCDCCF2AABD83263FA81F0A2
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .8w...................8w............h.B7w.3.MW*.).4......................`.... ..o.w......`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.870450165586334
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDklU8gl8l/6RYMde3:SBtkJYlU8g8l/PT
      MD5:15812A52DB895052C6440FFEA69FC5DF
      SHA1:F2D61E66073C49C7E0A3F6EB4D80DB341F0F6FCA
      SHA-256:AE949179ED25170E4DF3C4E4A78793A7CC86C17672E76661A1DB710C164A05A6
      SHA-512:904F6BB297412B6ADB01FA95A9A979F7108F88A76C08823F3AB988CDE2319ED525938693DE8F4EDA097EEAC81E5EB6AB9DD75C4321D28A7F1E231AEC78B405C1
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.................................f.f._.L.a.t.n._.S.N...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):25004
      Entropy (8bit):5.121435767724072
      Encrypted:false
      SSDEEP:768:2L59kH58Vk/calos5zdDPupFHM2IinQRhjjsdRCxwn40:2XkH58Vk/canRDPupFHM2IinQR/xw40
      MD5:7857B0B72BDAA17EA21B9A508F57FCE2
      SHA1:64CD6E4E75976D4425566FB363BCCCA5E08F997A
      SHA-256:6C46B9C5FD632F2E66C4C37C221F9B55D112205DB61E9AA9A1AF351E0D451E60
      SHA-512:EB4169E9B144328F8B7637A4BB3AE14B938E742555E60CCD1CD65F2BFA812946AD852C0E3E47659DABEF893C7262DB31B25F7CFD1C87F18A601ECE9A54147F53
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................I.. ........c...c...V.......F........n.y.t...k.p.....k.y.....L...y...e.a.a...j.K.r...j.a.a...s.......a.a.m.u...i.l.t.a...a.d...r...e.l...l...s.y.y.s...e.K.r.....e.a.a.....e.p.i.p...j.K.r.....j.a.a.....k.e.h.o...k.e.s.....l.o.k.a...m.u.u.t...e.i.l.e.n...L...y. .G...i.j.j...r...n.i.s...n...s.i.v...n...t.e.v...t...t.i.a.r.....a.e.v...t...a.b.k.u.u...e.l.o.k.....e.l...i.n...h.e.i.n.....h.e.l.m.i...h.u.h.t.i...h.y.m.i.....j.o.u.l.u...k.a.s.v.i...k.o.i.a.k...l.i.p.p.u...l.i.p.u.t...p.a.o.n.i...p.a.o.p.i...s.y.d...n...t.a.m.m.i...t.h.o.u.t...t.o.u.k.o...t.u.n.t.i...i.l.t.a.p.....t...n.....n...r.a.d.~.a.b...k.i.s.l...v...a.a.m.u.p.....a.d...r. .I...e.n.s.i. .v...h.e.a.v...n...t.a.m.m...z...t...n... .v...a.a.w.w.a.l...a.a.. b.a.n...d.e.y.k.u.u...e.l.o.k.u.u...e.m.o.j.i.t...h.a.t.h.o.r...k.e.s...k.....l.o.k.a.k.....m.a.a.l.i.s...m.a.r.r.a.s...m.e.s.h.i.r...m.e.s.o.r.i...p.a.i.k.k.a...s.y.y.s.k.....t.i.r.k.u.u...k.e.s.k.i.p.....t...n... .s.u...k.e.s.k.i.y.....a.a.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMQut6E7lIt6EKC:SvQt6gOKC
      MD5:2E5503409EC26800FCF6A9B1D64DBE57
      SHA1:5962F8204C362DFEF2B60CDA43363D4811D686C6
      SHA-256:D5D3C00CA62F706F59183248BBE5FE5C6FB721E544D3A665A8BD03B4B5F73478
      SHA-512:649675774963C12D5776F5D8D12580F79ACD476C21056662D5391AC262E82A56ADC751807EA94F8D59979733BBED2616A8BF1BCA16AF5D89350AA473E21108BE
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):18896
      Entropy (8bit):5.60602512990592
      Encrypted:false
      SSDEEP:192:K2U2ISJWd18WShrOeROng/IIx37+b3zYjiJCyvCZPb+YaoB:rE/8WSVOeROgocZPbP
      MD5:08B81236FB9EBF09F08195055B8A99CD
      SHA1:02E75AC8491DD7D328B69681B3D8A6A926A1E7E0
      SHA-256:5FA099432E1C81E12AB5ABBB8012C0D1AA860DD361FF832F63EB5D4A3D3C0971
      SHA-512:457AD442D5C65B1F513E4E0F4F6BBCA2D76A059FC3D3065F7BCCFFDA429066F9BF6588A5A9394D059793C980110B8EE292F41016384D091FC0E66FDAE4D1313F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................S.. ........l...l...V.......+........H.u...L.i...B.i.y...H.u.l...H.u.n...H.u.w...L.i.n...M.i.y...N.o.b...E.n.e...P.e.b...b.u.k.a.s...H.u.l.y.o...H.u.n.y.o...M.a.r.s.o...b.a.b.a.e...b.a.g.a.y...h.a.y.o.p...I.b.a. .p.a...b.a.n.t.a.s...g.u.s.a.l.i...l.a.l.a.k.i...n.g.a.y.o.n...p.a.n.a.h.o.n...O.k.t.u.b.r.e...P.e.b.r.e.r.o...M.e.t.r.i.k.o...h.a.l.a.m.a.n...n.g. .g.a.b.i...p.a.g.i.t.a.n...s.a. .g.a.b.i...t.a.n.g.h.a.l.i...0.0.0. .l.i.b.o...n.g. .h.a.p.o.n...s.a. .h.a.p.o.n...a.k.t.i.b.i.d.a.d...n.a.k.a.p.a.r.e.s...n.i.l.a.l.a.m.a.n...s.a. .L.i.n.g.g.o...s.a.r.i.-.s.a.r.i...h.a.t.i.n.g.g.a.b.i...n.a.n.g. .u.m.a.g.a...S.a.m.a.k.a.l.a.w.a...0.0.0. .b.i.l.y.o.n...M.M.M. .d.. d.,. .y...m.g.a. .n.u.m.e.r.o...{.0.}.,. .o. .{.1.}...s.a. .{.0.}. .t.a.o.n...s.a. .{.0.}. .o.r.a.s...0.0.0. .n.a. .l.i.b.o...s.a. .{.0.}. .a.r.a.w...s.a. .{.0.}. .m.i.n.....s.a. .{.0.}. .s.e.g.....m.g.a. .b.a.n.d.i.l.a...p.a.g.l.a.l.a.k.b.a.y...M.M.M. .d.. d.,. .y. .G...s.a. .{.0.}. .L.u.n.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMQut6E7lIt6EKC:SvQt6gOKC
      MD5:2E5503409EC26800FCF6A9B1D64DBE57
      SHA1:5962F8204C362DFEF2B60CDA43363D4811D686C6
      SHA-256:D5D3C00CA62F706F59183248BBE5FE5C6FB721E544D3A665A8BD03B4B5F73478
      SHA-512:649675774963C12D5776F5D8D12580F79ACD476C21056662D5391AC262E82A56ADC751807EA94F8D59979733BBED2616A8BF1BCA16AF5D89350AA473E21108BE
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):216
      Entropy (8bit):4.352892321557353
      Encrypted:false
      SSDEEP:6:SvEGml7omAYl0JP1cMwd0hllE2VnURolFn:3tAYAc5MpNUK
      MD5:51F12B12A8057A392C771E30D946BD8D
      SHA1:E433B892646A05AC206091AEEEACD5BD644CB497
      SHA-256:5263F3B56D9BED1B9BF3DFFFA2DB75CFF405B11DDFC54F09903D92E0571FCA06
      SHA-512:98DA3BE44D21FD4C413E3679107F32D4FCDCD478D58F3DBF7E9758F597F2A4C89FD47D0EDF9FC6A4AADF7A572D055C280CEEA299A7CF40799935F3470D4578E3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................).. ..l....................l..............D............/..*...^}....l.....^....|..........P....... .......P.......P........... ... .......P....5...... !.. ..`.#.. ....o.w.... ...`'..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMQut6E7lIt6EKC:SvQt6gOKC
      MD5:2E5503409EC26800FCF6A9B1D64DBE57
      SHA1:5962F8204C362DFEF2B60CDA43363D4811D686C6
      SHA-256:D5D3C00CA62F706F59183248BBE5FE5C6FB721E544D3A665A8BD03B4B5F73478
      SHA-512:649675774963C12D5776F5D8D12580F79ACD476C21056662D5391AC262E82A56ADC751807EA94F8D59979733BBED2616A8BF1BCA16AF5D89350AA473E21108BE
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMQut6E7lIt6EKC:SvQt6gOKC
      MD5:2E5503409EC26800FCF6A9B1D64DBE57
      SHA1:5962F8204C362DFEF2B60CDA43363D4811D686C6
      SHA-256:D5D3C00CA62F706F59183248BBE5FE5C6FB721E544D3A665A8BD03B4B5F73478
      SHA-512:649675774963C12D5776F5D8D12580F79ACD476C21056662D5391AC262E82A56ADC751807EA94F8D59979733BBED2616A8BF1BCA16AF5D89350AA473E21108BE
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMQut6E7lIt6EKC:SvQt6gOKC
      MD5:2E5503409EC26800FCF6A9B1D64DBE57
      SHA1:5962F8204C362DFEF2B60CDA43363D4811D686C6
      SHA-256:D5D3C00CA62F706F59183248BBE5FE5C6FB721E544D3A665A8BD03B4B5F73478
      SHA-512:649675774963C12D5776F5D8D12580F79ACD476C21056662D5391AC262E82A56ADC751807EA94F8D59979733BBED2616A8BF1BCA16AF5D89350AA473E21108BE
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMQut6E7lIt6EKC:SvQt6gOKC
      MD5:2E5503409EC26800FCF6A9B1D64DBE57
      SHA1:5962F8204C362DFEF2B60CDA43363D4811D686C6
      SHA-256:D5D3C00CA62F706F59183248BBE5FE5C6FB721E544D3A665A8BD03B4B5F73478
      SHA-512:649675774963C12D5776F5D8D12580F79ACD476C21056662D5391AC262E82A56ADC751807EA94F8D59979733BBED2616A8BF1BCA16AF5D89350AA473E21108BE
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMQut6E7lIt6EKC:SvQt6gOKC
      MD5:2E5503409EC26800FCF6A9B1D64DBE57
      SHA1:5962F8204C362DFEF2B60CDA43363D4811D686C6
      SHA-256:D5D3C00CA62F706F59183248BBE5FE5C6FB721E544D3A665A8BD03B4B5F73478
      SHA-512:649675774963C12D5776F5D8D12580F79ACD476C21056662D5391AC262E82A56ADC751807EA94F8D59979733BBED2616A8BF1BCA16AF5D89350AA473E21108BE
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMQut6E7lIt6EKC:SvQt6gOKC
      MD5:2E5503409EC26800FCF6A9B1D64DBE57
      SHA1:5962F8204C362DFEF2B60CDA43363D4811D686C6
      SHA-256:D5D3C00CA62F706F59183248BBE5FE5C6FB721E544D3A665A8BD03B4B5F73478
      SHA-512:649675774963C12D5776F5D8D12580F79ACD476C21056662D5391AC262E82A56ADC751807EA94F8D59979733BBED2616A8BF1BCA16AF5D89350AA473E21108BE
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):268
      Entropy (8bit):4.613497542156425
      Encrypted:false
      SSDEEP:6:SvXtKHl7saMW2W0lOPwv+SlmtWCayl6QZSnBV:UKF7sOPXwbm2lz
      MD5:6E51A3800939D2B92E283D5C0217F615
      SHA1:CA1B60D5BE31ABAAC82AD0B22494160B7D0D3664
      SHA-256:905B32B24BA15D2E443F112A683445E5A77227D5494DD342586A33FE6660DE44
      SHA-512:382FB2573E834DBDE01DE8D4A59A0905EA3585C637BFA4DF067BA91C654E12F4EB4CC61C8C45C5CE47B2C088EE020DA01EB6A9030C73E2FFCA185C93603F1F3D
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................4.. ........;...;..........."........f...v.....j.u.i.....j.u.i.l................*.......OB.u....T.{Ci...h........OB.u....T.{Ci...h..........P....".. ............$...........&.. (.. ..j.H.......*.. ..`.... ..[...o.w......`$.. ...`2..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMQut6E7lIt6EKC:SvQt6gOKC
      MD5:2E5503409EC26800FCF6A9B1D64DBE57
      SHA1:5962F8204C362DFEF2B60CDA43363D4811D686C6
      SHA-256:D5D3C00CA62F706F59183248BBE5FE5C6FB721E544D3A665A8BD03B4B5F73478
      SHA-512:649675774963C12D5776F5D8D12580F79ACD476C21056662D5391AC262E82A56ADC751807EA94F8D59979733BBED2616A8BF1BCA16AF5D89350AA473E21108BE
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):324
      Entropy (8bit):4.234801961619495
      Encrypted:false
      SSDEEP:6:Svg/seUE82fsUUNzlsUUNRYsUbKl4wgHoGYMDyx1hT3QnUbUF:9+EaUUYUUzrUbegHWbTiUYF
      MD5:550EE182EA9AE38CBC976C3B747CEC73
      SHA1:A773A6CD2AB67DF7644632DBE0BAAF9A805E173E
      SHA-256:69DBC1EAB9852FDE5FA6F3E0074FE2C053C6B372DFDA37F805EA47A276A680A1
      SHA-512:6FBB8CE5B15522E3A132C54C924CEA53C08723B3046D61BFAB48C518179C784B3D59CE6FDB56D5C57E2498498CB8CFC5C4639698ACF98963FD9DEE9348B633D5
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................D.. ........I...I...........2........l.e. .2...m.e. .t.r.i.m.e.s.t.r.e...l.e. .3...m.e. .t.r.i.m.e.s.t.r.e...l.e. .4...m.e. .t.r.i.m.e.s.t.r.e........D..k..)...4.MW*eh.....5.5......_{........b{..........7..P....2.. ....H.......M...........6.. 8.. ....S...:...:.. ..`.>.. ....o.w.4.. ...`B..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMQut6E7lIt6EKC:SvQt6gOKC
      MD5:2E5503409EC26800FCF6A9B1D64DBE57
      SHA1:5962F8204C362DFEF2B60CDA43363D4811D686C6
      SHA-256:D5D3C00CA62F706F59183248BBE5FE5C6FB721E544D3A665A8BD03B4B5F73478
      SHA-512:649675774963C12D5776F5D8D12580F79ACD476C21056662D5391AC262E82A56ADC751807EA94F8D59979733BBED2616A8BF1BCA16AF5D89350AA473E21108BE
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):132
      Entropy (8bit):3.9290313309779283
      Encrypted:false
      SSDEEP:3:XCbVSm/tlkAll8/mlvlllgggrNrxVvK28nslulflFp9ok:SvUA/8OP4XZrxVvK28nVTFck
      MD5:4CF3AA31B641864AB60EF738B2B9903A
      SHA1:92DB1CF0B23B8D187B404B1693C3841F16152BDA
      SHA-256:4D2BBE1D4D9D0A4266448241596BCA9DA40A34D96E4FD309A205350156DE0134
      SHA-512:E7E01AB79CE30F51B69B1C7094C325D55E08DA3703C05ED0741B05D30B2C4D662587338141AA5BF6EE9015CE1DFF2094982A40BA58F4ABCA7CF3E8C1A954E2EC
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ....................................h.B7w.3.MW*eh...5.5.5.5..............`.... ..o.w......`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):9864
      Entropy (8bit):6.028223099015054
      Encrypted:false
      SSDEEP:192:W9hNlTjzDDD0DwxDWDHDpDVOEY8zUwHH2HdEhtFQDHkMEYP0w8lWsxVe:W9hjDDD0DmDWDHDpDEErLHH2Hd+Qbkqf
      MD5:682FA0B11EFDB3D6B3109142943B5D0F
      SHA1:E0E97C7BEC5FE6F7C5E373B0FB811E38BE8D0A94
      SHA-256:AFE813885F2A9C431A276F976D9CFD979771345F28CE158EBFC29D3CCEAB56A6
      SHA-512:4F429D583697E84B4745D4DB15DB684625E0894A641641E103F263416D6F8A23496E330A1473024EF799830109D23B7F86D55F22288378290B675D835D767A6D
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................)................T.u.t...A.a.p...H...n...M.r.t...R...t...f.g.j...A.b.i.b...T.. e.r...G.e.i.t...J.u.l.y...J.u.n.y...K.n.y.n...O.k.s.e...S.j.a.....J.i.e.r...W.i.k.e...f...K.....n...K.....B.a.b.a.h...T.u.b.a.h...D.r.a.a.k...M.a.a.i.e...M.a.a.r.t...M.o.e.h.....S.j.a.w.....S.l.a.n.g...B.r.i.t.s...M.i.n...t...n...K.r.....A.d.a.r. .A...A.d.a.r. .B...E.l.l.o.e.l...K.i.y.a.h.k...M.a.a.g.h.a...S.j.e.v.a.t...B.a.a.r.c.h...H.o.a.n.n.e...H.y.n.d.e.r...S.j.a.w.a.l...f...g...j.....M.o.a.n.n.e...B.a.. u.n.a.h...P.a.g.u.m...n...T.a.m.m.o.e.z...T.i.s.j.r.i.e...J.o.e.m... .I...M.e.t.r.i.e.k...S.e.k.o.n.d.e...[... ... ...]...v.a.n.d.a.a.g...C.h.e.s.j.w.a.n...J.y.e.s.h.t.h.a...K.a.a.r.t.i.k.a...A.u.g.u.s.t.u.s...D.e.s.i.m.b.e.r...J.o.e.m... .I.I...N.o.v.i.m.b.e.r...T.i.i.d.s.r.i.n...d.i.t. .j.i.e.r...0.0.0. .t...z.e.n...S.e.p.t.i.m.b.e.r...O.e.r.m.o.r.g.e.n...F.e.b.r.e.w.a.r.i.s...J.a.n.n.e.w.a.r.i.s...d.i.z.z.e. .w.i.k.e...d.i.z.z.e. .f.r.e.e.d...d.i.z.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):536
      Entropy (8bit):3.9455462591583674
      Encrypted:false
      SSDEEP:12:WZtxKuBFaCXNbCv/SmtRguJR1nnX3Hv8UQnfRC83fEUM:WZbKOjpAXtRRRVX3v8UQnfw83fEUM
      MD5:4909058929BDECA58C1E06AB23AFDCFD
      SHA1:ACEEA31958CE39C3CDE0D03104B1E4524A1E4FBF
      SHA-256:50BB23ABBE3B69E98B6949ED3DC57811832BC1D5BA15254414A97231BD788AF4
      SHA-512:ABF3F12D893D30282B40100BE7C85003CEED2AF8F75BAD3CD123430EFF98E7ED467EF827945E3C3ACE28D39A9268F6922DF3CF9EF0EA36880CDFD6A1321F7649
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................|.. ....5...~...~...6.......|...genderList.af.ar.bg.bn.ca.cs.da.de.el.en.es.et.eu.fa.fi.fil.fr.gu.he.hi.hr.hu.id.is.it.ja.kn.ko.lt.lv.ml.mr.ms.nl.no.pl.pt.ro.ru.sk.sl.sr.sv.sw.ta.te.th.tr.uk.ur.vi.zh.zh_Hant.zu....n.e.u.t.r.a.l...m.a.l.e.T.a.i.n.t.s...m.i.x.e.d.N.e.u.t.r.a.l...6.+...1.4.7.:.=.@.C.F.I.L.O.R.U.X.\._.b.e.h.k.n.q.t.w.z.}................................................................................................................................................................... .!..P
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):3572
      Entropy (8bit):5.800435594663508
      Encrypted:false
      SSDEEP:96:eq3YGnCz1oLJ9iniJfziRUxwiH4Ge51dsn:uz1oLDinipiRMHOdsn
      MD5:8038A8A283CF68FB9924ADCDBFD11331
      SHA1:7E659DFE3E801BB7E99377494510F2CCD10921AF
      SHA-256:D26995ABBE7F08FDF9333CBE86BF8025381A9D64DD7640E6CAEAFCCD429212CF
      SHA-512:F7CD8724778A0EE69E144D6A0F73383CDBB72DFB86410F91AAF6BF9F8AE55823454B9025338B827263644A5A3DF9CCD8A612F5A41166F6A03C927139405C4A77
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................e.. ........u...u...........u........D.u.....F.r.....M.i.....M.......S.u.....Z.i.....h...t...J.a.a.r...n.a.m.....A.a.b.i.g...M.o.n.e.t...N.a.c.h.t...W.u.c.h.e...z.a.a.b.i.g...z.n.a.c.h.t...M.i.t.t.a.g...z.m.i.t.t.a.g...F.r.i.i.t.i.g...M.i.n.u.u.t.e...M.....n.t.i.g...S.u.n.n.t.i.g...a.m. .M.o.r.g.e...A.u.g.u.s.c.h.t...D.e.z...m.b.e.r...M.i.t.t.w.u.c.h...N.o.v...m.b.e.r...O.k.t.o.o.b.e.r...W.u.c.h.e.t.a.g...m.e.t.r.i.s.c.h.....b.e.r.m.o.o.r.n...D.u.n.s.c.h.t.i.g...S.a.m.s.c.h.t.i.g...Z.i.i.s.c.h.t.i.g...0.0.0. .T.u.u.s.i.g...0.0.0...T.s.g.'...'...a.m. .N.a.m.i.t.t.a.g...v.o.r.g.e.s.c.h.t.e.r...T.a.g.e.s.h...l.f.t.i...0.0.0...T.s.g.'...'.......0.0.0. .B.i.l.l.i.o.o.n...0.0.0. .M.i.l.l.i.o.o.n...0.0.0. .B.i.l.l.i.o.o.n.e...0.0.0. .M.i.l.l.i.o.o.n.e...a.n.g.l.o.a.m.e.r.i.k.a.a.n.i.s.c.h...E.[... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... .-. ... ... .+. ... ... ... .O. ... ... .M. .S. ... ... .m. ... .k. ...].......7.....y.B.)......J.......
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):1344
      Entropy (8bit):4.205968556156306
      Encrypted:false
      SSDEEP:24:GksWkTiI1jIZl3+jyX/+hlVDQ+dss9NyDACuHuCuMSu0VS39irT4uBF77jd9H:PsWRI1jIZU7CU0aoPl
      MD5:DC7D4EC2D1831B8A82F08869B380A8F9
      SHA1:C4D4C2476657E5F079292D2D87CB43AF9F83D148
      SHA-256:750FD42148E8990A976B2C9F62807835CA38D42A452E95333D334D79639C8514
      SHA-512:480C3F5DCE7D35AF77DD0BD4040B06AA81EA901C0A58C7183B38BD13232B6A0560FC5D3CB5DCCB417118BB5F2CDBE3B6FD005B4003183882FAF3C9B1666C57CD
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................>.. ........H...H....................R.C...J.e.d...J.e.h...J.e.l...J.e.m...J.e.s...J.e.r.c...J.e.r.d...M.a.y.r.n.t...A.v.e.r.i.l...A.v.r.r.i.l...J.-.g.u.e.r...J.e.s.a.r.n...B.o.a.l.d.y.n...J.e.l.h.e.i.n...J.e.m.a.y.r.t...J.e.r.c.e.a.n...J.e.r.d.e.i.n...T.-.a.r.r.e.e...J.-.f.o.u.y.i.r...J.-.s.o.u.r.e.e...J.e.d.o.o.n.e.e...J.e.h.e.i.n.e.y...M.-.H.o.u.n.e.y...M.-.f.o.u.y.i.r...M.-.s.o.u.r.e.e...L.u.a.n.i.s.t.y.n...M.-.N.o.l.l.i.c.k...M.e.e. .H.o.u.n.e.y...M.e.a.n.-.f.o.u.y.i.r...M.e.a.n.-.s.o.u.r.e.e...J.e.r.r.e.y.-.f.o.u.y.i.r...J.e.r.r.e.y.-.g.e.u.r.e.e...J.e.r.r.e.y.-.s.o.u.r.e.e...M.e.e. .n.y. .N.o.l.l.i.c.k...T.o.s.h.i.a.g.h.t.-.a.r.r.e.e...{.0.}...h.u.n.n.a.g./.v.u.c./.o.o.y.l...{.0.}...t.h.u.n.n.a.g./.m.u.c./.o.o.y.l...{.0.}...t.h.u.n.n.a.g./.v.u.c./.o.o.y.l...{.0.}...t.h.u.n.n.a.g.y.n./.m.u.c.y.n./.o.o.y.l.y.n...{.0.}...d.y...h.u.n.n.a.g.y.n./.d.y...v.u.c.y.n./.d.y...o.o.y.l.y.n...7.[.a. .b. .c. ... .d. .e. .f. .g. .h. .i. .j. .k. .l. .m. .n. .o. .
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):4568
      Entropy (8bit):5.913040697749047
      Encrypted:false
      SSDEEP:96:nszCz9tVyDdvPu/eCMxQz4s0zHdQ9r03HdQ9rfGVRAkPjq8+7:n2CjV8dv2/yGuz999SGgku8+7
      MD5:FE43EFA3B9B8927080FF1352FC3A02D4
      SHA1:B376FC744C14D48BFEB6861DEC28FED967032693
      SHA-256:D0281A21D01EF8CC421575F5402EAB5291D0B7EF7C664AD13FA173B40E6EB574
      SHA-512:87AF3E22CC6A7F6AB65B8A4B9707A68C1B5BBF0F8E1685EEDC91FA3B1B34AC18675D8E4B104568D42D2F52BDCC9D9373B8B17F4930D831CCD8D0977314E300A0
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................[.. ........n...n...1................A.l...A.s...L.h...L.i...L.r...T.a...A.w.a...Y.a.u...A.f.i...A.s.a...F.a.b...L.a.h...L.a.r...L.i.t...N.u.w...K...H.......0.D...G.o.b.e...J.i.y.a...M.a.k.o...W.a.t.a...M.a.y.u...Y.u.l.i...Y.u.n.i...B.H.A.I.......0.0.D...K.w.a.n.a...K.w.a.t.a...M.i.n.t.i...K...H...Y...M.a.r.i.s...B...H...Y...Y.a.m.m.a...D.a...i...a.......0.0.0.D...A.g.u.s.t.a...A.s.a.b.a.r...D.u.b.u. .0...L.a.h.a.d.i...S.a.f.i.y.a...S.h.e.k.a.r.a...A.f.i.r.i.l.u...A.l.h.a.m.i.s...D.i.s.a.m.b.a...D.u.b.u. .0.0...J.a.n.a.i.r.u...J.u.m.m.a...a...L.i.t.i.n.i.n...N.u.w.a.m.b.a...S.a.t.u.m.b.a...D.u.b.u. .0.0.0...,.[... ... ... ... ... ... ... ... ... ... ... ... .p. .q. .{.r...}. ... ... ... .v. .x.]...5.[.A. .B. ... .C. .D. ... .E. .F. .G. .H. .I. .J. .K. ... .L. .M. .N. .O. .R. .S. .T. .U. .W. .Y. ... .Z.]...C.[.a. .b. .S. .c. .d. .W. .e. .f. .g. .h. .i. .j. .k. ... .l. .m. .n. .o. .r. .s. .{.s.h.}. .t. .{.t.s.}. .u. .w. .y. .{...}. .z. ...].......7.....Y4
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):20956
      Entropy (8bit):5.910124146251425
      Encrypted:false
      SSDEEP:384:oP3vdiXUxH+mTJcIWlj3qUl2nqg9WbknRyB2r/S/a0ZO47T79r0PobtFeyf5eitG:oPfdiXUxH+mTJcIWlj3qUl2nqg9WbknB
      MD5:92DDB8204215C89C13881C157ACD72FB
      SHA1:C7163CB1144428C4B8BC80E45214A585DB86759D
      SHA-256:B999B383BBED45223E606D0EE1736BFA58CD4695744E1FECACB1B3722FC0746C
      SHA-512:12CBCB64C32986DC0B190BC00C061DB76B2325F72A88204957E07533DFB83C8C9C78B48A9A8B48A153966EF5B511121D680FAE25938B6B98C344AB5F5D5F5CDF
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................U.. .5......o...o...V.....5.S......................................................................................................................................................................................................................................................................................................h.e.b.r...................................................................................................................................................................................................................................................................................................................................................................................... h. .a.................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):18092
      Entropy (8bit):5.595054760307402
      Encrypted:false
      SSDEEP:384:GD/kAwlk0XuWv6Sa+RsvpCjpMPIPXcppIAt8mqxltFLJJ89WDanJJv:GwAwlk0XuWv6cRsvpDPP/tLCC9CanJt
      MD5:37A0FC03E5453CF3D0E76ED34587A4C9
      SHA1:E921B5FCCA20B4DCA4CC9EE87F67B89763807384
      SHA-256:E3C03307CBD94E484BF970BB41F98B10EFB1E5F39E369EA0B9287E440CB5AC8C
      SHA-512:3D555398275861B8D29880AF3BA7B1AC5D0D1BE2F039DC8CF45DC4B9992F7728C56DCD001922306ECDA4EFFA1CB6604849DCBF33088D66AB28F37E20CE93EF53
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................V...................C.s...S.z.....v...M.F...T.....n.Q...d.e.....d.u.....d...l...S.z.e...S.z.o.....r.a.....r.a...I.V.....e.s.t.e...G. .y.....I.j...r...S.v...t...T.h.o.t...T...b.i.....d...r...I.I.I.....M.. M.....j...l.....j...n.....m...j.......p.r.....M.o.h.....R.e.d.....S.a.b.....S.e.v.....h.e.l.y...i...e.....i.s.z.....m.o.s.t...s.z...v...t.e.s.t.....j.f...l.....j.j.e.l...0.0.0...E...A.t.h...r...M.e.h.i.r...P.a.u.n.i...T.i.s.r.i...S.a.b...n...e.g.y...b...m...j.u.s...m...r.c.....a.n.g.o.l...f...r.f.i...i... .e.....i...s.z.....y... .M.......l.l.a.t...h.a.j.n.a.l...r.e.g.g.e.l...H.e.s.v...n...N.i.s.z...n...P.a.o.p.h.i...S.z.i.v...n...T...v...s.z.....d...r. .I...h.o.l.n.a.p...t.e.g.n.a.p...R.e.d.s.e.b...S.e.v.v...l...i... .s.z.....j.a.n.u...r...j...l.i.u.s...j...n.i.u.s...s.z.e.p.t.....G. .y.. y.....R...b... .1...R...b... .2...R...b.i. .I...n...v...n.y...s.z...m.o.k...u.t.a.z...s...z...s.z.l.......p...l.e.t...0.0.0...E.......K.i.s.z.l...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):13244
      Entropy (8bit):5.346525451471591
      Encrypted:false
      SSDEEP:384:Buc+QEbNN5Yc+gTsS7zEldvw4mQfIA554:Buc+QEJbBzQfy
      MD5:BA067583F68568C52B1C2CEA578BA60F
      SHA1:781D0CDA74B59F2D2F3BD4C44CA8577979829521
      SHA-256:A15E19FCF00BE14BD2BEEABC2C36B69E3F1EA36FB33E92D303D1B5B772660612
      SHA-512:0C8D22DF97F3486B542EE408F6D98F5EC219F1A385FECF1C074578AA3F9910CF03312689E406C50E5D160BE8A13549314F4F56A83805F065E0985A556906432A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .z..............V.....z..........j.o...j.o.v...o.c.t...v.e.n...a.E.C...h.e.r.i...l.o.c.o...h.o.d.i.e...c.l.a.v.e...c.i.f.r.a...c.o.r.d.e...d.e.m.a.n...m.e.t.e.o...v.i.a.g.e...m.a.r.t.i.o...p...C.h.r.....a...C.h.r.....a.l.t.e.r.e...d...d...a.....d...d...s.........0...b.l.n.......0...m.i.l.......0...m.l.d.......0...m.l.n...0.0.0. .b.l.n...0.0.0. .m.l.d...0.0.0. .m.l.n...a.u.g.u.s.t.o...o.c.t.o.b.r.e...c.o.r.p.o.r.e...f.e.m.i.n.i.n...n.u.m.e.r.o.s...o.b.j.e.c.t.o...s.a.g.i.t.t.a...s.e.c.u.n.d.a.......0.0...b.l.n.......0.0...m.i.l.......0.0...m.l.d.......0.0...m.l.n...d.e.c.e.m.b.r.e...j.a.n.u.a.r.i.o...b.a.n.d.i.e.r.a...f.e.b.r.u.a.r.i.o...i.s.t.e. .d.o.m.....i.s.t.e. .j.o.v.....i.s.t.e. .l.u.n.....i.s.t.e. .m.a.r.....i.s.t.e. .m.e.r.....i.s.t.e. .s.a.b.....i.s.t.e. .v.e.n.....b.a.n.d.i.e.r.a.s...b.r.i.t.a.n.n.i.c...e.m.o.t.i.c.o.n.e...i.s.t.e. .a.n.n.o...i.s.t.e. .h.o.r.a...o.r.n.a.m.e.n.t.o...0.0.0. .m.i.l.l.e.s...i.n. .{.0.}. .a.n.....d...d...s...d.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):88
      Entropy (8bit):2.8906977556519604
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlq/6ZjlllhlL4CllVcNX:SBtkJa/6lBL4C/VcNX
      MD5:BA9809A2B8AEDE0B6F1E31DDE40EDF94
      SHA1:0F936501FBC01CF480104043F59F5629C3B226A0
      SHA-256:B60D3260DD3F92A574E49A1CFFD7812B4FE358AB74E79841D0C1CCCE872A45B8
      SHA-512:F791169D12B86BDE1065C43AFB17A28F6D96E57D471BF37CE89869D256DCC74D7DCEB25E8141A4E29E705ABFDBA1B855586224435B6F15BE99CD81607275E8C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................StandardICU....... .....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):15272
      Entropy (8bit):5.81385632933126
      Encrypted:false
      SSDEEP:384:mXvRKgZj3sPludNBdyW2d8IvbCIUHRBOIA:05rdjdL2yhIUHTzA
      MD5:DD1DB37C045650FCE3615342D31FC0BB
      SHA1:13444EA55FDCCD22BCCCF56180317FEB34E1C9C6
      SHA-256:049BC6785252417645AF0D6795607FD03F26A98A83EDDEC316D67DE6F1F5CF5E
      SHA-512:BCC23B26714CFD7CC2EE5614E237DD0CE58704888C1A49EBD613A3334FE9130396FD3723A3F720D466A181C3D25D01905F502326FB4B831AE4389D86328925BF
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .m..............V.....m..........S.M...A.S...K.a.m...M.i.n...R.a.b...S.e.l...S.E.U...J.a.m...[...]...p.a.g.i...s.o.r.e...m.g.g.....l.u.s.a...b.l.n.....t.h.n.......0...M...d.t.k.....m.n.t.....p.r.i.a...s.i.a.n.g...M.a.r.e.t...S.y.a.w.......0.0...M.....0.0...T.....0...j.t.....0...r.b...a.n.g.k.a...b.a.d.a.n...b.e.s.o.k...h.e.w.a.n...o.b.j.e.k...p.a.n.a.h...S.y.a.w.a.l.....0.0...j.t.....0.0...r.b...t.e.m.p.a.t...v.a.r.i.a.n...w.i.s.a.t.a...A.g.u.s.t.u.s...S.y.a.. b.a.n.....0.0.0...j.t.....0.0.0...r.b...j.a.m. .i.n.i...k.e.m.a.r.i.n...l.a.i.n.n.y.a...0.0.0. .j.u.t.a...0.0.0. .r.i.b.u...J.u.m... .i.n.i...K.a.m... .i.n.i...M.i.n... .i.n.i...R.a.b... .i.n.i...R.a.m.a.d.h.a.n...S.a.b... .i.n.i...S.e.l... .i.n.i...S.e.n... .i.n.i...h.r. .k.e.r.j.a...z.o.n.a. .w.k.t...{.0.}...h.a.r.i...R.a.b.u. .i.n.i...b.a.n.g.u.n.a.n...h.a.r.i. .i.n.i...o.l.a.h.r.a.g.a...p.e.n.g.u.b.a.h...s.e.k.a.r.a.n.g...t.u.m.b.u.h.a.n...a.i.r. .h.u.j.a.n...A.k.t.i.v.i.t.a.s...J.u.m.a.t.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):3712
      Entropy (8bit):5.835884773736162
      Encrypted:false
      SSDEEP:96:2/Tb4xPO2EGQZequxts3HcMjCFIGHRQq1:2bMxPOxtZruxtNMj8BQq1
      MD5:6337A543901F7AA90833070F4DF3C92A
      SHA1:8F71D0817885F729C58B2E442979535410055C33
      SHA-256:EAF485FF424499951272C8FA2289B23C251D11B51A11C77AE2869FFCE8AA7EBE
      SHA-512:1BB561E6B268351DEDE091B65A594FB09DDDA90449776143E7F2D9500588598B623175EFAA20FB20D7C8C2CCF03B412CFA26E37F2D055D5236A476A8FBA0509D
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .6..............-.....6...............1.....2.....3.....4...j.. ..M...n...T.i.u...T.......W.e.n...I.z.u...E.p.r...J.e.n...J.u.u.....g.......k.t...T.O.A...T.a.a...P...M.....F.r.a.....E.c.h.i.....n.w.a...A...K.....J.u.u.n...T...K.....A.g.b.a...N.k.e.j.i...J.u.l.a.....M...n.d.e...T.a.a.t.a...S.e.k...n.d.....b...c.h.....E.p.r.e.e.l...M.a.a.c.h.......g.....s.t...S.a.t...d.e.e...E.l.e.k.e.r.e...F.r.a...d.e.e...N.n.y.a.a.f.....T.i.u.z.d.e.e...T.....z.d.e.e.....k.a.r.a. .1.....k.a.r.a. .2.....k.a.r.a. .3.....k.a.r.a. .4...M.e.t.r.i.i.k...N.. a.b.a.l.i...N.. ..t...t.......n.y.a.a.h.....J.e.n...w.a.r.....W.e.n.e.z.d.e.e...N.k.e.j.i. .A.f.....F.e.b.r...w.a.r.......b...c.h... ...k.a...A.f... .K.r.i.s.t.i.....b...c.h... .i.z.u...T.u.p.u. .K.r.i.s.t.i...{.0.}.,. .n.a. .{.1.}...{.1.}. .'.n.a.'. .{.0.}...M.p.a.g.h.a.r.a. .o.g.e...N.. ..t...t.../.N.. a.b.a.l.....).[.\.-. .,. .;. .\.:. .!. .?. ... .. .. .. .. .(. .). .\.[. .\.]. .\.{. .\.}.]...<.[....... .c. ...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):228
      Entropy (8bit):4.580372362566896
      Encrypted:false
      SSDEEP:6:Svuldmpqr4Kl+5+/gcCqD27OyxPY8ACPqhUG/oX0F1ZSnm4l/8N:Ddmo0mkkkPTG6pmo/8N
      MD5:E6407BFCE874AFF5110FFC45C2DF32CB
      SHA1:C4A0CFC1F717E65A24CC7AFB13AED52EB5B95510
      SHA-256:98C0037AC005C0ED74A66F5FF193AF36CCBA581EA9BB25BAE46AC6007A0FF7A6
      SHA-512:D6E5D16FD4F685CFCE854E79F7D30A1EE8B99F5067EDFFB64141D90AAB40211EBB3C255261B769E0C26D02C8DF56078FCD2BDB8DFA84A1E7D55E69BF93EAE780
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................*.. ........1...1........................y.............k..)...4.wEy...]..jeje......k..)...4.wW*ehe........................P...P....... ....................`...".. $.. ..[...o.w......` .. ...`&..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):15696
      Entropy (8bit):5.6376706549133
      Encrypted:false
      SSDEEP:384:v/i67HTEJAyjDfQ+cRKTUaWI0KIS9eUs+AbvG6+OSkau6FQ2f:HiqgQ+2OUTDZS9eUSbnXu
      MD5:193942E35467A793AB28C29056B83A25
      SHA1:8761870C6AD65117470ED40B2886BABF89772FC8
      SHA-256:4EE76B3E650BEA3169EF3E5DDC5923720D337331D581CA27BF405BA43B4533F8
      SHA-512:39EE362F37253EA4602E8A7F63B39EB21CDFAD94A16BF8ECC30B14517576E2A707CE36824396D9B25D19D9250256E5FBEC60F1CEC3A0952B10D00D6188B4DFF6
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................5.. ........L...L...V..............................................................................................................................................................................................................................................................................................................g.e.o.r...........................................................................................................................................................{.0.}.-...................................................................I.V. ..................................................................................... .......{.0.}.-......................... ............. ............. ............. ............. ............. .......................................................-.{.0.}................................................... .......I.I.I. ............................................. .................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2220
      Entropy (8bit):5.133887433059866
      Encrypted:false
      SSDEEP:48:lWYogzBV1v8su8uhIy8LKDTV4vLIb4i6vTfcFwVra:lT5zf1v8j8uhIy8LKH2zIbYvjcOY
      MD5:9F1DFB3396A040402379FD6F7FD26D89
      SHA1:D3BB893D512B63E1F9B2A0A810A367934B4C1644
      SHA-256:B43471A74A5F43B49E1E18808648A972E6C8D1CC780ED60E7174BB92FF648715
      SHA-512:6958E03C4D58C6D7B580B3CB04E91CFA305CE1DD53034AB8E7DA8818856AA6BAFA616E948AD1C4E0E5EB5CC7EBA5AEF5124F9757E5F3AF10BA14167A77D85919
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........#...#........................A.s.s...C.t.e...D.u.....F.u.r...K.u.....M.e.c...N.u.n...S.a.n...S.a.y...T.u.b...Y.a.n...Y.e.b...Y.e.n.....u.c...K.r.a.....K...g.1...K...g.2...K...g.3...K...g.4...S...i.s.....u.c.t...A.g.g.u.r...A.s.s.-.a...D.d.u.r.t...F.u.[.a.r...M.a.y.y.u...T.u.b.e.[...Y.u.l.y.u...Y.u.n.y.u...[.o. .v.]...A.z.e.k.k.a...I...e.l.l.i...K.u...a.s.s...M.e.c.r.e.s...S.a.m.a.s.s...S.a.n.a.s.s...S.a.y.a.s.s...T.a.l.l.i.t...T.a.m.e.r.t...T.a.s.i.n.t...Y.a.n.a.s.s...Y.e.b.r.i.r...n. .t.u.f.a.t...A.s.e.g.g.a.s...C.t.e.m.b.e.[...K.r.a...a.s.s...S...i.s.a.s.s...T.a.m.r.e.c.t...D.u...e.m.b.e.[...N.u.n.e.m.b.e.[...Y.e.n.n.a.y.e.r...s.l.d... .T.......s.n.d... .T.......U.s.s.a.n. .n. .d.d.u.r.t...a.k.r.a...a.g.g.u.r. .a.m.e.n.z.u...a.k.r.a...a.g.g.u.r. .w.i.s.-.k.u.....a.k.r.a...a.g.g.u.r. .w.i.s.-.s.i.n...n. .t.u.f.a.t. ./. .n. .t.m.e.d.d.i.t...a.k.r.a...a.g.g.u.r. .w.i.s.-.k.r.a.....s.e.l.d. .t.a.l.a.l.i.t. .n. ...i.s.a...s.e.n.d. .t.a.l.a.l.i.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2064
      Entropy (8bit):4.948433584060709
      Encrypted:false
      SSDEEP:48:gQ4G3fYb9JqyAbjEuuhfyAuGs9aRNuynom0hjM93rjM1n5gWVuzQVnA:60YbHjxBJNcm0BEvqn5/1A
      MD5:38B85F189DFA6F6AF02FF64792ED29CD
      SHA1:BD7F5D6E3EA0C0774724C7C60CB2F34DEA05A980
      SHA-256:88F0AFF524D91359E2D6D5518487FBB24F098756425B96E6FD63097C788D63A7
      SHA-512:BD852CEADFC6A00419FD97C9D1FE597E17CB7BBEDAFB64957B574154DFE532D3EA4F66316A14D54B3C2BC633D7A76DE71751E87000690814E147A7AD34D45C06
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .6....................6.........(...I.Y...M.Y...K.e.l...K.n.d...K.t.n...K.t.i...M.b.e...M.o.o...N.y.a...W.k.l...W.k.n...W.k.w...W.k.y...W.t.h...W.t.n...W.t.i...(.k.l...(.k.m...(.k.u...h.n.)...M.w.a.i...(.y.o.o...K.y.u.m.w.a...(.v.i.n.d.a...N.d.a.t.).k.a...W.a. .k.a.n.a...W.a. .k.e.l.)...h.m.i.n.t.h.)...K.y.u.m.w.a.n.)...(.y.a.k.w.a.k.y.a...W.a. .k.a.t.a.n.o...W.a. .k.a.t.a.t.i...W.a. .k.y.u.m.w.a...L.o.v.o. .y.a. .k.a.n.a...L.o.v.o. .y.a. .k.e.l.)...L.o.v.o. .y.a. .m.b.e.e...M.b.e.e. .w.a. .Y.e.s.i...M.w.a.i. .w.a. .k.a.n.a...M.w.a.i. .w.a. .k.e.l.)...M.w.a.i. .w.a. .m.b.e.e...W.a. .t.h.a.n.t.h.a.t.i...M.w.a.i. .w.a. .k.e.n.d.a...M.w.a.i. .w.a. .).k.u.m.i...(.t.i.n.a. .w.a. .Y.e.s.i...K.).s.i.o. .k.y.a. .).s.a.a...L.o.v.o. .y.a. .k.a.t.a.t.i...M.w.a.i. .w.a. .k.a.t.a.n.o...M.w.a.i. .w.a. .k.a.t.a.t.i...M.w.a.i. .w.a. .m.u.o.n.z.a...W.a. .k.w.a.m.b.).l.).l.y.a...M.w.a.i. .w.a. .n.y.a.a.n.y.a...(.y.a.k.w.a.k.y.a./.(.y.a.w.).o.o...M.w.a.i. .w.a. .t.h.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2024
      Entropy (8bit):4.901964455259392
      Encrypted:false
      SSDEEP:48:GCiDWP474e4l4PjP4YRMo4oMwRMQRMKRMEl4oMCRMWRMERMfRMERMMjMFrjMpIgy:3Mt42tjVrRVHRuRbMGIgmBTmM9f
      MD5:C4A9A42D870D122DB294424CDC0A8A3D
      SHA1:F1CEB777A63F2301C1EAB9BA223A2DD2308017D2
      SHA-256:A74EFB4AE75E0D79A479B4853DAB200CAFA59101344BC77801F0395F4080F9D1
      SHA-512:0BF5982577288FE10DF77DA1CB3A54E49AB5D545B444C33A977FFCFD7F431364E0F3D773C072FD5B51C9049796527CB1D29D7802754C6E6DD23AF761EA11F481
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .m....................m.........A.Y...N.Y...L.l.1...L.l.2...L.l.3...L.l.4...L.l.5...L.l.6...L.l.7...M.u.h.i...L.i.d.o...N.e.l.o...M.w.e.d.i...N.u.n.d.u...L.i.h.i.k.u...L.i.j.u.m.a...M.a.h.i.k.u...M.u.h.i./.C.h.i.l.o...M.w.e.d.i. .N.t.a.n.d.i...M.w.e.d.i. .w.a. .P.i.l.i...M.w.e.d.i. .w.a. .T.a.t.u...N.a.n.k.u.i.d.a. .Y.e.s.u...A.k.a.n.a.p.a.w.a. .Y.e.s.u...L.i.d.u.v.a. .l.i.t.a.n.d.i...L.i.d.u.v.a. .l.y.a.p.i.l.i...L.i.d.u.v.a. .l.y.a.t.a.t.u...N.p.a.n.d.a. .w.a. .m.u.d.a...M.w.e.d.i. .w.a. .N.n.y.a.n.o...L.i.d.u.v.a. .l.y.a.n.n.y.a.n.o...M.w.e.d.i. .w.a. .N.c.h.e.c.h.i...D.i.s.i.k.u. .d.y.a. .l.i.j.u.m.a...L.i.d.u.v.a. .l.y.a.n.c.h.e.c.h.i...M.w.e.d.i. .w.a. .N.n.y.a.n.o. .n.a. .U.m.o...L.i.d.u.v.a. .l.y.a.n.n.y.a.n.o. .n.a. .l.i.n.j.i...M.w.e.d.i. .w.a. .N.n.y.a.n.o. .n.a. .M.i.t.a.t.u...M.w.e.d.i. .w.a. .N.n.y.a.n.o. .n.a. .M.i.v.i.l.i...M.w.e.d.i. .w.a. .N.n.y.a.n.o. .n.a. .N.n.y.a.n.o...L.i.d.u.v.a. .l.y.a.n.n.y.a.n.o. .n.a. .m.a.v.i.l.i...M.w.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):6876
      Entropy (8bit):4.946324598732954
      Encrypted:false
      SSDEEP:96:WDsNYz5J6B76OA/Ok9yNKTFEdsimwEtLVOIFyU7W/fCGrlw7vHHFoGjjeHgA2:WD1zCR88KTIm1U8y7SGkvnFo+jsy
      MD5:0043D5000800EAA0476252B372BBA4D1
      SHA1:C64CD761CDBBCD2925C3B128E795BF76A3DCFB59
      SHA-256:9FF8B84024791426589B9454E301E7AAA5734A9471B492DB01EF2A8BBE50FDC4
      SHA-512:A6EB41A175A9574D2834946B42699C36370379AC10923F8158F3C4743EAA97F4A3DB4FE2D23EE2CCED0E8E8732C2CF622016FAC6F085085A37CD104241B9BC58
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................/...........bcpTypeAlias.ca.islamicc.keyInfo.deprecated.kh.vt.valueType.h0.x0.keyMap.calendar.colalternate.colbackwards.colcasefirst.colcaselevel.colhiraganaquaternary.collation.colnormalization.colnumeric.colreorder.colstrength.currency.d0.fw.hours.i0.k0.kv.lb.lw.m0.measure.numbers.s0.t0.timezone.variabletop.typeAlias.quarternary.typeInfo.co.direct.camtr.typeMap.buddhist.chinese.coptic.dangi.ethiopic.ethiopic-amete-alem.gregorian.hebrew.indian.islamic.islamic-civil.islamic-rgsa.islamic-tbla.islamic-umalqura.iso8601.japanese.persian.roc.account.standard.non-ignorable.shifted.yes.lower.upper.big5han.compat.dictionary.ducet.emoji.gb2312han.phonebook.phonetic.pinyin.reformed.search.searchjl.stroke.traditional.unihan.zhuyin.REORDER_CODE.digit.punct.space.symbol.identical.primary.secondary.tertiary.adp.aed.afa.afn.alk.amd.ang.aoa.aok.aon.aor.arl.arm.arp.ars.ats.aud.awg.azm.azn.bad.bam.ban.bbd.bdt.bec.bef.bel.bgl.bgm.bgn.bgo.bhd.bif.bmd.bnd
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):1892
      Entropy (8bit):5.089152503137751
      Encrypted:false
      SSDEEP:48:58MtyDcuzJJsSxcE7OI+HCVhlms+jWoUQdijq6LrLrLzj4bo7r85FXKar:ptyDcmMSiE7haQlms+y9Qdi5LrLrLn49
      MD5:68749307A2C6C01AE6022CC216368F81
      SHA1:BA9781D455A957A6EFFFB3F674ACB57BB3616395
      SHA-256:44AC6E5FEF29C38664BFC4468DF48895004EFC598086D024D3CF0B9C70DDABC3
      SHA-512:8F2B7D8DF88AFB4E0CA634A321D5C43C0526F1FE561B1F7728E9DE5C4E2350547A0A5B01185249E9E3043827F523C29E8036F33A4B3FB7866AE3C52350C59318
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................................m.s...m.[...f.[...y.e.d.i...k.w.e.y...m.u.k.a...l.u.n.d.i...n.j.a.p.i...p.a.m.b.a...w.a.n.j.a...k.u.K.g.w.[...n.y.u.k.u.l...n.[.m.[.n.T...S.u.l.S.u.s.[...m.[.r.k.[.r.[.d.i...v.a.K.d.[.r.[.d.i...E. .d.d./.M.M. .y...m.T.n.T. .s.T.n.d.i...N.y.T.l.T.m.b.T.K.g.T...M.T.n.T. .K.g.b.a.n.j.a...m.b.i.y.T. .m.[.n.d.o.K.g.T...E. .d.d./.M.M. .y. .G.G.G.G.G...N.y.a.K.g.w.[. .K.g.b.a.n.j.a...[.,. .\.:. .!. .?. ... .& .. .9 .: .. .. ... ... .(. .). .*.].....[.A. .B. ... .C. .D. ... .{...y.}. .E. ... .F. .G. .{.G.b.}. .{.G.w.}. .H. .I. .{.I.'.}. .J. .K. .{.K.p.}. .{.K.w.}. .L. .M. .{.M.b.}. .N. .{.N.d.}. ... .{.N.y.}. .J. .{.J.g.}. .{.J.g.b.}. .{.J.g.w.}. .O. ... .{...'.}. .P. .R. .S. .T. .U. .{.U.'.}. .V. .W. .Y.].....[.a. ... ... ... .{.a.'.}. .b. .S. .c. .d. .W. .{.W.y.}. .e. ... ... ... .[. .{.[...}. .{.[...}. .{.[...}. .{.[.'.}. .f. .g. .{.g.b.}. .{.g.w.}. .h. .i. ... ... ... .{.i.'.}. .j. .k. .{.k.p.}. .{.k.w.}. .l. .m. .
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):28556
      Entropy (8bit):5.803587066284139
      Encrypted:false
      SSDEEP:384:Q6qtmsWbuGaJC6NcUi0ZI/Rkimpc+IO/15E3C3VSyZ7/cdkfxN7jHXgiiAX:Q6Dscx6N/Ikiecb217nbHj
      MD5:4BE347054E963AB2D432D2C2CECDF9F9
      SHA1:5015B7090F8D7ED7E89BF322241C5A4C153E11FB
      SHA-256:1190F172A81569AF1BDB953836E40B5A2C92071803D9626B20A467CC4F4D398E
      SHA-512:5FB4E40B578526A16D407B11BAD800C03E8F18E9185A121226E8EAA0F17A5170E3C786EE647A8E5110E4C6887D69741A9248CCA21A800120D8F846DC3237C0A6
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................V...................$.......T...U...3.....4.....5.....6.....7.....8.....9.......$...$.........................A........... ...........x............................ ..........t..........t.....$........L.t...,......t...h.......8.....D..... ...........$.....x................. ...........$.....x.................i................... .........t.......0.....0.....0.....0. ...0.....0.....0.t...C..................$.....\...p..........|..........4. ...4.....4.$...4.x...4.....4.....1.\.... .........$....x...............0......................$.....\...+....P.H.....'.....D...................... ..........t...D....U..........D.....D.....D....D. ...D....D.t.....$.........................X...................X.....\.\...\......................t.<.....(.....1.....D.....|....<...).............<.....0.....@.....<................1........$....,.t...x.<..............X....\....1.1.....1.2.....1.0.......D.....P.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2984
      Entropy (8bit):5.341880406270565
      Encrypted:false
      SSDEEP:48:7X6nloFtS2bOkPfCA2em0NVrChaLQyoJBGyvWClpb3P4Nv2R:7sloFUUOIfRm0NYhPyoZvWClVe2R
      MD5:4DD3D8949DB8BA7C26990D277F7E44BF
      SHA1:36FA32A8F7E779E42EFFE92BB6EBAA93EDD853D2
      SHA-256:7D6B05124CD5B9A492EF5436B4945BF978CD44BEA2D20D334FC84A57E4E68976
      SHA-512:7F9A59D8DB949C4AF24DA92588C7F9843B414D0B14B19D33982E7FE2D1E0F7ECE3D1A5AEC6184F1145C4C495242DF2F3AD33767C74B2DD0761F6A39004D6078E
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................0................^.....n...d._...p._...s._...y._....._.....1.....2.....3.....4...B.Z...P.Z...s.l...p..._...a.v.r...g.e.l...g.u.l...h.f.....k.e.w...r.e.z...r.e._...r...b...s.e.r...s.t.....t...r...d.u.h.....r.o.....s.a.l.....r.k.....s.a.e.t...s.i.b.e...d.u._.e.m...s..._.e.m...a.d.a.r.....a.v.r...l...g.u.l.a.n...h.e.f.t.e...r.o.j.e.k.....a.r...k...r.e._.e.m.....y.e.k._.e.m.....a.r._.e.m...t...r.m.e.h...%.#.,.#.#.0...a.v.r...l.....d.e.q...q.e...g.u.l.a.n.....h.e.y.w.a.n...k.e.w.....r...p..._.p.e.r...r.e.z.b.e.r...s.a.n.i.y.e...s.e.r.d.e.m...p...n.c._.e.m...{.0.}. .r.o.j...g.e.l.a.w...j...k.e.w.....r.....p..._.p.e.r.....r.e.z.b.e.r.....t...r.m.e.h.....g.e.l.a.w...j.....r.e._.e.m.i.y.....r...b.e.n.d.a.n...s.e.r.m.a.w.e.z...{.0.}. ... .{.1.}...b.e.r.f.a.n.b.a.r...r...b.e.n.d.a.n.....s.e.r.m.a.w.e.z.....{.0.}. .a.n. .{.1.}...b.e.r.f.a.n.b.a.r.....s.a.l.a. .p.i._.t.....b.e.r... .z.a.y...n.....p.i._.t... .z.a.y...n.....h.e.y.w.a.n. .a.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):932
      Entropy (8bit):4.55715791046585
      Encrypted:false
      SSDEEP:12:JQEuuRPl1wFTDWny0cx4sOItXInEl+90l+3y7ElUBRXnssUNPJN/Vxnjv8JJw3UH:QuNlq0c+Atr+9c+CAUBFvaPnjvaKU5N
      MD5:9BCD9030FFDB12BAAB504DDC853C35FB
      SHA1:BD63B57FA203696840F4AC81D3E35CBD1C3EE816
      SHA-256:96608B69E51D4C3D0EB4DA7364845064574E7EE994B78F904CBE53E52C354429
      SHA-512:53299EEEFBC5DB380FCA8ED82486D4A4DCBA648A254CCF283558AE8CE8AA4F348D4355110A8E9C89CAA5FBE03FF20AF78DD7FD8BF10754511E93FA15506D9F22
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................-...........R..s..T...e...C.h.[.....D.T...s...E.g.b.....E.n.d.....T.a.m.....Z.u.l.....K.h.m.[.....M...l.a.e...U.u.d...w.....l.a.b.......m.a.l.....C.h...e.n.....D.z.a.m.[.....G.h...l.......K.p.T.l...s...L.u.s.h...a...S.u.e.d...s...S...m.a.l.....T.....k...s...Y.u.l...b.a...k...u.l...a.....t.a.l...a...K.h.K.g.e.l.e...L...w.a.n.d.....B...u.g.h.l...a...B...u.m.[.s.[.....B.h...K.g.a.l.....D.z...b.v...n.....D.z...k.p...n.....H.T.K.g.a.l...a...K.p.[.[.s.h...a...L...m.a.n.y...a...N.[...k.p.a.l.......k.[.l.[.n...a...K.p.o.t...w.g...i...K.h.t.s.T.K.k.a.K...S.h...k.p.a.n...s...V...y.[.t.n...m.....B.[...l...l.u.s...n...K.p.u.w.n.d.z.a.b.....K.h...f...l...K.s.i.....n.d...n.[.s.h...a...-...@...[.......*.7.B.X.o.....@.....'.........D.Y.......0.[.........A.M.............H.F......0......Z.l.......J............C.~.u..<..c.............R.'. ..........5..........V...L..P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):1140
      Entropy (8bit):4.1083465013521225
      Encrypted:false
      SSDEEP:12:8XTclGV3TInR6wXBJ0lXKxMNuwPwTSGUxzrkVnfM8+kS0YUlrKAH8YZl0ui8aAAL:8TFMfy94lK0frvJ2xzqxbxzRMmwVpb
      MD5:531F5712ACD4D1725A78494EA29B1B87
      SHA1:A7B23C03B40C0A7FEE8FA8E34300983AACB0A16E
      SHA-256:2B9981A539D7380CEF83307E1A772A982416A4BE0972873BAAD05512ECA08814
      SHA-512:109DDEA80DA78C7B057CAFBC6D0CCEF971ACB8B352DAED64896124CE961C1D916A59712BD9C59EA5A1AF7B5F72FD59CB715DD0852986785A20FCB825C9D2AE8A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................,...........R..s..A.m.a.r.i.k...A.r.a.b.i.k...B.o.r.T.f.o...D.[.[.k.y.e...F.r.[.n.k.y.e...G.y.a.a.m.a.n...K.y.[.k. .k.a.s.a...U.r.d.u. .k.a.s.a...G.r.e.e.k. .k.a.s.a...I.t.a.l.y. .k.a.s.a...K.o.r.e.a. .k.a.s.a...M.a.l.a.y. .k.a.s.a...N.[.p.a.l. .k.a.s.a...S.p.a.i.n. .k.a.s.a...T.a.m.i.l. .k.a.s.a...T.[.[.k.i. .k.a.s.a...U.k.r.e.n. .k.a.s.a...B.[.[.m.i.s. .k.a.s.a...G.y.a.p.a.n. .k.a.s.a...H.a.n.g.r.i. .k.a.s.a...K.y.a.e.n.a. .k.a.s.a...P.T.l.a.n.d. .k.a.s.a...R.a.h.y.i.a. .k.a.s.a...S.w.e.d.e.n. .k.a.s.a...B.e.l.a.r.u.s. .k.a.s.a...B.e.n.g.a.l.i. .k.a.s.a...P.[.[.h.y.i.a. .k.a.s.a...R.e.w.a.n.d.a. .k.a.s.a...R.o.m.e.n.i.a. .k.a.s.a...S.o.m.a.l.i.a. .k.a.s.a...T.a.e.l.a.n.d. .k.a.s.a...V.i.[.t.n.a.m. .k.a.s.a...B.T.l.g.e.r.i.a. .k.a.s.a...G.y.a.b.a.n.i.s. .k.a.s.a...K.a.m.b.o.d.i.a. .k.a.s.a...P.u.n.g.y.a.b.i. .k.a.s.a...P.T.T.t.u.g.a.l. .k.a.s.a...I.n.d.o.n.i.h.y.i.a. .k.a.s.a...,.@...[.......*.7.B.X.o.....@.....'.........D.Y.......0.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):22592
      Entropy (8bit):4.468208862094397
      Encrypted:false
      SSDEEP:384:DrCcNmVdrwfVwrKSU5+rWV4WsfKvMh2itQhXSn4SUBBWrP:PvmVdmJ+rWORQMh2itQhMUBBYP
      MD5:F1DD8B42923E9D487C11078E72AC3331
      SHA1:2F57235B972662F6B2BE974EBD4D0514BCB1F650
      SHA-256:079B6E33C3B23BB804B08BDB7D1608B24E622AB4F580D609B4B76619D986F4AA
      SHA-512:D41490E53BFD944C03C910090EC2FC045A41E520DA02A2997E54C83278F2E2B518446D72D5AFE86B5DA89D9E092245E1C97BF8D6BC628ACAA05EC3FA862AB7C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .n....................n.....R..s..E.H.F...#.F.C.H...#.C.H.3...%.E.(.H...'.D.,.'...'.D.,.H...'.D.D.H...'.D.J.J...(.'.E.F...*.J.*.'...*.J.3.H...3.J.F.'...E.'.(.'...E.J.*.'...G.'.F.(...'.D.A.'.J...'.D.#.:.E...'.D.'.F.'...'.D.*.H.J...'.D.*.J.A...'.D.,.0.1...'.D.1.H.'...'.D.3.1.1...'.D.C.1.I...'.D.C.H.J...'.D.D.'.H...'.D.G.'.F...'.D.G.(.'...'.D.J.'.H...*.4.J.:.'...-.'.3.H.(...3.'.F.:.H...:.H.*.4.F...D.'.F.,.J...E.F./.F.,...F.'.E.(.J...'.D.(.4.*.H...%.J.E.H.,.J...'.D.%.A.J.C...'.D.%.J./.H...'.D.%.J.H.J...'.D.(.J.,.'...'.D.*.J.*.E...'.D.*.J.E.F...'.D.+.9.F.)...'.D.,.'.J.H...'.D.,.(.J.'...'.D.,.F./.J...'.D.-.+.J.)...'.D./.F.C.'...'.D.1.F./.J...'.D.1.H.F.J...'.D.3.H.3.H...'.D.3.H.:.'...'.D.3.J.1.+...'.D.A.'.F.,...'.D.C.'./.H...'.D.C.(.J.D...'.D.C.1.J.C...'.D.C.H.1.H...'.D.C.H.E.J...'.D.D.H.2.J...'.D.E.'.,.'...'.D.E.'.1.J...'.D.E.H.3.J...'.D.E.J.F./...'.D.F.H.1.H...'.D.F.H.J.1...'.D.F.J.H.J...'.D.G.J./.'...'.D.H.'.4.H...(.D.F.3.J.)...*.4.D.-.J.*...C.'.F.E.(.H.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):116
      Entropy (8bit):3.8247927337926964
      Encrypted:false
      SSDEEP:3:XCbVSm/tlEF3stdo/Q5zcjCjUovDopt3Ten:Sv8ctu/D+oo7oD3an
      MD5:F56605EFF043B38B0EBF7D3428ECBFF9
      SHA1:6699F16768C8F9EF7BC15CCA0BFA1349F25DE493
      SHA-256:F7A5378171BA8BD4578D4CC3B9F40DA87195C46B159CDA4BB898D5C12183A987
      SHA-512:A90DF0317B867AA5410056D0C40B64716D692544C9F5CA8C0638AD47DBDA938E7CAF2C77EC336784C955427F466BA912D65375F9AE52280AFF2AF4FE84F2EA41
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..:....................:....R..s..'.D./.F.E.'.1.C.J.)........:......V......P.:.`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):1348
      Entropy (8bit):3.932761590706259
      Encrypted:false
      SSDEEP:24:bgDMp0Z9MC3d0r1JmMqiq1SGZHAaS0lZj7WXKWygltvM3PDDZsM0LrzVNkPAMJyH:bgIp0zMC3d4YMqiq1SGZHS0Dj7+KWyaZ
      MD5:4901BA6F40C5267C8D1C17D35DA758AE
      SHA1:811215B524A36A322EB895106F0A761E5F39DEE8
      SHA-256:F399D429791494C5A498961FAA17E902ED51BC49BBD8E793744F6FC7F690B403
      SHA-512:754AA89E244FE9F68315FBE6203D42701B519553D3BAE169117A6214068C3320ACDC6B5509D6846DEBBB663B3D154A0D0066C6A8640BCB5D4C7F764D0CC8A701
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................E.. ..x.....I...I...-......xE...R..s..I.c.h.i. .I.b.o...I.c.h.i. .A.k.a.n...I.c.h.i. .A.r.a.b...I.c.h.i. .T.h.a.i...I.c.h.i. .Z.u.l.u...I.c.h.i. .B.u.r.m.a...I.c.h.i. .C.h.e.k.i...I.c.h.i. .D.a.c.h.i...I.c.h.i. .G.r.i.k.i...I.c.h.i. .H.a.u.s.a...I.c.h.i. .H.i.n.d.u...I.c.h.i. .K.h.m.e.r...I.c.h.i. .P.e.s.i.a...I.c.h.i. .S.u.n.g.u...I.c.h.i. .T.a.m.i.l...I.c.h.i. .U.r.u.d.u...I.c.h.i. .A.m.h.a.r.i...I.c.h.i. .J.e.m.a.n.i...I.c.h.i. .N.e.p.a.l.i...I.c.h.i. .R.w.a.n.d.a...I.c.h.i. .Y.o.r.u.b.a...I.c.h.i. .B.e.l.a.r.u.s...I.c.h.i. .B.e.n.g.a.l.i...I.c.h.i. .F.r.e.n.c.h.i...I.c.h.i. .K.o.r.i.a.n.i...I.c.h.i. .P.o.l.i.s.h.i...I.c.h.i. .P.u.n.j.a.b.i...I.c.h.i. .R.u.s.i.a.n.i...I.c.h.i. .S.w.i.d.e.n.i...I.c.h.i. .T.a.k.i.s.h.i...I.c.h.i. .C.h.a.i.n.i.s.i...I.c.h.i. .I.t.a.l.i.a.n.i...I.c.h.i. .J.a.p.a.n.i.s.i...I.c.h.i. .J.a.v.a.n.i.s.i...I.c.h.i. .P.o.t.o.g.i.s.i...I.c.h.i. .S.p.a.n.i.s.h.i...I.c.h.i. .H.a.n.g.a.r.i.a.n...I.c.h.i. .M.a.l.e.s.h.a.n.i...I.c.h.i.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):668
      Entropy (8bit):4.304507620837286
      Encrypted:false
      SSDEEP:12:Fw8NzAD2aGtNFqahEbeYdQfeCdQdMMdqP12peKnzC5RmK4:F9zACaG7FqqlYdPCdQdMMdQ2MKuU
      MD5:A992876928751A88F99FFC0E184E2F27
      SHA1:CC1E231E926B787144ADDD06FD6C304ACF275110
      SHA-256:2B23657F3FC73581052B7C120A42107F1EBA1090011F71A5924901EEC51DF4C4
      SHA-512:E8FBBA388059A1418D015894E9DF31C4388EC9BD9CA49C446DE4C3890BBBB631DD440D329F2D62CC406F6A4A8154111B7B5CD1CE143B7BA4669DB00C3DE93DB8
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................R..s..b...|.D...A...g.r.S...Q.r...S.z...T...c.r...V.|.Q...a.r.B.....V.|.Q...f...Q.....b.......f...Q....._..._.`...f...Q.....I.r...g.|.D...f...Q.....h.t...b.t...f.t...f...Q.....b.......a.r.B...B.f.b...T.....Q.V...r.S...G.r.`.r...f...Q.....b.......a.r.B...b...r.D...T.....Q.V...r.S...G.r.`.r...f...Q... .(.h...b.r...)...Q.V...r.S...G.r.`.r...f...Q... .(.A.z...S...L...)...Q.V...r.S...G.r.`.r...f...Q... .(.Q.V...r.S...c.S...)...*.f...S...V.b.....t.Q... .a.r.B...b.r.B.f...f.t...X...V.@.|.Q...T.`.r..._.r.S...P.|.........X.X...o.u................../E/_/-/..................t....../..{/........V....P...P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.9059918981668114
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMvs06E7lso5vn:Svv06gsG
      MD5:D98FB5F9E283865FC645EFD43062C7A5
      SHA1:BE52530BF72C9E226A6F9B01F4617DF3BAEC2CC3
      SHA-256:09B1AD733085B1DF053F02EF0B65551CCEC422B344735D30ADFD2CF9941A600A
      SHA-512:E1070F6CBB347011EFF23EA379583CA63742EAE2D7FAE92E4A76AB5EC77CB0133505FEA0E6C288C08D80ACB3FC2FCA916D5590728AD49C8BD2BD33321EF0B6F4
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s....V...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):14636
      Entropy (8bit):4.986354804883475
      Encrypted:false
      SSDEEP:384:eDI3+dBp/najsM3SVrn9sp3iZ5H+fEAwI:eDI3+dBxnaj9Ir9shiZ5efEBI
      MD5:CB82F2014998434D15EA82893A9CC67C
      SHA1:F15783784912E7E184933A07DD83CCA472201A73
      SHA-256:E65A3814B79141B6D109485A499661D244EB02D1BFEBD89D4B56C5D8A85622DC
      SHA-512:C3D9D4AFC240E4D65302978EA0F6730BB315BA3D58115AC61CDC6BC038282FF4AA3557D2FEC5BD4AF86B1710889E57DC50A74D68FF2E00C4585BB657FC3527D8
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................/.. .N......C...C.........N.....R..s..r.o.d...R.e.s.i...k.t.h.i...m.r.o.o...n.-.k.o...p.h.l.i...p.h.l.p...S.O.L.B.A...a.r.v.e.t...k.y.m.y.k...y.a.k.u.t...f...l.l.e.s...f...r...s.k...k.i.e.m.b.u...l.u.y.a.n.a...p.o.n.a.p.e...V.a.i.-.t.a.l...b.r.a.m.i.s.k...c.o.r.n.i.s.k...k.a.y.a. .l.i...l.e.t.t.i.s.k...l.i.p.o.v.a.z...o.l.d.i.r.s.k...s.u.r.s.i.l.v...s.u.t.s.i.l.v...v.a.i.d.i.k.a...w.a.l.b.i.r.i...o.l.d.g.r...s.k...a.r.u.m...n.s.k...r.o.m.e.r.t.a.l...C.h.a.m.-.t.a.l...N.. K.o.-.t.a.l...T.i.d.s.z.o.n.e...c.a.r.i.b.i.s.k...f.o.n.x.s.a.m.p...f.r.i.u.l.i.a.n...g.a.l.i.c.i.s.k...j.i.d.d.i.s.c.h...k.a.b.y.l.i.s.k...k.a.r.i.a.n.s.k...m.a.l.a.j.i.s.k...m.a.z.e.n.i.s.k...n.i.u.e.a.n.s.k...n.o.r.d.l.u.r.i...s.a.r.d.i.n.s.k...s.h.i.m.a.o.r.e...s.y.d.s.o.t.h.o...t.j.e.k.k.i.s.k...u.y.g.u.r.i.s.k...v.a.l.l.a.d.e.r...L.i.m.b.u.-.t.a.l...T.a.k.r.i.-.t.a.l...a.r.a.b.e.r.t.a.l...a.v.e.s.t.a.n.s.k...b.i.s.c.a.y.i.s.k...b.u.r.i.a.t.i.s.k...c.a.t.a.l.a.n.s.k...e.l.a.m.i.t.i.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):268
      Entropy (8bit):5.857292864123356
      Encrypted:false
      SSDEEP:6:SvXKlaDxNxROdZxCt83Dk3cTZN6l46izrxZvhtl03zj:mKlatNkJZNFJzrHvhtef
      MD5:42541BF668D34C4055687EC04AC04A1C
      SHA1:2796A316344F66BB7B20FCC303E40C938D1B0840
      SHA-256:7BAC89A0D392FE8ED84D1C0946E69C449DFAD6FF4FEF5CED8B81DCD623613AE4
      SHA-512:BA15E6273EC9A97F6F5A1ACAFACC8C596E108618CEFDEC865CCCE0FEEB8B88BC3B5E6A9460E233BA2B194733E1B45283729CE1FA2D2DAA0A1BC0B3342724C645
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................7.. ........;...;...-.......7...R..s..-.@...[.......*.7.7.B.X.o.....@.....'.........D.Y.......0.[.........A.M.............H.F........#..G.G.#.#E..H..2.G.......0.\...G....|G..s0..]#i0K0A0..}0R....#...G.#.0...\.#........V......P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):1040
      Entropy (8bit):3.968991321443151
      Encrypted:false
      SSDEEP:24:Wh82Phx1IPlbRRCb6D9qFeEzARyL89t9yL89Nt4Elit4r5JnhoOn:uqjD9GzARyL89t9yL89Nt4Elit4rXPn
      MD5:AE5239642F81C44DB129566D0DBCDB1E
      SHA1:4B37D749E49A72170F1CB3F3275C9D06DD05BC10
      SHA-256:2B0B4846F0BC15F980C4BBE47346A422F0432E3CEAB12A7D064A91A1B61A16E6
      SHA-512:876B3F5AEDCC7F63279E54E472B8E1D8127304CB7FF1940A963284889D9259BB86716C0CC88780FC3FA9CB2034FB6909F691BAC5F03E95E5095D0691D762E3DA
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..........................R..s..A.c.e.h.-.S.p.r.a.c.h.e...B.i.n.i.-.S.p.r.a.c.h.e...A.l.t.p.r.e.u.s.s.i.s.c.h...B.a.s.a.a.-.S.p.r.a.c.h.e...B.i.k.o.l.-.S.p.r.a.c.h.e...D.i.n.k.a.-.S.p.r.a.c.h.e...G.b.a.y.a.-.S.p.r.a.c.h.e...W.e.i.s.s.r.u.s.s.i.s.c.h...A.c.h.o.l.i.-.S.p.r.a.c.h.e...P.a.n.g.w.e.-.S.p.r.a.c.h.e...U.S. .M.a.s.s.-.S.y.s.t.e.m...K.i.m.b.u.n.d.u.-.S.p.r.a.c.h.e...N.a.d.s.c.h.d.-.A.r.a.b.i.s.c.h...b.r.i.t.i.s.c.h.e.s. .M.a.s.s.-.S.y.s.t.e.m...G.r.o.s.s.b.u.c.h.s.t.a.b.e.n. .z.u.e.r.s.t. .a.u.f.f...h.r.e.n...N.a.c.h. .G.r.o.s.s.-./.K.l.e.i.n.s.c.h.r.e.i.b.u.n.g. .s.o.r.t.i.e.r.e.n...O.h.n.e. .G.r.o.s.s.-./.K.l.e.i.n.s.c.h.r.e.i.b.u.n.g. .s.o.r.t.i.e.r.e.n...+.S.o.r.t.i.e.r.u.n.g. .n.a.c.h. .G.r.o.s.s.-. .b.z.w... .K.l.e.i.n.b.u.c.h.s.t.a.b.e.n...+.S.o.r.t.i.e.r.u.n.g. .n.a.c.h. .G.r.o.s.s.-. .o.d.e.r. .K.l.e.i.n.s.c.h.r.e.i.b.u.n.g.....+.8...$.Q.........;.....h......._.{.R...v..Q.....C......'.`.5.~......x.....5.n......[.d...o.....+.8...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):5776
      Entropy (8bit):5.016333921215043
      Encrypted:false
      SSDEEP:96:76VmdMnKrYWXKF5sVDYyq2rhSOVKfK3cZMA8IYN6TBQHz/OY5zjBBeYAi97h+Hcf:7GJaY90VD9q2rhDV41PZYN6MC+zlBVKW
      MD5:EDBC2B2E97F3F8F678D8048E4739462C
      SHA1:C8F5202885946E2422F02A477B737D705CD7B040
      SHA-256:D23BB1500C3530C4836EFEFA07D92890B7474DAF81995C6F3DDC85D5EA696DEC
      SHA-512:A126BB9B1960853923F19B7B9DD782F044872C4B2DC72858FA2A019A943C012EF1AB9DF4A53A03B062A54CD91179820023C158A94B86432E6CDE2D7BF4A0C88C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ...........................R..s..a.r.a.b.s.k.i...t.h.a.i.s.k.i.....e.a...i.n.a...R...c.:. .{.0.}...a.r.m.e.D.s.k.i...b.u.r.m.a.s.k.i...f.i.n.a...i.n.a...j.a.p.a.D.s.k.i...l.a.o.a...i.n.a...l.a.p.a...i.n.a...m.a.n.a...i.n.a...p.j.e.n.j.e.z.e...p.o.w.a.y.k.n.e...p.r.u.s...i.n.a...p...l.a...i.n.a...t.i.b.e.t.s.k.i...B.a.t.y.D.s.k.i...a.o.n.a...i.n.a...b.u.g.i.a...i.n.a...e.t.i.o.p.i.s.k.i...g.e.o.r.g.i.s.k.i...g.o.t.i.a...i.n.a...g.r.i.c.h.i.s.k.i...k.y.r.i.l.i.s.k.i...s.a.m.o.a...i.n.a...s.i.n.d.a...i.n.a...a.o.t.i.a...i.n.a...a.r.m.e.D.a...i.n.a...b.z.e.z. .p.i.s.m.a...f.e.r.e.j.a...i.n.a...f.i.d.~.i.a...i.n.a...j.a.p.a.D.a...i.n.a...j.o.r.u.b.a...i.n.a...l.a.k.o.t.a...i.n.a...m.a.l.g.a.a...i.n.a...m.a.o.r.i.a...i.n.a...o.r.o.j.i.a...i.n.a...t.e.l.u.g.a...i.n.a...u.s.b.e.k.a...i.n.a...B.a.t.y.D.a...i.n.a...s.u.n.d.a.n.a...i.n.a...a.b.c.h.a.z.a...i.n.a...a.r.a.w.k.a.a...i.n.a...b.u.l.g.a.r.a...i.n.a...g.a.g.a.u.z.a...i.n.a...g.r.i.c.h.i.a...i.n.a...h.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):656
      Entropy (8bit):4.721322213254431
      Encrypted:false
      SSDEEP:12:dAp2uowhcPSHW4lzdN2uOc2yoEJvKxKGYJyome:dAYbw6PezdNd23FK5YK
      MD5:CF81F872603C70192464E0687D3B6428
      SHA1:E57A62000883E7A9A623522CD7F5095260B22EB9
      SHA-256:187B09E4A332C22D26CD1677ACEFE79700E1442B5B419B87D47CAFDFA3F19361
      SHA-512:2AAE3E71F785B6F0BE8CFAC0D1BCEA23675F114A26FE504B139A6CF52D81EE694D741D25DE6F707AC913C2AD666C366C239E0BBDC8E01C0B4E94428C36961E99
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .,h.............-.....,h....R..s..K.).e.m.b.u...K.).r.e.n.o...K.).r.u.s.i...K.).c.h.e.k.i...K.).c.h.i.n.a...K.).h.i.n.d.)...K.).s.w.i.d.i...K.).a.m.h.a.r.i...K.).a.n.j.e.m.i...K.).n.g.r.i.k.i...K.).t.h.u.n.g.u...K.).t.u.r.u.k.i...K.).f.a.r.a.n.s.a...K.).h.o.l.a.n.z.i...K.).h.u.n.g.a.r.i...K.).n.j.a.p.a.n.i...K.).u.k.r.a.n.i.a...K.).h.i.s.p.a.n.i.a...K.).t.a.i.l.a.n.d.i...K.).m.b.e.l.a.r.u.s.i...K.).n.y.a.r.w.a.n.d.a...-.@...[.......*.7._.B.X.o.....@.....'.........D.Y.......0.[.........A.M.............H.F.......bhM..h.Q.%Bh.h-hth}h.hkh.h..Rh.h.e...J.h...R..Y;. 6&.h.1e94hc;;h.h.#Zh...h.h.h..+h."Jh%.....V......P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1220892603744246
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMvs9lN/FiipU:SvvXpU
      MD5:68AE567D0C236DA786E332A837C30299
      SHA1:DFEDA196EF4CD20BBF63CC94D213AD031BAB3DCB
      SHA-256:B008DDD5D12FB7008AC7F0C345E57100EF0A0B69F6F92CB34496C34386F71B7F
      SHA-512:60E949B0AB3E6AC8209473F4C19BF87EBA3216F1DE345F93E88CBAEAF68BF6FE7CE4F2DDE4EAB9966E1DA237F644E116AB5F5DC107D846D3FC7D3971FE380734
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s....j.V.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):344
      Entropy (8bit):4.191938007824991
      Encrypted:false
      SSDEEP:6:Sv2Rj0AKlS8Qlrul1qalpKlFsKUZcAN5UidrKSMFtPqhUAftafyn:HR1KlTQpuJlKs0ADCFtPqhV0fyn
      MD5:712C8C9FFF630E4093112B40EBFBFA92
      SHA1:2A060C611710276A50EC408CE805D4E12C0354DB
      SHA-256:125D5D68E49CB23C5850941D47FEEAF6474F5422F1C07DBA9CDA16DD77CCD4B9
      SHA-512:9DAA215309924F0E987E04E7DDCE842BCBBB54D633C6CC4D697A6A2E59FA1E2BF9E44ACC300BB44A6266D1BA19D080367B6FFD62474A64CE9166790DE512806D
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................G.. ........N...N...........C...R..s..T.u.v.a.l.u.a.n...M.a.u.r.i.t.i.a.n...T.o. .F.u.l.l. .W.i.d.t.h...T.o. .H.a.l.f. .W.i.d.t.h...T.o. .L.o.w.e.r. .C.a.s.e...T.o. .T.i.t.l.e. .C.a.s.e...T.o. .U.p.p.e.r. .C.a.s.e......... .)....*)..........b.......r...x...................c..Ph..P..j.....V......`Z..PC.. #0.`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1220892603744246
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMvs9lN/FiipU:SvvXpU
      MD5:68AE567D0C236DA786E332A837C30299
      SHA1:DFEDA196EF4CD20BBF63CC94D213AD031BAB3DCB
      SHA-256:B008DDD5D12FB7008AC7F0C345E57100EF0A0B69F6F92CB34496C34386F71B7F
      SHA-512:60E949B0AB3E6AC8209473F4C19BF87EBA3216F1DE345F93E88CBAEAF68BF6FE7CE4F2DDE4EAB9966E1DA237F644E116AB5F5DC107D846D3FC7D3971FE380734
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s....j.V.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1626531665973814
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMvs9lN/FiHreL:SvvTL
      MD5:A64132E6E36D6935BF54BFB465CF7638
      SHA1:53D1256A4DF87E42B8F2936D87EA3834F59ECB08
      SHA-256:00B9E8C95990EAB1D1DB82341778FD29E54063F122CA20E892F4BF7316C26FB3
      SHA-512:B623663283954C71B5638B30194DA393E9F1DFF0CF9D14E53F456BB7EF954BE2FC8DD5BEC33B7C67AA013DCF1FD176C66B3EB2A2A759359C3FC3EE714DC6EE06
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s....j.V.|...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1220892603744246
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMvs9lN/FiipU:SvvXpU
      MD5:68AE567D0C236DA786E332A837C30299
      SHA1:DFEDA196EF4CD20BBF63CC94D213AD031BAB3DCB
      SHA-256:B008DDD5D12FB7008AC7F0C345E57100EF0A0B69F6F92CB34496C34386F71B7F
      SHA-512:60E949B0AB3E6AC8209473F4C19BF87EBA3216F1DE345F93E88CBAEAF68BF6FE7CE4F2DDE4EAB9966E1DA237F644E116AB5F5DC107D846D3FC7D3971FE380734
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s....j.V.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1220892603744246
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMvs9lN/FiipU:SvvXpU
      MD5:68AE567D0C236DA786E332A837C30299
      SHA1:DFEDA196EF4CD20BBF63CC94D213AD031BAB3DCB
      SHA-256:B008DDD5D12FB7008AC7F0C345E57100EF0A0B69F6F92CB34496C34386F71B7F
      SHA-512:60E949B0AB3E6AC8209473F4C19BF87EBA3216F1DE345F93E88CBAEAF68BF6FE7CE4F2DDE4EAB9966E1DA237F644E116AB5F5DC107D846D3FC7D3971FE380734
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s....j.V.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1220892603744246
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMvs9lN/FiipU:SvvXpU
      MD5:68AE567D0C236DA786E332A837C30299
      SHA1:DFEDA196EF4CD20BBF63CC94D213AD031BAB3DCB
      SHA-256:B008DDD5D12FB7008AC7F0C345E57100EF0A0B69F6F92CB34496C34386F71B7F
      SHA-512:60E949B0AB3E6AC8209473F4C19BF87EBA3216F1DE345F93E88CBAEAF68BF6FE7CE4F2DDE4EAB9966E1DA237F644E116AB5F5DC107D846D3FC7D3971FE380734
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s....j.V.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.122089260374425
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMSlnlplljiipGVn:SvJlzpGV
      MD5:C62D4F1855B9133E54519F7322687081
      SHA1:E7C422A92CAEA78634BC95E88ABB76FDE5EF14C7
      SHA-256:E777249A4B349B6BFB99E51CBD9A17EF3B904DA98B289A1148083827D1AD3D5A
      SHA-512:6D08FE1B695CD1336DD18B270B67B2A18C50FC777DA89AA72C4E02976FF716CFAC7A2C854354A9576568367E57B132BCA7DAE1CD067E85A57434C5FFA701FA8B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.$0...................$0....R..s....j.V...#0
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1220892603744246
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMvs9lN/FiipU:SvvXpU
      MD5:68AE567D0C236DA786E332A837C30299
      SHA1:DFEDA196EF4CD20BBF63CC94D213AD031BAB3DCB
      SHA-256:B008DDD5D12FB7008AC7F0C345E57100EF0A0B69F6F92CB34496C34386F71B7F
      SHA-512:60E949B0AB3E6AC8209473F4C19BF87EBA3216F1DE345F93E88CBAEAF68BF6FE7CE4F2DDE4EAB9966E1DA237F644E116AB5F5DC107D846D3FC7D3971FE380734
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s....j.V.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1220892603744246
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMvs9lN/FiipU:SvvXpU
      MD5:68AE567D0C236DA786E332A837C30299
      SHA1:DFEDA196EF4CD20BBF63CC94D213AD031BAB3DCB
      SHA-256:B008DDD5D12FB7008AC7F0C345E57100EF0A0B69F6F92CB34496C34386F71B7F
      SHA-512:60E949B0AB3E6AC8209473F4C19BF87EBA3216F1DE345F93E88CBAEAF68BF6FE7CE4F2DDE4EAB9966E1DA237F644E116AB5F5DC107D846D3FC7D3971FE380734
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s....j.V.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1220892603744246
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMvs9lN/FiipU:SvvXpU
      MD5:68AE567D0C236DA786E332A837C30299
      SHA1:DFEDA196EF4CD20BBF63CC94D213AD031BAB3DCB
      SHA-256:B008DDD5D12FB7008AC7F0C345E57100EF0A0B69F6F92CB34496C34386F71B7F
      SHA-512:60E949B0AB3E6AC8209473F4C19BF87EBA3216F1DE345F93E88CBAEAF68BF6FE7CE4F2DDE4EAB9966E1DA237F644E116AB5F5DC107D846D3FC7D3971FE380734
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s....j.V.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1220892603744246
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMvs9lN/FiipU:SvvXpU
      MD5:68AE567D0C236DA786E332A837C30299
      SHA1:DFEDA196EF4CD20BBF63CC94D213AD031BAB3DCB
      SHA-256:B008DDD5D12FB7008AC7F0C345E57100EF0A0B69F6F92CB34496C34386F71B7F
      SHA-512:60E949B0AB3E6AC8209473F4C19BF87EBA3216F1DE345F93E88CBAEAF68BF6FE7CE4F2DDE4EAB9966E1DA237F644E116AB5F5DC107D846D3FC7D3971FE380734
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s....j.V.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1220892603744246
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMunl5jiipS:Svv7pS
      MD5:8CCD09FD382B155E658CB8E38A69D50D
      SHA1:BEB2F210E55B9B72116CB9CA3B5A654E7BBF3066
      SHA-256:673B9967E9BAB1BAB7BD65E184EEB02EB5E8DC38F33F0970E683B9445C967CC7
      SHA-512:26D1444AC0D0DC7BD1A5E5081BDCE4831FB7768D6C93747E6BAE049D88136A95D13644763AAA86E4DEA7CFC40A6D2EF80506A984E650DEBC3C036822D881282A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s....j.V.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):96
      Entropy (8bit):3.4276942711037677
      Encrypted:false
      SSDEEP:3:XCbVSm/tluF52lFvlullUl/Ea2KLFEMPFn:Sv6olulGl/dx39n
      MD5:29DA2B969A3B0DAAE6D2A48DAC054B11
      SHA1:53678CE43622FF0127B74A4ECE3A3A2AA55D1FAE
      SHA-256:391E2AE69142FC9833DD66DCE35878EDB160A599ABAB90AF3B44AE4F76103831
      SHA-512:C9DAFE0F301433C1DC03C063606A2F7787CCEC61DD42423630FC4EB54C3E5D5A24F5C007DB70C6AE33E9A824AA0DBD5C78C5CC39715FA075695168C43D9939E3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .$0...................$0....R..s......g...j...V....`...P#0.`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1220892603744246
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMunl5jiipS:Svv7pS
      MD5:8CCD09FD382B155E658CB8E38A69D50D
      SHA1:BEB2F210E55B9B72116CB9CA3B5A654E7BBF3066
      SHA-256:673B9967E9BAB1BAB7BD65E184EEB02EB5E8DC38F33F0970E683B9445C967CC7
      SHA-512:26D1444AC0D0DC7BD1A5E5081BDCE4831FB7768D6C93747E6BAE049D88136A95D13644763AAA86E4DEA7CFC40A6D2EF80506A984E650DEBC3C036822D881282A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s....j.V.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1220892603744246
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMunl5jiipS:Svv7pS
      MD5:8CCD09FD382B155E658CB8E38A69D50D
      SHA1:BEB2F210E55B9B72116CB9CA3B5A654E7BBF3066
      SHA-256:673B9967E9BAB1BAB7BD65E184EEB02EB5E8DC38F33F0970E683B9445C967CC7
      SHA-512:26D1444AC0D0DC7BD1A5E5081BDCE4831FB7768D6C93747E6BAE049D88136A95D13644763AAA86E4DEA7CFC40A6D2EF80506A984E650DEBC3C036822D881282A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s....j.V.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):88
      Entropy (8bit):2.669445111603312
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlKelBjlgljl/Fipp/n:SBtkJTl4q/
      MD5:4EB66956A148CB004F63FA8031FFE6EE
      SHA1:2D9A7D385489C3479F04F43313E56873218AA174
      SHA-256:F79055B8606BC0A3CE2F413EA242849AABDB1EE2B7232C37C61F9EE2EFBF2D1F
      SHA-512:18AD6A6B83DD9F507BA3981E4C74C15F964B1CB10869BB51AFD89321C818CC2AB6352B61A767C83CB2D23AB276E3A8637E6F9A430255B67BD9B83D7CD2F6505F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s..e.n._.Z.W.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1220892603744246
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMunl5jiipS:Svv7pS
      MD5:8CCD09FD382B155E658CB8E38A69D50D
      SHA1:BEB2F210E55B9B72116CB9CA3B5A654E7BBF3066
      SHA-256:673B9967E9BAB1BAB7BD65E184EEB02EB5E8DC38F33F0970E683B9445C967CC7
      SHA-512:26D1444AC0D0DC7BD1A5E5081BDCE4831FB7768D6C93747E6BAE049D88136A95D13644763AAA86E4DEA7CFC40A6D2EF80506A984E650DEBC3C036822D881282A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s....j.V.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1220892603744246
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMunl5jiipS:Svv7pS
      MD5:8CCD09FD382B155E658CB8E38A69D50D
      SHA1:BEB2F210E55B9B72116CB9CA3B5A654E7BBF3066
      SHA-256:673B9967E9BAB1BAB7BD65E184EEB02EB5E8DC38F33F0970E683B9445C967CC7
      SHA-512:26D1444AC0D0DC7BD1A5E5081BDCE4831FB7768D6C93747E6BAE049D88136A95D13644763AAA86E4DEA7CFC40A6D2EF80506A984E650DEBC3C036822D881282A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s....j.V.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1626531665973814
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMunl5jiHrUL:SvvtL
      MD5:5FAB5876AF089CE3960AC8BF4CB51AAE
      SHA1:56C1B74B88F869696057C30CB38F2BB0B6A963FB
      SHA-256:968FDFFF72C8DD5A2C26F14DC6287839DCC1AA401AA16205ACC50C4A0B2F4AEA
      SHA-512:35287FCB5DD420CFE9F520AF55C36C00AB20B0FD4AD48BB50CAC19917F9E87ED77AF4585BDB2105495F06147DBBFB85BF5C5FB44326488130B13C936D9B822FC
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s....j.V.|...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1220892603744246
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMunl5jiipS:Svv7pS
      MD5:8CCD09FD382B155E658CB8E38A69D50D
      SHA1:BEB2F210E55B9B72116CB9CA3B5A654E7BBF3066
      SHA-256:673B9967E9BAB1BAB7BD65E184EEB02EB5E8DC38F33F0970E683B9445C967CC7
      SHA-512:26D1444AC0D0DC7BD1A5E5081BDCE4831FB7768D6C93747E6BAE049D88136A95D13644763AAA86E4DEA7CFC40A6D2EF80506A984E650DEBC3C036822D881282A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s....j.V.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1220892603744246
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMunl5jiipS:Svv7pS
      MD5:8CCD09FD382B155E658CB8E38A69D50D
      SHA1:BEB2F210E55B9B72116CB9CA3B5A654E7BBF3066
      SHA-256:673B9967E9BAB1BAB7BD65E184EEB02EB5E8DC38F33F0970E683B9445C967CC7
      SHA-512:26D1444AC0D0DC7BD1A5E5081BDCE4831FB7768D6C93747E6BAE049D88136A95D13644763AAA86E4DEA7CFC40A6D2EF80506A984E650DEBC3C036822D881282A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s....j.V.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1220892603744246
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMunl5jiipS:Svv7pS
      MD5:8CCD09FD382B155E658CB8E38A69D50D
      SHA1:BEB2F210E55B9B72116CB9CA3B5A654E7BBF3066
      SHA-256:673B9967E9BAB1BAB7BD65E184EEB02EB5E8DC38F33F0970E683B9445C967CC7
      SHA-512:26D1444AC0D0DC7BD1A5E5081BDCE4831FB7768D6C93747E6BAE049D88136A95D13644763AAA86E4DEA7CFC40A6D2EF80506A984E650DEBC3C036822D881282A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s....j.V.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):12784
      Entropy (8bit):4.96045176959317
      Encrypted:false
      SSDEEP:384:fTMM72/mH35LgEa+RnlzW38om5XUStWVrTTz9OzhA:fTMw2/mH350Ea+BlzW38p5kV/TxO1A
      MD5:8EEC3EF01342E4CD74486C78BE02FCB4
      SHA1:C15BCD17EDD1FC382B47F22D87CDD1240F2D12C0
      SHA-256:5F608694E055285782BB6A0DCEF6658C3C6986848B7736D377ED5E16A37EE8BE
      SHA-512:BED460BB30C594A24E3AC0C98C26481B4656CCE978DCF2051E3EB6FBE079C80E0FE9944C532FF8225A3468D0BA221C01A2C457B54470B141FBCD8DFD005DE8DA
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................`.. ........t...t...........7...R..s..e.w.....m.a.r.....r.a...z...z.u...i...c.o.p.t.o...b.a.m...n...c.a.r.i.o...f.i.n...s...l.i.c.i.o...l.i.d.i.o...m.a.s...i...p.a.s.t.....u.y.g.u.r...w...l.o.f...y.a.p...s...y.i.d.i.s...g...t.i.c.o...a.d.i.g.u.....a.r.a.m.e.o...a.s.a.m...s...b.a.s.k.i.r...b.o.s.n.i.o...c.a.b.i.l.a...e.m.o.j.i.s...k.a.z.a.j.o...m.a.l.a.y.o...m.a.n.c.h.....m.a.n.d.e.o...m.a.r.a.t.....p.a.s.t...n...r...n.i.c.o...s.e.r.b.i.o...t.a.y.i.k.o...t.r.u.k...s...u.z.b.e.k.o...v...t.i.c.o...f.e.n.i.c.i.o...j.a.v.a.n...s...a.b.j.a.s.i.o...b.u.r.i.a.t.o...c.a.r.e.l.i.o...c.a.s.u.b.i.o...c.h.e.y.e.n.e...e.s.t.o.n.i.o...f.i.y.i.a.n.o...g.a.g.a.u.z.o...g.a.l.l.e.g.o...k.i.r.g.u...s...k.o.n.k.a.n.....k.o.t.a.n...s...k.u.t.c.h.i.n...m.a.c.a.s.a.r...n.o.r.u.e.g.o...n...m.e.r.o.s...o.l. .c.i.k.i...o.s...t.i.c.o...p.a.n.y.a.b.....s.o.n.i.n.k.....s.u.m.e.r.i.o...t.i.g.r.i...a...w.o.l.a.y.t.a...s.u.n.d.a.n...s...a.v...s.t.i.c.o...a.r.r.u.m.a.n.o...a.r.a.h.u.a.c.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):148
      Entropy (8bit):4.703899311765253
      Encrypted:false
      SSDEEP:3:XCbVSm/tlzcoZWtFiAkVAobkP1LbzMzHeonwyWn8V2ZGlej:Sv4oUpOw9LbIbnwzn87Mj
      MD5:7694951EF25993C308C192CB7F702A4D
      SHA1:65C2B02876FB4C07EF7639D251C32E3752CFE22A
      SHA-256:ABBDCFF69A749E45C85EB908F6228F7A2AA7626CA79A8BB34193C6C56099A41D
      SHA-512:7DE1EEDC81EA2FBD7609014F999BE352059DCCEBC7F14637D84F7B3E51CACD7CD17F2BB9D43D074078951C69911BC7EC8591D2330C02C73922A695763D356FD1
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................R..s..........{...z.L.[.....*.....}......F....X..........""......j...V....`...P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1220892603744246
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMunl5jixpUL:SvvtL
      MD5:D1ED7E86954B36EC7A46716615E51424
      SHA1:C24BB9669785D7CEC7C6957AE7701AF0171AE313
      SHA-256:A45E28E4DB331EE08EB719CDEE2870608B96B0DF6E7B650E71AC6ACB24C18624
      SHA-512:E341F2A7B63D4D031D6E2172653D1E36183EFE71D07EBFCC7124C82358ED3EB93EC46ED926E9FDC0B4F30EAE2027D46B614717CB5FB2F9C596D801C74267F9F0
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s....j.V.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1220892603744246
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMunl5jixpUL:SvvtL
      MD5:D1ED7E86954B36EC7A46716615E51424
      SHA1:C24BB9669785D7CEC7C6957AE7701AF0171AE313
      SHA-256:A45E28E4DB331EE08EB719CDEE2870608B96B0DF6E7B650E71AC6ACB24C18624
      SHA-512:E341F2A7B63D4D031D6E2172653D1E36183EFE71D07EBFCC7124C82358ED3EB93EC46ED926E9FDC0B4F30EAE2027D46B614717CB5FB2F9C596D801C74267F9F0
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s....j.V.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):148
      Entropy (8bit):4.703899311765253
      Encrypted:false
      SSDEEP:3:XCbVSm/tlzcoZWtFiAkVAobkP1LbzMzHeonwyWn8V2ZGlej:Sv4oUpOw9LbIbnwzn87Mj
      MD5:7694951EF25993C308C192CB7F702A4D
      SHA1:65C2B02876FB4C07EF7639D251C32E3752CFE22A
      SHA-256:ABBDCFF69A749E45C85EB908F6228F7A2AA7626CA79A8BB34193C6C56099A41D
      SHA-512:7DE1EEDC81EA2FBD7609014F999BE352059DCCEBC7F14637D84F7B3E51CACD7CD17F2BB9D43D074078951C69911BC7EC8591D2330C02C73922A695763D356FD1
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................R..s..........{...z.L.[.....*.....}......F....X..........""......j...V....`...P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2088
      Entropy (8bit):4.4986931512988715
      Encrypted:false
      SSDEEP:48:RhNuXl9NAZBn5nAn/5eDmGByASWuzJ5pJcpCIljyhG5sxnAHRi:nNuOB5AnReDsfJz3pJcpC7+sxnAHRi
      MD5:38480487B5ACE73D51789FFF9CC976AE
      SHA1:296C2A93C488F99EAC7B30D4530C2661558EE9AC
      SHA-256:0AB812DC6025384446FBA77C7C2B5AD161A223A595157DFBCD4C804112B1CC9D
      SHA-512:A0BAC51BB0E132485DF5C0091DA2ACA19EFC9B99F322D8C84E66DB282316FEADEA59F2C8EE6068141D725A3F9B7033B6240D997FE5B37E4515C8C3A7401C0193
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................,...........R..s..p.c.m...O.r.d.e.n...M.o.n.e.d.a...c.u.m.u.c.o...t.e.l.e.g.u...b.h.o.s.h.p.u.r.i...i.n.g.u.s.e.t.i.o...h.i.l.i.g.a.i.n...n...A.n.c.h.o. .m.e.d.i.o...k.e.j.i.a. .(.C.h.i.n.a.)...A.n.c.h.o. .c.o.m.p.l.e.t.o...D...g.i.t.o.s. .e.n. .l.a.o...O.r.d.e.n. .e.s.t...n.d.a.r...i.n.g.l...s. .(.R... .U...)...m.i.n. .n.a.n. .(.C.h.i.n.o.)...D...g.i.t.o.s. .e.n. .t.a.m.i.l...N...m.e.r.o.s. .e.n. .t.a.m.i.l...a.l.e.m...n. .a.u.s.t.r.i.a.c.o...k.a.r.a.c.h...i. .b...l.k.a.r.o...D...g.i.t.o.s. .e.n. .t.e.l.u.g.....N...m.e.r.o.s. .e.n. .e.t...o.p.e...N...m.e.r.o.s. .e.n. .g.r.i.e.g.o...N...m.e.r.o.s. .e.n. .h.e.b.r.e.o...O.r.d.e.n. .t.r.a.d.i.c.i.o.n.a.l...c.a.l.e.n.d.a.r.i.o. .m.i.n.g.u.o...D...g.i.t.o.s. .e.n. .g.u.r.m.u.j.i...D...g.i.t.o.s. .e.n. .m.a.l.a.b.a.r...N...m.e.r.o.s. .e.n. .a.r.m.e.n.i.o...D...g.i.t.o.s. .e.n. .t.i.b.e.t.a.n.o...N...m.e.r.o.s. .e.n. .g.e.o.r.g.i.a.n.o...D...g.i.t.o.s. .e.n. .a.r...b.i.g.o.-...n.d.i.c.o...N.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):148
      Entropy (8bit):4.703899311765253
      Encrypted:false
      SSDEEP:3:XCbVSm/tlzcoZWtFiAkVAobkP1LbzMzHeonwyWn8V2ZGlej:Sv4oUpOw9LbIbnwzn87Mj
      MD5:7694951EF25993C308C192CB7F702A4D
      SHA1:65C2B02876FB4C07EF7639D251C32E3752CFE22A
      SHA-256:ABBDCFF69A749E45C85EB908F6228F7A2AA7626CA79A8BB34193C6C56099A41D
      SHA-512:7DE1EEDC81EA2FBD7609014F999BE352059DCCEBC7F14637D84F7B3E51CACD7CD17F2BB9D43D074078951C69911BC7EC8591D2330C02C73922A695763D356FD1
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................R..s..........{...z.L.[.....*.....}......F....X..........""......j...V....`...P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):120
      Entropy (8bit):4.1134542664636
      Encrypted:false
      SSDEEP:3:XCbVSm/tlEFQClp/pll4ll7l/F0cCkcLr41mlP3yzGlej:Sv8QxlL9NC5f4slPRMj
      MD5:333196AABE6F149A5546009212E23480
      SHA1:36D233968097B9679813AFA6029362BED4AE5232
      SHA-256:53DF05E03D09494FEE29761CE28447301C3B4E4CE6F28984C18597701B0AFE52
      SHA-512:EF4B0CA74B266AA1E46F12512C541992E4BC81AAA88668D64CD920476B32F09698528124CC5542108D850192F215A755B7F67106AF56D7498DCC25316CA95CDF
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................R..s............L..........F..........j...V....`...P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):1060
      Entropy (8bit):4.061663404947274
      Encrypted:false
      SSDEEP:24:qc5mwfDosY/GLtisrVoHDGYNeaD4nTYt+BRMDRe/oJ/uYfeauSM/au3OWtx/F:qcIwfDosfLtisrVojGYXD4nst+BRMDR6
      MD5:9443566DF6F069DFF49C8E9BE7BFE4DE
      SHA1:BADCD62B68F586E80E34BBA12A6C83FBF7ACC041
      SHA-256:F90667CCFEC1F72AD6DC4EADF2F30D9B4E96DDAA452FEA8F1B1C4CDB24B86505
      SHA-512:8CC49E25129FDFD14E2223A395406692F97389A8DC304968A24C2A521253BCE7BF06F65D811BD6D51F0B1D0FC9266563837331572F99A864065FCE8081B60464
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................-...........R..s..R.i.i.s...T.a.a.y...A.k.a.a.n...G.e.r.k.e...A.m.a.r.i.k...H.i.n.n.d.i...P.u.l.a.a.r...C.e.k.k.e.r.e...E.s.p.a...o.l...K.e.m.e.e.r.e...K.o.r.e.e.r.e...S.o.m.a.l.i.i...B.u.r.m.e.e.s.e...D.a.c.c.e.e.r.e...D.o.c.c.e.e.r.e...I.g.i.b.o.o.r.e...P.e.r.s.e.e.r.e...T.u.r.k.e.e.r.e...Y.o.r.r.u.b.a.a...A.a.r.a.b.e.e.r.e...B.e.l.a.r.u.u.s.e...E.n.g.e.l.e.e.r.e...M.a.l.a.y.e.e.r.e...P.o.l.o.n.e.e.r.e...R.o.m.a.n.e.e.r.e...S.a.p.o.n.e.e.r.e...S.a.w.a.n.e.e.r.e...S.i.n.u.w.a.a.r.e...S.w.e.e.d.e.e.r.e...B.u.l.g.a.r.i.i.r.e...F.a.r.a.y.s.e.e.r.e...H.o.n.g.a.r.i.i.r.e...I.t.a.l.i.y.e.e.r.e...N.e.p.a.a.l.e.e.r.e...P.u.n.j.a.b.e.e.r.e...P.u.r.t.u.g.e.e.r.e...S.u.l.u.K.k.o.o.r.e...U.k.e.r.e.n.e.e.r.e...E.n.d.o.n.e.s.i.i.r.e...H.a.w.s.a.K.k.o.o.r.e...R.u.w.a.a.n.n.d.e.e.r.e...W.i.y.e.t.n.a.m.e.e.r.e...-.@...[.......*.7.B.X.o.......@.....'.........D.Y.......0.[.........A.M.............H.F........&.0.......:................b.l.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.905547915629603
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDklU8gl8l/EnlyMmllY3:SBtkJYlU8g8l/0Enl2
      MD5:14836CAA5D41214A638652DF6DECC415
      SHA1:E67611755B621579CE52F7AE85B3B24F7FF9E345
      SHA-256:32E71BDB4306BFDC5A464475A9B7AD9E6371B6E97B6AEB4E68957277356B6EE2
      SHA-512:E14264E16FB6DEAE22ADB09A4E9B1542B8355EABD4AF4181348B7BC3DF343F342E74D0AF7D8685866CFC568F45D9D91FBEEBE683FB7B8B3C3C7616749FF1AE42
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s..f.f._.L.a.t.n._.C.M...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.411243631352237
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/E9:SBtkJ1li6gml/o
      MD5:A0E7F0023EFE9D9DA802A0C5A941F8CE
      SHA1:E4522C97B99704605469449C21AEEF8E03A0AD3E
      SHA-256:756032017E2D9DEB9EC1508DAFB605009EADF6D859FF309BBCD6E49BB2D8D9F2
      SHA-512:2B06564FB675F51D96E9945A303D9AADAEABB8173222AC644AC3415D5AC1AEC958D70F651A5C85561CDD79E0F4B713D43117332A8536A251F4FB48800076AB01
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s....s...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.411243631352237
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/E9:SBtkJ1li6gml/o
      MD5:A0E7F0023EFE9D9DA802A0C5A941F8CE
      SHA1:E4522C97B99704605469449C21AEEF8E03A0AD3E
      SHA-256:756032017E2D9DEB9EC1508DAFB605009EADF6D859FF309BBCD6E49BB2D8D9F2
      SHA-512:2B06564FB675F51D96E9945A303D9AADAEABB8173222AC644AC3415D5AC1AEC958D70F651A5C85561CDD79E0F4B713D43117332A8536A251F4FB48800076AB01
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s....s...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):14776
      Entropy (8bit):4.840756604653443
      Encrypted:false
      SSDEEP:384:hJNBzw2ACimx6yZC+K+9giVGNXNIlHR4y0Md:hpw2Axc8+D9giVGlqlxr0Md
      MD5:F5F4D042FDC414E3183D7399D30DCC21
      SHA1:6F76082CB6843BB118F6156D4BA36520FBAB740E
      SHA-256:3D03654780FA44F252203D81F6408453ECF5878B8BF9DDEC3FD55E1F12F7180C
      SHA-512:5421635DAA2AD03336B2FACEF1AC8D0BBD635B6B21C6A2A2E97E66139F496BF3895E4749493A666EB7FC67A44CBCDD9F4788A9A4947B9EA127C837D164D6CABA
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................S.. ........f...f...........@...R..s..T.h.a.i.s...E.r.z.j.a...F.i.n.s.k...G.r.y.k.s...I.e.r.s.k...K.a.d.d.o...M.a.n.k.s...W.a.a.l.s...W.e.l.s.k...B.a.m.o.u.n...J.a.p.a.n.s...D.e.e.n.s.k...D.e.f.a.k.a...F.i.j.y.s.k...K.a.r.y.s.k...L.y.c.y.s.k...L.y.d.y.s.k...M.e.i.t.e.i...N.d.y.u.k.a...N.g.u.m.b.a...P.o.a.l.s.k...S.c.h.o.t.s...S.i.f.e.r.s...S.o.e.s.o.e...S.o.r.a.n.....V.o.t.y.s.k...Y.a.p.e.e.s...Y.s.l...n.s...Z.w.e.e.d.s...G.o.t.h.y.s.k...K.o.p.t.y.s.k...A.l.d.y.r.s.k...A.t.j.e.e.s.k...A.v.a.r.y.s.k...B.a.s.k.y.s.k...B.i.r.m.e.e.s...B.o.s.n.y.s.k...I.n.g.o.e.s.j...J.a.k.o.e.t.s...J.i.d.d.y.s.k...K.a.z.a.c.h.s...K.o.e.m.u.k.s...L.e.t.l...n.s...L.e.z.g.y.s.k...L.i.t.o.u.w.s...P.a.s.j.t.o.e...S.e.r.v.y.s.k...S.o.g.d.y.s.k...S.y.p.r.y.s.k...G.e.o.r.g.y.s.k...J.a.v.a.a.n.s.k...A.k.k.a.d.y.s.k...A.l.d.g.r.y.k.s...A.l.g.e.m.e.e.n...A.m.h.a.a.r.s.k...A.s.t.u.r.y.s.k...A.v.e.s.t.y.s.k...B.r.e.t.o.n.s.k...E.s.t.l...n.s.k...F.o.n.x.s.a.m.p...F.r.i.u.l.y.s.k...G.a.l.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):996
      Entropy (8bit):4.157413336009666
      Encrypted:false
      SSDEEP:24:CdIOe7CUb4RYTdelO1PKAIU8MFLnvRJSPS6Nc5/AFO5cTKO:CO7C6jdfPC3ULZMS6NYcTKO
      MD5:53FD129A992BD3F16612790C1D0DA1BC
      SHA1:AD5FB46561E82B58384C939A443869E471AF3476
      SHA-256:97B1AF616923A81BC5DA04B4F6D8EE4963D245001D9EFDDD2D5AACF4D5AD1C1F
      SHA-512:ED8BED7846D5CF756FC283EEB4F74D2BA3F4ACD0828FB37FB5270320582DF13204AF33C4B2CBDC41898EA37A4070FEECD808862E754329CBCB838ED51A71BFF6
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .1..............%.....1.....R..s..P...k.....P.+.k.+...W.a.l.e...K...m.o.a...K.M.l.e.a...L.k.k.i.a...H.e.b.e.r.a...H.e.l.e.n.e...K.e.p.a.n.+...L...k.i.n.a...P.a.l.a.n.i...P.u.k.i.k.+...K.u.e.k.e.n.e...P.a.n.i.o.l.o.....A.i.l.i.k.i.....A.l.a.p.i.a.....*.k...l.i.a...K.e.n.e.m.a.k.a...P.o.l.a.p.o.l.a...K.u.i.k.i.l.a.n.i...P.e.l.e.k...n.i.a...W.i.e.k.a.n.a.m.a...P...k... .K.u...u.n.a...P.a.l.a.n.i. .K.a.n.a.k.......L.l.e.l.o. .H.a.w.a.i...i...P.e.l.e.k...n.e. .K.a.n.a.k.....P.u.k.i.k.+. .P.a.l.a.k.i.l.a...P.e.l.e.k...n.e. .N.k. .H.M.l.a.n.i...P.e.l.e.k...n.i.a. .P.e.k.e.k...n.e...P.e.l.e.k...n.i.a. ...A.m.e.l.i.k.a...K.u.i.k.i.l.a.n.i. .K.e.l.e.m...n.i.a...P...k... .H.o...o.m.a...a.l.a.h.i. ...i.a...*..I.k.e. ...o.l.e. .. i.a. .a. .k.k.p.o.n.o. ...o.l.e. .p.a.h.a. .k.a. ...M.l.e.l.o...%.[.....7.B.X.....o.u.o.........@...o.......Y.....0.............(...H.........<...a.Z.......1.D...7.o.....W..S...a.G.h.g.*.v...M.A.}.0......2.k........V...|..Pg%.`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.411243631352237
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/E9:SBtkJ1li6gml/o
      MD5:A0E7F0023EFE9D9DA802A0C5A941F8CE
      SHA1:E4522C97B99704605469449C21AEEF8E03A0AD3E
      SHA-256:756032017E2D9DEB9EC1508DAFB605009EADF6D859FF309BBCD6E49BB2D8D9F2
      SHA-512:2B06564FB675F51D96E9945A303D9AADAEABB8173222AC644AC3415D5AC1AEC958D70F651A5C85561CDD79E0F4B713D43117332A8536A251F4FB48800076AB01
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s....s...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):15064
      Entropy (8bit):4.939742695791492
      Encrypted:false
      SSDEEP:384:xOTzT0uwmfbiJccuneogXhHOvVRLuBHVWFj9mju7q9RtyJ7zcWdd:x0wmziJccunLgXhHOWIj9mjum9zyXcW7
      MD5:26190B9EED710094BBBC1092E660A258
      SHA1:947AFD31057104A7B345F97F7B75B248D82F1A8F
      SHA-256:2F152BAF2D1D1FE0E2400A39DF9E62501EA89F8686428B7E6481E93D843E92BB
      SHA-512:FA1EF8360C77E869B626D10BBF1D1B7FE3565CA37E3CF5E3A8D545195DEC3D208DAB601F84FDD0BB0A30323E8301FAB249EF84E8DFA4DCC750BEC8F16C585D98
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................#.......r...R..s..L.a.z...A.r.a.m...A.v.a.r...E.l.a.m...E.s.t.i...F.u.l.a...K.a.d.o...K.r.e.e...A.n.g.k.a...D.a.n.s.k...E.r.y.z.a...G.o.t.i.k...H.i.t.i.t...K.a.r.i.a...K.a.r.i.b...K.o.s.r.e...K.u.r.d.i...K.u.r.u.k...L.y.c.i.a...L.y.d.i.a...N.i.u.e.a...N.u.s.h.u...R.u.n.i.k...S.k.a.u.s...S.u.o.m.i...V.o.t.i.a...W.a.r.a.i...A.v.e.s.t.a...S.u.r.i.a.h...A.b.k.h.a.z...A.d.y.g.e.i...B.I.S.K.A.Y...C.h.e.s.k.a...C.h.u.u.k.e...F.r.i.u.l.i...G.o.t.h.i.c...I.t.a.l.i.a...J.e.r.m.a.n...K.a.l.m.u.k...K.a.n.t.o.n...K.h.o.t.a.n...K.i.r.g.i.z...K.o.k.t.a.w...M.a.n.d.a.e...M.i.k.m.a.k...P.o.l.s.k.i...R.o.t.u.m.a...S.h.a.v.i.a...S.i.p.r.u.s...S.l.o.v.e.n...U.g.a.r.i.t...Y.a.p.o.i.s...B.a.v.a.r.i.a...B.e.l.a.n.d.a...F.u.n.i.s.i.a...G.a.l.i.s.i.a...G.i.l.b.e.r.t...I.n.g.g.r.i.s...K.a.b.a.r.d.i...K.a.r.e.l.i.a...K.o.m.o.r.i.a...K.o.r.n.i.s.h...K.o.r.s.i.k.a...L.e.z.g.h.i.a...L.i.g.u.r.i.a...L.i.t.u.a.v.i...M.i.r.a.n.d.a...M.o.n.o.t.o.n...N.g.a.m.b.a.i...O.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2308
      Entropy (8bit):4.540655170423697
      Encrypted:false
      SSDEEP:48:K2coGYZDwtcHbjgIRzolvUDAVrRZZegsadIvY3thJJ:yeDwtcoIR0l2AVr/hsayvY3b
      MD5:1DF44368DAF33829E4D77A7575EF4C44
      SHA1:13D5F88B90ACEB21C86426D260D8546E5A0B9A9E
      SHA-256:7E419E443A89C425435414A79A0C935E46A1EBC3A919F6CA7E4783ED4952CA65
      SHA-512:6002430A6165099A6193061B39D03D074122869261151E7FF7CC67B0D1886069EA7843BD5BC081823FED6819C7C60C4D47774F29616E8F9555639E1FA129F529
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................,.. ........9...9...<.......'...R..s..T.a.....A.w...s.a...D.....c.h...C.h.e.e.k.....M.a.g...y.a...M.a.l.e.y.i...M...a.n.m.a...P.e.s.h.a.n...T.a.m...l.....G.i.r.i.i.k.....R.u.m.e.n.i.a...R...w.a.n.d.a...A.m.a.r.i.i.k.....A.r.a.b.i.i.k.....P.o.l.i.i.s.h.i...T...k.i.i.s.h.i...U.k.u.r.e.e.n.....B.e.l.a.r.u.u.s.u...B...l...g.a.r...a...I.n.d.o.n.i.s.i.a...H.a.n. .I.z.u.g.b.e...A.s...s... .I.g.b.o...A.s...s...:. .{.0.}...E.d.e.g.h... .e.d.e...H.a.n. .d.i. .m.f.e...M.a.n.d.a.r.....n.....N.k.e. .d... .m.f.e...S...w.i.d.i.i.s.h.i...A.s...s... .B.e.k.e.e...A.s...s... .J.a.m.a.n...K.e.m.e.,. .E.t.i.t.i...U.s.o.r.o. .N.h.a.z.i...V.i.y.e.t...n.a.a.m.....A.s...s... .a.m.a.g.h.....B.e.k.e.e. .n.d... .U.K...B.e.k.e.e. .n.d... .U.S...A.s...s... .F...r.e.n.c.h...A.s...s... .I.t.a.l.i.a.n...A.s...s... .R.u.s.s.i.a.n...A.s...s... .S.p.a.n.i.s.h...M.p.a.g.h.a.r.a.:. .{.0.}...A.s...s... .J.a.p.a.n.e.s.e...K.a.l.e.n.d.a. .G.r.e.g.o.r.y...A.s...s... .P.o.r.t.u.g.u.e.s.e...B.e.k.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):516
      Entropy (8bit):5.328377616567796
      Encrypted:false
      SSDEEP:6:Svcmlbgsls1BvQGipUFdTEsPnF4H6cRbMH+ZeUFliuRnYfjnuMeTIkiS2YmAuskB:szsLFHwsdcpM+FCfdkB/WgwEm2TT04s
      MD5:EAA431A649076E666AAFE58DD444BA70
      SHA1:357FEA0085F36BBAED83487A2B1C15F62FD9E4B4
      SHA-256:E85CFA46931912CD60AFEC25CA10631F2522F86BCC7970304B3A1C72AA7D160F
      SHA-512:56982644B9AD874B613612D2DDDF9CC592CBDA75C26F3C1CA6DD6B50FDE0EB8BCF675A65BE7F6976D91044C3F887C52316D88F543D55F2D4613FE69EE3311305
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................q.. ........y...y...........o...R..s....Y......Y..... .Y......Y....*.Y...q..Y...q...F. .....{..M..... .q.........q.....m. .x.Y...t.....Y...../.O..Y.......(.q........O..Y...I... .G.....s.&..M.V... ._.M.(.x.Y......L.2.q.....I..... .q......./.L.2.q.........&....q......7.:. .{.0.}...G.Y.:. .{.0.}....q.:. .{.0.}.....7.X.o.....................................................e.......B........../././......./..................)/1/!/.........P........V......P...Po.. ...`...P
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):5192
      Entropy (8bit):5.071203043587727
      Encrypted:false
      SSDEEP:96:brZQAv2QboMPRPInxmWip65+Evj31f4j0hblubmWG4yW46g9cwe0XGVCz68I4FGH:brZQAFJPoxZyzEL1t4bZfb0XGVCOSsKs
      MD5:21972FF0C8DB621CDBEEA4D01034D910
      SHA1:451F76FC86B9B5C94A7D0E2314076F7766EE6CFD
      SHA-256:FE87D00FF0B9326542C0ED7B58F5B76E16CB09B0CDBC1E0D934DC4CD1E007B21
      SHA-512:AA1DE7C960F75B448BED68736554F8DBF00C2F4816A1D04F31694768FF13F9AA764886CEAFC844FF1FE93A50106EACA13DD62667DCFFFE3A378301FD956D5674
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .j....................j.....R..s..a.f...b.s...I.q.b.o...J.a.w.a...A.n.g.k.a...C.e.s.k.a...D.a.n.s.k...I.n.d.i.a...R.o.m.a.n...S.u.o.m.i...F.l.e.m.i.s...G.a.u.l.i.a...I.t.a.l.i.a...J...r.m.a.n...K.a.n.t.o.n...K.a.t.a.l.a...K.i.r.g.i.s...K.u.r.d.i.s...P.u.n.j.a.b...S.i.m.b.o.l...C.o.l.o.n.i.a...G.a.l.i.s.i.a...I.n.g.g.r.i.s...K.o.r.s.i.k.a...K.r.o.a.s.i.a...O.s.s.e.t.i.a...P.r.a.n.c.i.s...R.u.m.a.n.i.a...S.p.a.n.y.o.l...U.k.r.a.i.n.a...W.a.l.a.n.d.a...M.o.n.g.o.l.i.a...E.t.h.i.o.p.i.k...I.r.l.a.n.d.i.a...I.s.l.a.n.d.i.a...K.e.r.n.o.w.e.k...P.o.l.a.n.d.i.a...S.l.o.w.a.k.i.a...T.y.o.n.g.h.w.a...B.a.s.a.:. .{.0.}...T.a.n.g.g.a.l.a.n...D.i.g.i.t. .O.d.i.a...{.0.}. .t.u.n.y.u.k...D.a.e.r.a.h.:. .{.0.}...D.i.g.i.t. .L.a.t.i.n...H.a.n. .P.r.a.s.a.j.a...N.d.e.b.e.l.e. .L.o.r...O.r.a. .K.e.t.u.l.i.s...{.0.}. .. .k.a.b.e.h...I.n.g.g.r.i.s. .(.A.S.)...J.e.r.m.a.n. .S.w.i.s.s...K.u.r.d.i. .T.e.n.g.a.h...{.0.}. .. .l.i.y.a.n.e...D.i.g.i.t. .B.e.n.g.a.l.i...D.i.g.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):11996
      Entropy (8bit):4.971862421082815
      Encrypted:false
      SSDEEP:192:XayP0n6ghoVG8jcydLy8crskltPI7As63MBRIbMSGC5vdaX54RI+t6LXI8Pfhjh:Kyq6hR7SIMssMOGwaSy+t6LXJP9h
      MD5:EA8690FD132C4B09D1CC060E326D34EC
      SHA1:1305877BA04C2D96887F8D912853E0BE160428CF
      SHA-256:797505C29E28D17795EFA66472B90382AE264D208279384FD0DCECAF1E324ED0
      SHA-512:3062593518B6DEEE7B4C88A5E1DBEC28C5DEBC514974A62779CAA2FFE3A3C20DBFE8B28A25FE08C77571EA1B9DA1DE9965D92013C3D1FE508401D9D3B1540695
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................R..s....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):12964
      Entropy (8bit):4.66170967139447
      Encrypted:false
      SSDEEP:384:kDb5cs8FxvLu/XLX/veKquxPG/DoYrgG4L65l1AD+Dyprret:kDb5clLTu/XLX/veKq2PG/MY8fYVDyF4
      MD5:C4F1AB6E41958B795BA30EF55700B597
      SHA1:10EC8126AC5C667BDE13E24653AA48CE810161C5
      SHA-256:4E44267DE9D168463850C2C76631AAD56DDE3091A1A71952D05BAE71B2C03182
      SHA-512:63F5A0F563C3C139274EE63BA3651B925C591A6BBB80D42137AD9DFA1B5242FD53D74E61E07031C87E1D069D8430C887F85E8D6C6A6E3642544B90E006B4CBB6
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................v...R..s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
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):980
      Entropy (8bit):4.143220693741953
      Encrypted:false
      SSDEEP:24:WWkTI9m+Kt3Dh5/9x0dL+M1/G0JvRLu0F:72DP/9iRrBhF
      MD5:819C9824663BDEE2475C0F42BBE6B3BB
      SHA1:A6EDE12F3D8DF668C397F1FB03A13CD212B7D73E
      SHA-256:CA33D0088BFC2ED68EA0751E9B0DA486B3FCB6509C65B4011E037074A3421AB8
      SHA-512:32ACD8164EE3519D92769730417C926D60898E25F4857DF12007F72A2EDF7E1FAEE150225B3A62EA5F77D2F886711D20C478E2CACEF2390D8A3593B460565CFF
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..p.............-......p....R..s..l.i.r.i.s.....l.i.t.a.y.e...l.i.u.r.d.u...l.i.z.a.p.T...l.i.z.a.v.a...l.i.a.l.a.b.o...l.i.a.l.e.m.....l.i.h.i.n.d.i...l.i.k.r.[.n.i...l.i.n.g...l.a...l.i.s.i.n.w.a...l.i.b.i.l.i.m.....l.i.f.a.l.a.m.....l.i.g.e.l.e.k.i...l.i.k.o.r.e.y.a...l.i.m.a.l.e.z.i...l.i.n.e.p.a.l.[...l.i.o.n.g.i.l.i...l.i.p.o.l.o.n.[...l.i.s.o.m.a.l.i...l.i.s.u.w.e.d.[...l.i.t.a.m.u.l.i...l.i.t.i.l.i.k.i...l.i.t.s.h.e.k.[...l.i.a.m.a.r.i.k.i...l.i.b.e.n.g.a.l.i...l.i.n.d.o.n.e.z.i...l.i.s.i.p.a.n.y.e...l.i.t.a.l.i.a.n.o...l.i.b.i.l.i.g.a.l.i...l.i.f.a.l.a.n.s.[.....l.i.k.a.m.b.o.d.z.a...l.i.n.g.[.l.[...s.a...l.i.p.e.l...s.a.n.[...l.i.p.e.n.d.z.a.b.i...l.i.b.y.e.l.o.r.i.s.....l.i.v.i.y.e.t.i.n...m.i...l.i.p.u.l.u.t.u.g.[...s.i...-.@...[.......*.7.B.X.o.....@.....'.........D.Y.O.......0.[.........A.M.............H.F........q.q(r.q.q.q.qQq.r.q.r.q...quq.q...q.q.q.qZq/qcq?qlqHq.r~qAr.$.p.p.q.q.q.p.q'q.p4r."7q'.......V...d..P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):5552
      Entropy (8bit):4.785841425159864
      Encrypted:false
      SSDEEP:96:/z2dO96bXC7RiGI1LC7kk8/746Rvw5FmXRxGEPjHwoWqA:/q49ceiBDrRmmiWHxPA
      MD5:3E47E97864163178104D23AB384B391B
      SHA1:CF2F6BD65DAAF9CB748654C2A690DE87A8D2E77F
      SHA-256:C60675581D75AF114E0D504D492E3A6DBBDC653B7102DC65B65A889259DE16B3
      SHA-512:FFE91DF77878764C0AE4DE44AF2A7DD808732AA16B1A52EC5C4DC5AE49AB95A337CB20237D069F6B7206FA014E428E12DC59B2177D1EA62BBA618099CA091A92
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................W.. ........d...d...........R...R..s..&...&...D.'.H...D.H.Y.....'.....".3.H.Y...".B.&.E...&.E.(.H...(.&.F.'...(...E.'...*.&.3.H...*.'.F.'...1.&...'...3.&.F.'...A...,.....D.'.&.H...E.&.1.H...............&.F.......'.F.....&.H.1...'...*.'.E...D.....&.E.&.1...9.&.(.1.......H.1.,.....".0.#.1.....&.....(.H...(.'.A...'...*.H.1.........H.Y.3.'...3.&.1.(.....3.&.F./.....3.H.Y...'...B.#.2.'.B...E.&.*.'.[...E.'.F...3...F.&...H.Y.....H.'.4.......&.D.2.......H.D.H.A.....'.F.'./.....H.Y.3.....#.1.E.#.F.....*.#.(.#.*.....*.&.D.&...H...E.H.:.H.D.....".D.(.'.F.....".D.E.'.F.....#.E...#.1.....&.H.1./.H.Y...(.&.1.&...D...(.H.Y.~.H.Y.../.H.Y.'.D.'...3.'.F...H.Y...3.H.Y.&./.....D.H.Y.&...'...E.#.,.'.1.....E.#.1.'.*.....E.'.&.H.1.....E.'...'.E.&...F.&.~.'.D.....F...H.Y.&.1...~.#.4.*.H.Y.....&...&.F.......'.(...D.&.....H.1.F...4.....H...H.Y.'...........H.Y.....'.D...3.......'.&.H.3.'.....'...'.........'.....*.....(.#.F...'.D.....,.'.~.H.Y.F.....E.'.D.'...'.E.....H.1.&. .......
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):19264
      Entropy (8bit):4.522583117528537
      Encrypted:false
      SSDEEP:384:Ai61FYdfSu9cuXd3uh+m/ESiS6SKS8SPlS8SKSKqS6SRSS1SsSoAVYSbaSdvSXNb:AiwWd3e+oE1N1S8uDl1qp0SqLSY9+6/z
      MD5:0EE42B9144D454937CAED63DB74270E8
      SHA1:2B5F4DA980B4CCF5F6189AF6DD3CD0BD2B0E2D98
      SHA-256:B92E14DF347A636B81350A7D2E3EA99D7F4CD15F6BD6D87E57CFF15F21149946
      SHA-512:DEFDA5831550A8F3E26449100AD3DBCC9E4F212407E39747FF2ED1C9CE396CC702C2733BB8361F470FE89B73C9540CE10C63DB550D320B448F2CC4EC773712C9
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................R..s..j.g.o...k.r.+...m.g.o...t.v.+...g.o.t.u...t.a.j.u...b.a.s.u...b.i.n.u...b.u.g.u...d.a.z.u...d...F.u...f.o.n.u...f.u.l.u...f...r.u...g...z.u...h.a.F.u...h.e.t.u...h.u.p.u...k.a.d.u...k.o.m.u...k.o.r.u...k...v.i...l.o.z.u...m.a.b.u...m.a.f.u...m.o.s.u...p.o.<.u...p...l.i...s.o.g.u...s.o.m.u...t.i.v.u...t...n.a...v.a.j.u...v.o.t.u.....e.h.u.....k.k.u...F.o.r.u...a.a.n.u...a.o.n.u...k.o.p.t.u...o.r.i.j.u...z.u.n.d.u...a.d.i.g.u...a.f...r.u...a.k.a.n.u...a.v...r.u...a...o.l.u...b.a.s.k.u...b.e.d.~.u...b.e.m.b.u...c.o.n.g.u...c.v.a.n.u...d.a.r.g.u...d.i.n.k.u...d.i.k.l.u...d.o.g.r.u...d.u.a.l.u...e.f.i.k.u...e.r.z.j.u...f.a.n.g.u...f.a.n.t.u...f.l...m.u...g.a.n.d.u...g.b.a.j.u...h.a.i.d.u...h.a.u.s.u...i.b.a.n.u...i.l.o.k.u...k.a.d.~.i...k.a.m.b.u...k.e...v.u...k.h.a.s.u...k.h.o.s.u...k.o.n.g.u...k.r.+.k.u...l.a.m.b.u...l.a.n.d.u...l.u.h.j.u...l.u.n.d.u...m.a.i.j.u...m.a.o.r.u...m.e.n.d.u...m.j.e.n.u...m.o.k.a.u...n.j.a.s.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):940
      Entropy (8bit):4.091999815966314
      Encrypted:false
      SSDEEP:12:VCG6EWhRnGI2lT+c/rVHhbIyMW8HHdMinWNDEsfRPJ14iJlF40cFK3UAF:VCQogI2P9hj8J0bRX4CcFKEg
      MD5:4E444E5FCECE69C68BEEF9278DB25D7B
      SHA1:C26890CF41272501B2E4EB2E5F30746176DFB797
      SHA-256:1ED5E93183C4E5EEEEA19A2A29D9260C4B39AE21D8F01D9A486DEF21BF2C450F
      SHA-512:D6E78F9163D5BEF68054F4AFC7E3DDA87E4ACA4B902D74103CBC1CB82E676F46C6C821EEE85242A165FF24DF3FC23745607F4C5A75BE6138D4853B50CA54E843
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .Xx.............,.....Xx....R..s..I.k.a.n...I.j.a.v.a...I.r.i.s.i...I.z.u.l.u...M.a.k.u.a...N.r.e.n.o...I.a.j.e.m.i...I.a.r.a.b.u...I.b.u.r.m.a...I.c.h.e.k.i...I.c.h.i.n.a...I.h.a.u.s.a...I.h.i.n.d.i...I.h.u.r.d.u...I.k.o.r.e.a...I.m.h.a.r.i...I.s.w.i.d.i...I.t.a.m.i.l...I.u.k.r.a.n...I.b.a.n.g.l.a...I.g.i.r.i.k.i...I.j.a.p.a.n.i...I.n.e.p.a.l.i...I.s.o.m.a.l.i...I.t.u.r.u.k.i...I.y.o.r.u.b.a...I.b.e.l.a.u.s.i...I.f.a.r.a.n.s.a...I.h.o.l.a.n.z.i...I.h.u.n.g.a.r.i...I.m.a.l.e.s.i.a...I.p.o.l.a.n.d.i...I.p.u.n.j.a.b.i...I.r.o.m.a.n.i.a...I.b.u.l.g.a.r.i.a...I.j.e.r.i.m.a.n.i...I.k.a.m.b.o.d.i.a...I.n.g.i.l.i.s.h.i...I.n.y.a.r.a.n.d.a...I.t.a.i.l.a.n.d.i...I.v.y.e.t.i.n.a.m.u...I.h.i.s.p.a.n.i.o.l.a...,.@...[.......*.7.B.X.o.....@.............D.Y.........0.[.........A.M.............H.F.....Yx.x.x.yWy.x.xay.xuy.y|x.y.x.x*y..Wx.x^xky.xpx3y.x.x!yEy<yvxNydx.y.x.x.x.y.x.x.x.y.y.xjx......V...R..P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):10988
      Entropy (8bit):4.974565944055817
      Encrypted:false
      SSDEEP:192:dsJanyEyEVTbHFPStZVWhnApH5Q4rBstRBXLeV/djM7ICFn9vKPdes08/Q07m6dD:6JaTdHFPStZV2nSH5QAstnqVadKVPHfz
      MD5:1319DCF9C1470CF1CA20E35BBBB3445F
      SHA1:6715D87BE00F6C06C137C951DDA333078AFBFFD4
      SHA-256:3949D91AAEE83B53522EC9B914B35C4ACCB1AB7598206F69EE2D4C3248E35A63
      SHA-512:3EFD4CA2584AD6C0516F5B00D823BADBE7824F4C79A33E9C0E57217704422C3C90D0F05A5EE904EAAB6D8721F39B542DF391FDD8094DFC991A5840986E487F47
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................v...R..s..N.i.u...I.t.a.l.i...L.a.z.i.m...W.a.l.e.s...J.e.r.m.a.n...K.i.k.u.y.a...O.s.s.e.t.e...P.o.l.a.n.d...S.i.c.i.l.i...S.w.e.d.e.n...B.e.l.a.n.d.a...B.e.l.a.r.u.s...C.h.u.k.e.s.e...C.i.n.a. .W.u...C.o.m.o.r.i.a...C.o.r.s.i.c.a...D.e.n.m.a.r.k...F.i.n.l.a.n.d...G.u.j.e.r.a.t...H.u.n.g.a.r.y...I.c.e.l.a.n.d...U.k.r.a.i.n.e...B.e.n.g.g.a.l.a...2...1...4.9...2...A.b.k.h.a.z.i.a...C.i.n.a. .G.a.n...F.i.l.i.p.i.n.a...I.n.g.g.e.r.i.s...K.a.b.a.r.d.i.a...K.a.l.e.n.d.a.r...K.a.n.t.o.n.i.s...K.i.r.i.b.a.t.i...K.o.m.p.u.t.e.r...M.o.l.d.a.v.i.a...P.e.r.a.n.c.i.s...S.e.p.a.n.y.o.l...B.e.r.n.o.m.b.o.r...C.a.t.a.l.o.n.i.a...D.i.g.i.t. .M.r.o...D.i.g.i.t. .V.a.i...O.c.c.i.t.a.n.i.a...Z.o.n. .W.a.k.t.u...P.e.r.s.o.-.A.r.a.b...D.i.g.i.t. .B.a.l.i...D.i.g.i.t. .J.a.w.a...C.i.n.a. .H.a.k.k.a...C.i.n.a. .X.i.a.n.g...D.i.g.i.t. .A.h.o.m...D.i.g.i.t. .A.s.a.l...D.i.g.i.t. .M.o.d.i...D.i.g.i.t. .N.. K.o...D.i.g.i.t. .T.h.a.i...I.s.i.h. .A.k.s.e.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):15012
      Entropy (8bit):5.042198577749172
      Encrypted:false
      SSDEEP:192:jq5oytq/nYt1aaAiUIXkN6EW6jDqT8RC78xrz6Itu1pvNrl+TYlTos/HseUmUsVI:m5ompt1aaACJlARzwI+Xp/MeUV0Qx
      MD5:53FC80551FB174F8E1E25B69EE7A5F8A
      SHA1:FCB0CCBBC9DDF0AC374673102AB353D88C909BF4
      SHA-256:800DFDB2D2ABC9FC131D74C30AC9A5536D86F8656536A1D7A9308EA87484E36A
      SHA-512:01E6DB1D21A925A24B860F5705BB47D98E13B21C2FFC8134BCD0A6F051B213CAB02531A88FEE136B010D6659A50354193AEFD7F0C9E27567A46F46E64FB6C803
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .N..............[.....N.d...R..s..j.y.s.k...r.i.f.f...a.k.o.s.e...e.r.z.i.a...k.a.p.i.z...f.e.l.l.e.s...f.r.a.s.e.r...g.i.l.e.k.i...k.a.r.i.s.k...k.i.e.m.b.u...k...l.n.s.k...l.a.z.i.s.k...l.i.v.i.s.k...m.i.n.n.a.n...m.o.k.s.j.a...t.a.l.y.s.j...z.e.e.u.w.s...l.a.o.t.i.s.k...b.a.i.r.i.s.k...f...r...y.s.k...g.a.s.s.i.s.k...i.n.g.r.i.s.k...j.i.d.d.i.s.k...k.a.b.y.l.s.k...k.o.r.n.i.s.k...l.a.d.i.n.s.k...l.a.t.v.i.s.k...l.e.s.g.i.s.k...m.a.n.d.s.j.u...n.o.g.a.i.s.k...p.o.n.t.i.s.k...r.u.m.e.n.s.k...r.u.s.i.n.s.k...s.e.s.e.l.w.a...s.o.g.d.i.s.k...t.u.v.a.l.s.k...t.u.v.i.n.s.k...v.a.i.d.i.k.a...v.e.p.s.i.s.k...z.a.z.a.i.s.k...a.d.y.g.e.i.s.k...a.r.a.g.o.n.s.k...a.r.o.m.a.n.s.k...b.e.n.g.a.l.s.k...b.i.s.c.a.y.a.n...c.e.b.u.a.n.s.k...e.l.b.a.s.i.s.k...f.o.n.x.s.a.m.p...f.u.l.f.u.l.d.e...g.a.l.i.s.i.s.k...h.a.w.a.i.i.s.k...k.a.i.t.h.i.s.k...k.a.r.i.b.i.s.k...k.a.s.j.m.i.r.i...k.o.c.i.e.w.i.e...k.o.m.o.r.i.s.k...k.u.m.y.k.i.s.k...l.i.g.u.r.i.s.k...m.a.l.a.y.i.s.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):16224
      Entropy (8bit):4.9075050171898065
      Encrypted:false
      SSDEEP:384:GCv30PmdRF4X1BY+x3NaAqAg/+pTCzlSwl:GCv38mt4rtx3NngWg9
      MD5:F8A5393FB73004A0125270C2B8699EDA
      SHA1:665FE34ED3B425A409BF9F5955F36CA4D1A2A371
      SHA-256:956F1F13BFECE3A4B6AC8D17536618733F3BB887808E431201C472BE36F04111
      SHA-512:9DA3A86812F2137028FCEBB74B99CA9795749647A1F516F143B1F6A07D04CA6E87927310216B20760723BBD9B420BCA01EE899F1BFD5DE309A2CA25466637EC6
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ...........................R..s..c.f...h.c...l.b...-.>.......8.A.....!.K.....5.@.....K.......>.......G.......B.(...(...K...+.>.....+.K.(...0.A.....2.>.....2.A.....6.>.(...Z.m.t.h...Z.s.y.e.......(.A.......A.........>.(.......G.........>.......?...G.....M.%.@.....K.8.>.....?...>.....>...>.....A.(.@.....A.2.A.....A...*.....G.8.K...+.M.2.?...,.>.......,.>.8.>...,.A.2.A.......'.@.....2.>./.....>.+.>.....>.,.>.....?...K.....K.9.....2.K...@...5.>.0.G...8.>...>...8.>...>...8.A.8.B...9...K.....9.A.*.>...$.>...?.2...l.o.o.s.e.......G.0.@.....&.?...G.....2.G...........0.?.8.....0.M...@.......M.,.K.....(.M...8...../.K...K.........A.0.....!.?./.>.....0.M.&.A.......>.0.>.....!.?./.>.....8.>...G.....>...>.......>.,.?.2.....A...?.......A.0.A.......M.0.?.......M.0.?.......K.5.>.0.......>.........A.-.>.8.....G...G.(.....0.M...>.....A...?.8.....>...2.G.....>.-.M.......G...A.....!.G.(.?.8...$.>...$.>...$.>.$.>.0...(...?...>...(.>...0.B...(.?.....(...(.K...>.....*.K.2.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):1304
      Entropy (8bit):4.25693545904243
      Encrypted:false
      SSDEEP:12:jDfYElrecyT0x1m9qMVqnVWdo8ChtHhnzROEp0D19SiBQ1m8Jt4aE3u:jXCcyASkMVcVceh9xlOP9BR3e
      MD5:D29DE5920AE0135DB10D4FFDA770711E
      SHA1:01673E54DA28C57B05FAF767030022B841B86F9D
      SHA-256:5BC5DC42CE6FDA2F6DC808E24F15B2F87021ED5FBD226CA9C346A3B6EC787EC8
      SHA-512:68DEC56D7D5A6EFCC60EB45C172B0255BA53767831EA409D02A9162D655A027C0246F78A5B4C0B9211E8C1032707F12017F440BC248A3B7DA984227A3AF2E79E
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................:.. ..Q.....>...>...,......Q:...R..s..F.a.l.a...P.a.K.....J...m.a.n...Y.o.r...b.....N.g.[...l.[...n...K.i.[.l. .a.k.a.n...K.i.[.l. .i.k.b.o...K.i.[.l. .k.o.r.....K.i.[.l. ...r.d.u...K.i.[.l. .t.a.m.u.l...K.i.[.l. .a.m.a.r.i.a...K.i.[.l. .b... .m.[.r...K.i.[.l. .i.t.a.l.i.a...K.i.[.l. .m...w...s.....K.i.[.l. .p.T.l.T.K.e...K.i.[.l. .p.[.r.s.i.a...K.i.[.l. .r.u.s.s.i.a...K.i.[.l. .r.w.a.n.d.....K.i.[.l. .b... .g.r.[.k...K.i.[.l. .b... .t.u.r.k...K.i.[.l. .b.. ..r.a.b.e...K.i.[.l. .s.o.m.a.l.i.....K.i.[.l. .v.i.[.t.n.a.m...K.i.[.l. .M.a.l.[...s.i.....K.i.[.l. .b.e.n.g.a.l.i.a...K.i.[.l. .b.i.r.m.a.n.i.a...K.i.[.l. .b.u.l.g.a.r.i.a...K.i.[.l. .b... .t.c.h.[.k...K.i.[.l. .b.. i.n.d.i.e.n...K.i.[.l. .p.[.n.d.j.a.b.i...K.i.[.l. .b... .r.u.m.[...n...K.i.[.l. .i.n.d.o.n.e.s.i.e...K.i.[.l. .b.e.l.a.r.u.s.s.i.e...K.i.[.l. .b... .c.h.i.n.o.i.s...K.i.[.l. .b... .j.a.p.o.n.[.....K.i.[.l. .b... .j.a.v.a.n.[.....K.i.[.l. .b... .s.u.e.d.o.i.s...K.i.[.l. .b...l.l.a.n.d.a.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):88
      Entropy (8bit):2.6921723843305845
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlKelBjlgljl/FiFahn:SBtkJTl4t
      MD5:2025BF7EE3171A6EE32EE4BAB511826A
      SHA1:1D2CE8C50DAC406DA46723D496F7178E71E96EF9
      SHA-256:41BD6D9FA31CF3D56880C336617B9B5CFDD72762803B2355470DEE494B8CF210
      SHA-512:A981654800DF71FCFC479CE3166546ACE474D25827ECCE05B0A530C1D6EC95ED9628758F23E318DC342ED40B4E5014FFAF89C3A5A953AA051C4B62E62B2105C4
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s..n.b._.N.O.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):17836
      Entropy (8bit):4.707405624637349
      Encrypted:false
      SSDEEP:384:e8RqNVELt0jQ08TFSajm2Hiziw15Mkjv/HFXaD:5Rq3ELtYQzTwax7Kv/lXaD
      MD5:59D301FCFD92CA17172D10CFF13C19D3
      SHA1:95457A6A76C8B596A25D8CEC4D6D24DA6F488089
      SHA-256:6139FBAABB48B72D0EF0F2E78C962BB7BFAF630BB0EF76D67A6286D171020473
      SHA-512:477EF4739C36A8A2E65CDC89791B273139C61C466DF581B05DAE5BFF792845B05E3F2919553F570C43B7880E2EC08723EDC79F868DF87CCA2757DBA90B8606B6
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................S.. ........c...c...........8...R..s..%.>.....2.>.......8.A.....!.K.....q.G.......M.......A...!...M...+.(.M...-.>.....2.A.....8.9.K..._.>.....q.>...........>.......(.M.......(.A.......G.......0.q.........,.K.....(...K.....>...K.....>.!.K.....>.q.?.....?...G.....H.%.?.....K...?.....K.0.K.....M.0.@.....>.8.@.....K.8.>.....>._.K.....A.8.?.....?...>.....G...M.....>...>.....>...K.....A.(.@.....A.2.A...$.@.-.M...$.G.8.>...$.M.q.?...%.>.(.>...(.>...>...(.A...0...*.>.2.?...+.?...?...,.>.8.>...,.?.(.?...,.G...>...,.G.(.>...,.K.!.K.....>.0.@.....>.2._.....?...K.....G...>.....G.0.A.....K.8.?...0.K...M...2.>.(.>...2.K...?...6.>.(.M...6.A.6.A...6.K.(.>...8.>...>...8.G.(.>...8.K...>...9.>.(.M...9.?.,.C...9.A.*.>...9.L.8.>...q.>.0.H...q.>.8.K.....!.<.?.....8.?...9.3.....+.>.0.M.......K.2.?.......G.0.?.....q.>.'.?.....,.>.(.M.......K...?.....0.?.8.M.....2.K...K.....+.?...M.......M.5.A.......>...>.......?.q.>.....0.K...K.......M...K.......?.(.M.....(.A.0.@.....(.M.(.!...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):132
      Entropy (8bit):4.096745944387419
      Encrypted:false
      SSDEEP:3:XCbVSm/tlW7s+mlplplmV/ExIMjti5Z/lP3Alsldi9YF:SvGYpCV/LMjtavldi9o
      MD5:CE3C1BCB4E03B1A75476B8D7396C9515
      SHA1:5ABBCFE32F3AF0BD53FEB8779D7B959518E119AF
      SHA-256:6D51FE711A2EDCE669FD776778B85474085A0F4068ED61802646B6E428B9C9CC
      SHA-512:A54504D4B3F7EA491BDF8A02833AE1822B729EB7E0B0F7F41656411D773957E2F1326605D45D5A09007A66113CE4D735B34AB5619EBC82A15FFC730C7506ADA0
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .{\...................{\....R..s....O.1.E.O...........[.....e...z\|\..j.....V......`...P...P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.411243631352237
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/E9:SBtkJ1li6gml/o
      MD5:A0E7F0023EFE9D9DA802A0C5A941F8CE
      SHA1:E4522C97B99704605469449C21AEEF8E03A0AD3E
      SHA-256:756032017E2D9DEB9EC1508DAFB605009EADF6D859FF309BBCD6E49BB2D8D9F2
      SHA-512:2B06564FB675F51D96E9945A303D9AADAEABB8173222AC644AC3415D5AC1AEC958D70F651A5C85561CDD79E0F4B713D43117332A8536A251F4FB48800076AB01
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s....s...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.905547915629603
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDklU8gl8l/EZMx/i3:SBtkJYlU8g8l/zZu
      MD5:FDA7107459FC09A594A5F3920C0F7DBA
      SHA1:9DDCB2E2ECE873608AA43CABA4F145F5568A792D
      SHA-256:45D37274BE14BD0B14FA4C0A3BAE888FE0F955E02316A38CD57991AEC296AF00
      SHA-512:49ABD03EA512EE4DFAA0A556F94C594A67F94CBD4E3CC79EEB5A742FBBDE6CA2159CBE62765397D48C74CAF1611C7E960C9AEDD83BFB1454B4825775B20C2331
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s..p.a._.G.u.r.u._.I.N...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):121484
      Entropy (8bit):4.34897404391638
      Encrypted:false
      SSDEEP:3072:Q5gJ9gqjUu5UyWQae6I5mJUfJU946m3Zb8okMaEc725UMuyeQ2jXc+fxQxc7y0hL:2gJiuaJkJH2L
      MD5:774C36C7C26169F949286336BC52C2AA
      SHA1:0C5FDB84228C828912C8EF0722C24F524BC557E5
      SHA-256:76F7C78A49AC38E8EF210E44800FD25C2D0AB3063E62F70799A0A8DC50B8CE1C
      SHA-512:4FD4938E7096D0ECA2B8925575D99750F659BE926F4A49776A209FA92DAE2D416BA99C70D3BAAD97CD2CF1285454D0A038F2C43CE06E8C8E124CDF66118CA18C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .........v...v...........v..R..sKeys.calendar.cf.colAlternate.colBackwards.colCaseFirst.colCaseLevel.colNormalization.colNumeric.colStrength.collation.currency.hc.lb.numbers.timezone.Languages.ach.ada.ady.agq.anp.ar_001.arn.arp.asa.awa.ban.bas.be.bem.bez.bg.bgn.bho.bin.bm.bn.brx.bs.bug.byn.ca.ceb.cgg.chk.chm.chr.chy.ckb.cop.crs.cs.cu.cv.dak.dav.de_CH.dgr.dje.dsb.dua.dv.dyo.dz.dzg.ebu.efi.egy.eka.en_GB.en_US.eu.ewo.fa.ff.fil.fj.fon.fr.fur.fy.gaa.gag.gan.gez.gil.gor.got.grc.gsw.gu.guz.gv.gwi.hak.he.hil.hit.hmn.hsb.hsn.ht.hup.hz.iba.ibb.ie.ilo.io.ja.jbo.jgo.jmc.jv.kab.kac.kaj.kam.kbd.kcg.kde.kea.kfo.kg.kha.khq.ki.kkj.kln.kmb.kn.ko.koi.kok.kpe.krc.krl.kru.ksb.ksf.ksh.ku.kum.kv.kw.ky.lad.lez.lkt.loz.lrc.lua.lun.luo.lus.luy.mad.mag.mai.mas.mdf.men.mer.mfe.mgh.mgo.min.mk.mni.moh.mos.mt.mua.mul.mus.mwl.my.myv.mzn.nan.nap.naq.nds_NL.new.nia.niu.nl.nl_BE.nmg.nn.nnh.nog.nqo.nso.nus.nv.nyn.pa.pag.pam.pap.pau.pcm.phn.prg.qu.quc.rap.rar.rof.root.rup.rwk.sad.sah.sa
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):9100
      Entropy (8bit):4.871376882845236
      Encrypted:false
      SSDEEP:192:QP7fUhtjoHc0tt1vq8jtuyGpmyUBGk6x8iI4/Yu5E:AUYV5jtIeB56+sDE
      MD5:EE41A7412A182CB15B38C497674AED2D
      SHA1:91DCF8F0CBF98DB8B3A7148E8D963670FE6997B4
      SHA-256:CA12C3EC7275BFE5CFCF257B16D832BEA1661FAA549F31F7FC0A11764B537F1D
      SHA-512:3BF0064188D4EBB9DA226FE71E0C7C3B28C2F4030AA76D21DCF057B189F644C667DB2A8E63F736BA6E202F4187CC18624C6571D4755B769FC2BCCC14FCF48B3C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ...........................R..s..G.F.....E.1...'.(.F...'.A.....'.J.H...'...H...,.,.H...1.H.|...3...'...3.G.H...A.'.F...D.'.H...F...H...H.'.................2...*.(.*.J...'.0.1.J...'.A.1.J...'.F...4...'.H...'...'...,.....'...(.H...'...E.H...(.A...'...(...(.'...*.'...~...*.*.H.E...*.1...J...*...3.H...*.....1...-.(.4.J.....'.3.....2.H.F.J...3.H...'...3...F.'...4.J.F.J...9.(.1.J...B.'.2.B...D.F./.'...D.F.......D...|.H...E.'.3.J...E.E...B...E.J.|.'...E...G.J...F.H.......F...(.'...H.'.1.....H.D.H.A...J./.J.4...~...*.H.......E.'.......F.J.........J.....'...H.....1./.J.....H.1.......H.E.........D.J.....H.3.J.....H.~.'...*.'.E...D...'./.J.:.J...'.1.2.J.'...'.1.E.F.J...'.3.'.E.J...'.3.H.J.J...'.:...E.J...'.D.H...H...'.H.'./.J...'.H.'.1.J...'.H...J.'...'...J.F.J...'...'.F.J...(.'.3...J...(.'.D.F.....(.'.E.1.G...(.1...D.J...(.D.H...J...(.F...D.G...(.H.3.F.J...*.'.,...J...*.G.'.F.'...*...E.F.J.../.'...1.(.../.1...H.'.../.H.'.D.'...1.H.F.......3.'.F...H...3.F./.G.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1626531665973814
      Encrypted:false
      SSDEEP:3:XCbVSm/tlM8E/flMl3ViGj1:Sv1jtBj1
      MD5:AAE879C1E1523CD47B76124DFB953F5C
      SHA1:9E6F3E4D87189A381EA5CA35148E2BC4C2618686
      SHA-256:5AB1E574C48682E6FEEA216E71B16150335EEA3D23AF856A0E6F71CE715DE137
      SHA-512:7FF20635476D644CCDF277A9DFDB01DC95FBB46C92C4FD119CEBC16758380935F09B4DD1B6B240E9336465E637AC47CDCA02C32DFC67CA0CCB170B2B17AB89DF
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.\/...................\/....R..s....j.V...[/
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1626531665973814
      Encrypted:false
      SSDEEP:3:XCbVSm/tlM8E/flMl3ViGj1:Sv1jtBj1
      MD5:AAE879C1E1523CD47B76124DFB953F5C
      SHA1:9E6F3E4D87189A381EA5CA35148E2BC4C2618686
      SHA-256:5AB1E574C48682E6FEEA216E71B16150335EEA3D23AF856A0E6F71CE715DE137
      SHA-512:7FF20635476D644CCDF277A9DFDB01DC95FBB46C92C4FD119CEBC16758380935F09B4DD1B6B240E9336465E637AC47CDCA02C32DFC67CA0CCB170B2B17AB89DF
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.\/...................\/....R..s....j.V...[/
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1626531665973814
      Encrypted:false
      SSDEEP:3:XCbVSm/tlM8E/flMl3ViGj1:Sv1jtBj1
      MD5:AAE879C1E1523CD47B76124DFB953F5C
      SHA1:9E6F3E4D87189A381EA5CA35148E2BC4C2618686
      SHA-256:5AB1E574C48682E6FEEA216E71B16150335EEA3D23AF856A0E6F71CE715DE137
      SHA-512:7FF20635476D644CCDF277A9DFDB01DC95FBB46C92C4FD119CEBC16758380935F09B4DD1B6B240E9336465E637AC47CDCA02C32DFC67CA0CCB170B2B17AB89DF
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.\/...................\/....R..s....j.V...[/
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1626531665973814
      Encrypted:false
      SSDEEP:3:XCbVSm/tlM8E/flMl3ViGj1:Sv1jtBj1
      MD5:AAE879C1E1523CD47B76124DFB953F5C
      SHA1:9E6F3E4D87189A381EA5CA35148E2BC4C2618686
      SHA-256:5AB1E574C48682E6FEEA216E71B16150335EEA3D23AF856A0E6F71CE715DE137
      SHA-512:7FF20635476D644CCDF277A9DFDB01DC95FBB46C92C4FD119CEBC16758380935F09B4DD1B6B240E9336465E637AC47CDCA02C32DFC67CA0CCB170B2B17AB89DF
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.\/...................\/....R..s....j.V...[/
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1626531665973814
      Encrypted:false
      SSDEEP:3:XCbVSm/tlM8E/flMl3ViGj1:Sv1jtBj1
      MD5:AAE879C1E1523CD47B76124DFB953F5C
      SHA1:9E6F3E4D87189A381EA5CA35148E2BC4C2618686
      SHA-256:5AB1E574C48682E6FEEA216E71B16150335EEA3D23AF856A0E6F71CE715DE137
      SHA-512:7FF20635476D644CCDF277A9DFDB01DC95FBB46C92C4FD119CEBC16758380935F09B4DD1B6B240E9336465E637AC47CDCA02C32DFC67CA0CCB170B2B17AB89DF
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.\/...................\/....R..s....j.V...[/
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):140
      Entropy (8bit):3.6172901478789785
      Encrypted:false
      SSDEEP:3:XCbVSm/tlyFgmlvlN/eeMKlVj7bmwRmKlMl/FzLDolB3Bf:SvmgoC+AeWl+D3J
      MD5:C9AD04416D48F3F3DA6EDE6BF0DE3140
      SHA1:9E71BD328567ED1326639D020FC3521367901F94
      SHA-256:29090AF3B728DD6D613B3C0C5269DBF7127B38F9B88F57F5131F7EA282735785
      SHA-512:D8AB2C3AA6F4B163C3FB38E0C9CE4787BE312CC84B9B6A38CC30327CFE651C47DE79E02CE604BFA8A3572134BA4540823C2907727FACD6EB9EEBE4DB9CF2C430
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..I....................I....R..s..s.w.a.h.i.l.i. .(.R... .D... .C.o.n.g.o.).....*.V..I.I....V......P.4.`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):196
      Entropy (8bit):4.611742020142585
      Encrypted:false
      SSDEEP:3:XCbVSm/tlvjlsqEblPp/EXj+JtzeDsH/LEZRtnHC+KgkiblFilF7xFUT9OrD7ATd:Sv6qE8uzew4vc+7koFGTCT9PE8v
      MD5:E79BF68AFC384525C535D2D648FDEAEE
      SHA1:9B2F0600AFA8E647142230547D1B203F0A2A5AE2
      SHA-256:51A9BFAD37156747790AEC44BFE76A0C5B5ED341741AE6DE1427FB181E51E3D0
      SHA-512:7EDBC482544BCBFBB5CE0430495779C7D87DB572A7CB3F92FDB1390F8DEC3B0FB92D0AE0EACDE00A414A7B9ECE2401E4A3B1B4CF5ECE5C982C79900E5D431786
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................".. ........)...)...............R..s....../d........{.{.{.......".e!..n!....t....................A.`e!.`...`r..`...`...`...`.m.`L..`...P..V.^..........`... ...P...P
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):22184
      Entropy (8bit):4.731542920391909
      Encrypted:false
      SSDEEP:384:oAjeRYOPIl3aQ9tRp0/cxsT9Pa2E5Xf+Wf+xCYt7:oAUYj99tRpKcxsTVa2E5v+Q+xCYV
      MD5:89FB6F6C53679CFD7F8EC70353D62535
      SHA1:21C9512F826AA841C28615008309931E67DF2E8E
      SHA-256:B85FCD2EC5B4045C9621A9A887B7ED5E06D3545352744ABFBEE9F9AE12AB0408
      SHA-512:A4A52015C9E859A2E55DF6FA9A3AC37BBE6985610662EC5F5738D33CA452F8CA745DC90F62DCC2F7B830B09254C4F74A85CD3EB6BE9A8D736D0B69A56CA1465C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .<......................4...R..s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
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):10204
      Entropy (8bit):4.852425927529368
      Encrypted:false
      SSDEEP:192:kkHm5ZyMjyyJ4U1WOo8qCFuIjZdR/77J/ig8iI4CmKBO:kkHILJBho8qC3ZbvJ/ig8soO
      MD5:DCD011C3A56643E59D0CEA477B271AC5
      SHA1:4F0EE664AF28C2B4576B01CD55DFEF47F839AEEF
      SHA-256:026667604E035B3AA364E193CAB04D74DDA68164EB4A64AD86960666D4955514
      SHA-512:53FC453AEA2CD467D84BD9D74312596429F9025D760E8A842AB8EDD29FC54ECC237993EF12FCCD9467252B86DDDCFE2445A294F7333F1AE03C910EAD515E261E
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................R..s..........E.1...'./.H...'.3.H...'.J.H...(.D.F...(.F.J...*.1.....,.J.2...1.H.'...1.H.}...3.G.H...3...H...A.,.J...A.F.4...E.D.J...F...H...J./.4.....J.........'.......F.......J.......H.....4.J...*.'.E.D...*.D...H...D.'.&.H.....'.&.J...".&.1.4...'.2.(.....'.2.1.J...'.A.'.1...'.F...4...'.J.(.F...'.J.A.....'...'.F...'...(.H...(.'.D.J...(.1.E.J...(.4...1...*.E.F.J...*.J.'.~...*.J.*.E...*.J.3.H...*...1.J.....'.3.J...2.H.F.J...3.'...'...3.'./.J...3.3.D.J...3.F...J...3.J.F.'...4.'.E.J...B.'.2.B...D.F...'...D.H.2.J...E.'.1.J...E.H.3.J...E.H.F.....E.J.*.'...E.J...E...F.'.&.H...F.H.H.J...F.J.H.1...G.H.~.'...H.D.H.F...H.H.D.A...H.J.D.4...~.1.4.F...~.D.H.F...~.H.D.4.....'.F.'.....E...'.......J.2.........F.....J.F.4.....'.E.F.....1./.J.....1.J.......D.H.F.....H.1.......H.1.H.....H.E.J.....H.E.......~.J.D.....H...F...'.H...J.'...(.F...D.'.....F.'...'...".&.J.F.H...".3.'.E.J...'.1...F.J...'.D.H...H...'.D.J.H.}...'.H.'...J...'.H.J.1.3...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.9323076876404954
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMVlEmt6E7lVjo:Sv5mt6gu
      MD5:7A89E9A370E8D0E313BA5AA754E5C449
      SHA1:A496DD9BD098B73B616735A39F7C1D89090DB418
      SHA-256:D7E1DF633942F0A1FE760B0FEA2D4D152F79D98369D85E5B1EBDB4F7B82ABFE5
      SHA-512:3CF2B4B5EF0129B38FBC0FD7D951A01057155A063918F3294E172F295179E1F09F8A2DBEB78A4D6981F71D1BFE63ACF5491E4C670696B71F3A8E6F5EF7C8A519
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P..L....................L....R..s.......L
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):888
      Entropy (8bit):4.2198271209621385
      Encrypted:false
      SSDEEP:24:YpamSuWfhXmwTg/PxoAIn5n09HDCxIIvYDrSo:YplSpfhXmYg/PxoAI5n09HDC6fl
      MD5:65871B9CAD3C2BDBCA7CC20611513271
      SHA1:527C21E819BEC5CCE74684249E609898F84C6B79
      SHA-256:29485F790CCD21207071AC3D258BA22E7137884CF67364DE30D3A9A8DF641D27
      SHA-512:517169C6EFE007CB9F19A438EBCA124798C5A45393BC315162D2F2CADE47685CAC0A58A47D68492D05492BF9EC603E967A34C6D7FDD392863590496A6FD9C893
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..T.............-......T....R..s..T.a.k.a.n.t...T.a.x.m.i.r.t...T.a.z.u.l.u.t...T.a.[.r.a.b.t...T.a.c.i.n.w.i.t...T.a.f.u.r.s.i.t...T.a.g.r.i.g.i.t...T.a.h.a.w.s.a.t...T.a.h.i.n.d.i.t...T.a.l.i.m.a.n.t...T.a.m.h.a.r.i.t...T.a.n.g.l.i.z.t...T.a.t.a.m.i.l.t...T.a.t.c.i.k.i.t...T.a.t.u.r.k.i.t...T.a.y.r.u.b.a.t...T.a.b.l.c.a.r.i.t...T.a.b.n.j.a.b.i.t...T.a.b.n.c.a.l.i.t...T.a.b.u.l.u.n.i.t...T.a.b.[.m.q.i.z.t...T.a.h.n.c.a.r.i.t...T.a.n.i.b.a.l.i.t...T.a.s.u.m.a.l.i.t...T.a.b.i.l.a.r.u.s.t...T.a.b.i.r.m.a.n.i.t...T.a.f.i.t.n.a.m.i.t...T.a.h.u.l.a.n.d.i.t...T.a.j.a.b.b.u.n.i.t...T.a.s.b.n.y.u.l.i.t...T.a.s.h.e.l.%.i.y.t...T.a.t.a.y.l.a.n.d.i.t...-.@...[.......*.7.B.X.o.....@.....'.........D.Y.......0.[.........A...M.............H.F......T.T.TtU$U8U.U.T.T.T.U.T.T.T.TVU.T...<.Uc6.T...<.U`U.U.UBULU.<...T.UjU.).U.U.U.)...U.U.T.T..j...V....`5..P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.9059918981668114
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMIl66E7lQ/S5rn:Svh66gQU
      MD5:99429A48939E3A225D47899070309528
      SHA1:36A1F05D4FCCF23B1BA16BD50E95AFAE57C50C09
      SHA-256:FA96AEAB1127F8C3AF7390DE4E541F58C54BF15C3F6710613FED47ABE3AFA9BA
      SHA-512:C704259C73F1F7F75BFDDAB84C0B7B1342623DC13AC03212F05A130BE3CB91737FD770842D5CA97E4065BE4E677CA3CD8994D6B00A9C510B91486CC5B4C5877C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s....V...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):10896
      Entropy (8bit):4.223066769778727
      Encrypted:false
      SSDEEP:192:RFpdaY3LzattteIemLMdOx4owEgBZ6mAYHo4Jxala8UNL:REY7zWtNeiMdW4oqeIosxala8Ud
      MD5:C79DED5764E47E5337B4DE89CF3391FA
      SHA1:F11701CD08D048BB3425CE00588F41DC9D3BBCEA
      SHA-256:E688614AC9658237F3622F69BACB65363B39715F0B2EEF78395B49DC60F76281
      SHA-512:5A2F35D6DEEEE49A39D6327D0317B0285C601E97274A81B5CFE4AC8E4F1B9C841FA5BF242111CC1FFBD8370E5FCCF1A8C086712CA05E0249950F45E40CE5B2C9
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................q...R..s..B.o.p.o...E.e.w.e...G.u.r.u...H.a.n.i...J.e.e.g...J.i.g.a...L.a.o.o...T.a.a.y...A.g.e.e.m...C.h.a.g.a...D.a.a.n.a...E.m.b.u.u...F.a.a.y.i...J.a.a.m.o...J.a.k.m.a...J.e.j.e.n...K.a.a.k.o...L.u.h.y.a...M.e.e.r.u...R.a.a.w.a...R.u.u.s.h...S.a.a.q.a...S.a.r.m.a...S.e.e.n.a...S.o.o.g.a...T.e.e.s.o...U.r.d.u.u...Z.u.u.l.u...C.a.r.a.b.i...G.i.r.i.i.k...A.s.e.e.r.i...A.y.r.i.s.h...B.a.f.i.y.a...B.a.s.q.u.u...D.u.a.a.l.a...F.u.u.l.a.h...F.u.u.n.j.o...G.a.n.d.h.a...G.u.u.s.i.i...H.a.m.o.n.g...H.a.w.a.a.y...H.o.o.s.t.a...J.a.r.m.a.l...K.a.a.m.b.a...K.a.s.a.a.q...L.a.a.n.g.i...L.u.w.a.d.a...M.a.l.a.a.y...M.a.n.k.i.s...M.a.s.a.a.y...M.e.e.t.a.a...N.u.w.e.e.r...R.u.n.d.h.i...S.h.i.l.h.a...S.h.o.o.n.a...T.a.a.j.i.k...T.a.a.t.a.r...T.a.i.i.t.a...T.a.m.i.i.l...W.o.o.l.o.f...L.a.a.t.i.i.n...A.x.m.a.a.r.i...B.a.a.n.g.l.a...B.a.s.h.t.u.u...B.i.r.i.t.o.n...B.o.o.l.i.s.h...F.a.a.r.i.s.i...F.a.r.o.w.s.i...H.a.n.g.u.u.l...K.a.b.a.y.l.e...K.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):10552
      Entropy (8bit):5.481790059993295
      Encrypted:false
      SSDEEP:192:TzpGQ/KrMsklUEhe4AgcETZ5lb/X/Yepwn0GK7lE:X/j84Zf/XgUiRSlE
      MD5:92476709B9A64A0E58E9583DBF972935
      SHA1:B145EF35285D2A078B8AAC8FB7AEB2F44DE78E6E
      SHA-256:B2DDA09C087E38D771A63333BBC8910B8DFEA0D2C688A0FF5791B84A3F16AEF1
      SHA-512:A154D280A7ACA93287F89C2011E51D103C03CE4FC1100D602382046B33B49DBD468ECFE22579BB8D908F6C236F17826EF8A44C4211B9871C050237F7283A760E
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................2.. .L......F...F.........L.....R..s.._.C...c.c.p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
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.8579990406079685
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDklU8gl8l/ERlSU5YMi3:SBtkJYlU8g8l/6/5YMu
      MD5:A15124D06FD24A4A238B2EB31920CF34
      SHA1:AD43C7F01AE88C5BBA503E599CEDE23898ED674C
      SHA-256:E1348D8D920E82A1D6C023A8F2D6A22DD87F0F22CF4DDE990D52A08105EAD5FC
      SHA-512:DBA7DD33AA90BDF0CD1F6528A9E6AA30A56930744E917AE70B6755C48611F3FCBA311914BD53FC546E569A231908052CEE302FF50FE37CF90174973DEC0449F5
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s..s.r._.C.y.r.l._.B.A...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):144
      Entropy (8bit):4.712820713570597
      Encrypted:false
      SSDEEP:3:XCbVSm/tln0sthjljl/y/Vidi5tmpaPhYAD7i3J7neEIRF:Svkswh5tegiFnezj
      MD5:6784226232236569B7296713F1858249
      SHA1:C43FC2D97DD78D8E097447C463FF0CEE8004F5BE
      SHA-256:0A7C74E48E8DBD95E94E8B017D204A9C04073836B7D052B50AE5B7E257EE490E
      SHA-512:4B92CBB1E77AC89E6F3B9534F11166541D0DA9E76F669C61F88A12718015F58AD5054F1FC131BE58C27445EC6B1D868CE154248C33B3125D75B3051B44EE81AC
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .h....................h.....R..s................z...H...8.j.}...fG.L.N.%...........a...g.}.....V......P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.8779990406079685
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDklU8gl8l/ERlSU5Wul/k/3:SBtkJYlU8g8l/6/5Wutkv
      MD5:66806A37CE763270B3A15362E29C0DCA
      SHA1:E573AD547E059776C19D58B72E8C9CD375D6969D
      SHA-256:B0E0D0CA4AE4759F834840A0507CE38B2E0312610AF678974EF669A8A23B5DD4
      SHA-512:CACF1BEC380379A5944A02B298AFE4C5D114D6DD1DEF785B43274366C362AA936A6F564A6E6A8A7704DD4ADD2E1868E9103C0645C2C5587CA03CF4D9A882C35F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s..s.r._.C.y.r.l._.X.K...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):188
      Entropy (8bit):3.5488868316723865
      Encrypted:false
      SSDEEP:3:XCbVSm/tldF+lE/ll03098lXlhfkWVtP5T86Hts1so0AUlyt2lH9Kl1d:SvOlfu0Xr3Vl5Tng67i2avd
      MD5:F16147C91B5B9ED819C0BC42667B4144
      SHA1:4A1DD125B5B4523E0ADD16EC5318642A03607170
      SHA-256:49EF275FD720F8A6326BA408E726F15D45DD66CE03A82777E1B2E29C30C1A97B
      SHA-512:3D3E1522BDAC78A1925036CFC805B7DF065234C0184933ED9EA6355D944A68750733625E2F5770FF741221095732BBF6EAA9C88DF1CE4738166F172BADA19605
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................ .. .\/.....'...'.........\/ ...R..s..t.i.d.s.z.o.n...k.i.r.g.i.z.i.s.k.a...p.e.r.s.i.s.k.-.a.r.a.b.i.s.k.a.......]/....e/..e.p/........V...%..P(..P+..P[/.`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):13012
      Entropy (8bit):4.562190553715316
      Encrypted:false
      SSDEEP:384:CyTFRPBRgfVOroQYzUak2E6uvmDw/CkG2HprJZV8D/ib40uO6vCKq9c:CMFRiVOroQYze2E6EmDw6IHplZiDz0J2
      MD5:804938AA06806DF4F177526C7B8A8C07
      SHA1:257C7D7986B4CDDB6FF48C0E5DEF89EAAB55947E
      SHA-256:8E4E4FB04850ACFD87BEC9893EA7BF29541350C24CE966E593CC7298FB495901
      SHA-512:04041E965DDD43891A9DE5A6B81A092B8EA3F8558163E91F8F9E5CAA37D5855CFCAC1B61B5FCE68B3676E6A69E2DB9FFD8F804E5728EAA828F457F3966F32E96
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................q...R..s..K.i.a.s.u...K.i.e.w.e...K.i.f.o.n...K.i.h.a.n...K.i.k.o.m...K.i.v.a.i...K.i.y.a.o...M.y.a.m.a...K.i.a.i.n.u...K.i.b.u.l.u...K.i.e.m.b.u...K.i.f.i.j.i...K.i.f.i.n.i...K.i.h.i.t.i...K.i.i.b.a.n...K.i.j.u.l.a...K.i.k.o.m.i...K.i.k.o.r.o...K.i.m.a.n.x...K.i.m.a.r.i...K.i.m.e.r.u...K.i.n.a.m.a...K.i.s.e.n.a...K.i.s.h.a.n...K.i.s.o.g.a...K.i.t.e.s.o...K.i.j.o.j.i.a...K.i.l.a.o.s.i...K.a.l.e.n.d.a...K.a.r.j.a.l.a...K.i.a.k.a.n.i...K.i.a.k.o.l.i...K.i.a.r.a.m.u...K.i.a.v.a.r.i...K.i.b.e.m.b.a...K.i.c.h.e.k.i...K.i.f.a.r.o.e...K.i.f.l.e.m.i...K.i.g.a.n.d.a...K.i.h.a.w.a.i...K.i.j.a.l.u.o...K.i.k.i.s.i.i...K.i.k.o.n.g.o...K.i.k.r.i.k.i...K.i.k.u.r.d.i...K.i.m.a.l.e.i...K.i.m.i.s.r.i...K.i.m.o.n.g.o...K.i.n.i.a.s.i...K.i.n.i.u.e.a...K.i.n.o.r.w.e...K.i.r.a.n.g.i...K.i.r.o.m.b.o...K.i.s.a.n.g.u...K.i.s.k.o.t.i...K.i.s.o.t.h.o...K.i.s.w.a.t.i...K.i.t.o.n.g.a...K.i.v.u.n.j.o...K.i.y.i.d.d.i...K.i.l.a.t.i.n.i...C.h.a. .j.a.d.i...K.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):22048
      Entropy (8bit):4.647099492702514
      Encrypted:false
      SSDEEP:384:e8hupi1Jb+CmD8MmuI8gbq/2CJFWgCdr3P7nT/gXbyb4jiYjOAnOH4nSbQirXOWP:e8hR1JbLmD83R5bKCdkOsjQxbQire9PA
      MD5:486E5CE7C7A4F22A67EBE6594B253688
      SHA1:E8F529F28A24CDB7FD3205DF56CAB5139172F1D9
      SHA-256:6DEED9C5BE6C536E49FB4624DDDAF329A055FE072717BA061443BC4044FCF2A1
      SHA-512:235B42E1FE26F18726143B8BCB0A5CB647F03F405FB09CEADE09B411A2ACAF9FE4A9594DDD5AEDD544F90C7DDDD4F8622078FFC83A1D37BF17EDD575D28A765A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................l.. ........................C...R..s....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):284
      Entropy (8bit):5.798176336157329
      Encrypted:false
      SSDEEP:6:SvKgeWt5AvxROtZxCt83DFxTZN6M46izrxZiYtXl03Qf:jgeWt5Av8bZNiJzrHiYtXS3Qf
      MD5:C7A09ED3C5AC1866BB6545BB7EDE628A
      SHA1:7254D148502925A8EAC1FF9783CF1567215253F5
      SHA-256:B389A5D1AF38E0A37D2571B4C402840BEB1145470C4A9C877709C01B5F891AED
      SHA-512:B02847C320DA6452DDCA4686D274B159A451E894A733981CEA1C91CB66F6B19A33A1508B45030ED2E77282263A1FA683F04BEAE8D3A985781B813E88D81A7B6B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................;.. ........?...?...-.......;...R..s..K.i.t.e.s.o...-.@...[.......*.7.B.X.o.....@.....'.........D.Y.......0.[.........A.M...............H.F........#..G.G.#.#.H..2.G.......0.\...G....|G..s0..]#i0K0A0..}0R....#.....G.#.0...\.#..........V......P...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.411243631352237
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/E9:SBtkJ1li6gml/o
      MD5:A0E7F0023EFE9D9DA802A0C5A941F8CE
      SHA1:E4522C97B99704605469449C21AEEF8E03A0AD3E
      SHA-256:756032017E2D9DEB9EC1508DAFB605009EADF6D859FF309BBCD6E49BB2D8D9F2
      SHA-512:2B06564FB675F51D96E9945A303D9AADAEABB8173222AC644AC3415D5AC1AEC958D70F651A5C85561CDD79E0F4B713D43117332A8536A251F4FB48800076AB01
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s....s...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):7692
      Entropy (8bit):4.796322836638135
      Encrypted:false
      SSDEEP:96:PQM4Kp3t925Ir6GwuPt6oFOo00kp1roug8Ja/cetkriedVXWOEgVobRpt:PQTKp3+A69uDgKkpacPbddWGyTt
      MD5:D86F82633086F6653282898C71CA1D9A
      SHA1:2915C9E959A5D61AB0D69320558E1D6765250EF7
      SHA-256:6EB7787CDD1B547E12B871AB2C643CA06CA25BEF8D05C1BDA01F7A4717CC0799
      SHA-512:F791F0AF84D08989E7CBF5E184012333AF38A3A7DED413D0C7C6B8339B3C93B7470FD06E50EDB1953B1B148A4AC78C53A7EAA49C5B250F7D0B90240C82AF6590
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................k.. .\......{...{...-.....\.f...R..s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
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.925547915629603
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDklU8gl8l/Egl6lwl3l/i3:SBtkJYlU8g8l/Dl6K/u
      MD5:A32CF3695027572FBBB3676506E21897
      SHA1:EBDBD013BC651EE05A5B28DF31EA4B9E4FEBBD71
      SHA-256:51D0D1CCEEA79E7FBF0D679BB3570B8EB10AD9D9B44A687197CFC540DFA26796
      SHA-512:E5CE86F52CCB1B77CC53D68C421DD19BAF79AF7AC2AA7181737A93900D4BC463EC0CBDB582EDD3A87687B55E03775A7CB6DDA55137C7900829DE2754A7B011AE
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s..u.z._.L.a.t.n._.U.Z...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):31176
      Entropy (8bit):4.660094340995951
      Encrypted:false
      SSDEEP:384:v/dvgQPa9mvYvTqeyyxqselsgM+LeYa7u4bc8zq2p5oK8S1Pm4MuaLWvTjRqU3Fq:vlvgQlYDH1MeLq492U5oSR5W6ymqx6T4
      MD5:B7B06373C3013F642CA12338782065D9
      SHA1:3392B47820E92430656DD73217A67C8325C003E6
      SHA-256:58CE9110E0501D7EF9B687BFC0EC8FE867664100023D87769BFD361422F0CADB
      SHA-512:EF9EB18BAA3DB08B6B7B8056CA36334509C25E47B9CAE60206203DA5A5A10D43BC17CCD253EDCD86ABE728CFD3E9B95E247972E87C03FE760F1049BE19BBAEA5
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................V.. .h......j...j...)..........R..s..S.....A.d.l.m...A.g.h.b...B.h.k.s...D.o.g.r...E.l.b.a...E.l.y.m...H.a.t.r...L...c.h...M.a.h.j...M.a.k.a...M.a.r.c...M.e.d.f...M.u.l.t...N.a.n.d...O.s.g.e...P.a.u.c...Q.a.a.g...S.i.d.d...S.o.g.d...S.o.g.o...S.o.y.o...W.c.h.o...Z.a.n.b...B.A.R.L.A...C.O.R.N.U.....a. ...m...A.O.1.9.9.0...A.R.A.N.E.S...A.S.A.N.T.E...A.U.V.E.R.N...C.I.S.A.U.P...C.R.E.I.S.S...C.h... .D.i...G.A.S.C.O.N...G.R.I.T.A.L...H... .m...t...N.I.C.A.R.D...U.N.I.F.O.N.......n. ...m...A.K.U.A.P.E.M...B.A.L.A.N.K.A...C.h... .S...p...C.h... .H...n...C.h... .L...o...C.h... .V.a.i...G.R.C.L.A.S.S...G.R.M.I.S.T.R...H...n. .l...m...L.E.M.O.S.I.N...M...i. .g.i.....P.R.O.V.E.N.C...T.i...n. .t.....{.0.}. .n...t...I.J.E.K.A.V.S.K...B.A.S.I.C.E.N.G...C.O.L.B.1.9.4.5...C.h... .B.a.l.i...C.h... .C.h...m...C.h... .H.a.n.b...C.h... .J.a.m.o...C.h... .J.a.v.a...C.h... .N.. K.o...C.h... .O.d.i.a...C.h... .T.h...i...F.O.N.K.I.R.S.H...G.i...n. .t.h.....I.V.A.N.C.H.O.V...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.812172957387978
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlgelU8gl8l/Eel6lafwn:SBtkJZlU8g8l/1l6lSw
      MD5:3C90F7377649E8713D7A66E5B94AAEF8
      SHA1:F57F958BFAEA60CE727BDA78A58656C4B21579EA
      SHA-256:97C7321D1677C201FB9B68FF38D9BBA91D879FD3F84280F5BDD39F3DE446CA3F
      SHA-512:EC4308EE40032024C4FE9859C10CC74BBE7D8A3CC3F26BB517B243B682FBB954BC4599D67760303E7ADFE51BA3E6F88094C8ACEF0BEBA2F391F9B09C190E2183
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s..y.u.e._.H.a.n.t._.H.K.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):12684
      Entropy (8bit):6.787165028955761
      Encrypted:false
      SSDEEP:192:zU21Sr+dcpQdxO1wqsLGPWl0skTu7N9OrZ3Ta/HvRH0aFSUB:zxYm7dxOwGuyk/PdzJB
      MD5:EC54D352E1595EF0AFA846E478726AC8
      SHA1:3E54BE34AF6225780594917FF112F31AAF434B20
      SHA-256:8B49DCBA77A78A888AD07872DB057C32BA5D8EB51AAABA2B10B9179CC1347380
      SHA-512:BA1C5B7B82A5DCDEB9B082441768DD370A7DC19AE934E0C607A81B913CA7F2065395E28C31F7B6715A6FE9644F1A492F5D2897F5902E1A4CF72CFC6D82D95F92
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................G.. ........[...[...[...........R..s...e.e...e..0N.e..[O.S...O.e..hQb_..lQ6R..lQ.S...Q.S..`S.e...S.l..4T....X.e.._[.e...[.e...c.e..pe<P...e:S..Il...Xn...vt.e..5u.....{SO...|...A~SO..,..e..'..^..c....._.e...\..e...](..e....8u.e..(....e..l..l.e...NaS.e...N(u:S...NLu.e..9N...e..LN...e...NU..e...NP..e...O.Y.e...O.^.e...O.s.e..[OW..e...P.T.e...P.b.e..KQ..e..pQZS.e..pQ.].e...Q._.e...Q.\.e...Q.c.e...R.g.e...R.e.e...R.~.e..WS.\.e..ZS.Y.e..aS.Y.e..aS.Z.e..aS.^.e..aSwc.e..aS4t.e..aS...e..bSeY.e..bSRf.e..bS..e..pS<\.e...S...e...STX.e...TyQ.e...T...e...T._.e...VE..e...VbS.e...W.Q.e..-WQY.e..NW.R.e...WpQ.e...W.~.e...W.R.e..GY.R.e...[aS.e...[.[....[...e...[.b.e...[yr.e...[.V.e...])R.e...^.t.e..r^...e...^.Y.e..i`.^.e..NbNb.e...byQ.e...b...e..wcKQ.e...c+Y.e...c.Y.e...d.N.e...e...e...eNm.e...e.b+Y...e,g.S...f.R.e...f.\.e...f...e...g.T.e..1g.b.e...g!X.e...g.^.e...g.R.e...h.P.e..9h.....Qh.S.e..Qh.b.e...h...e...j.~.S..'k.u.e..Lk._.e...k<\.e...k.g.e...k)R.e...l
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640495
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMu86E7lb1y:Svd86gRy
      MD5:6A7D6D2ED1DAC4F1FC3433AF4AD9EA61
      SHA1:72AC982A0486B52D53A67CDD50C8D0072128202F
      SHA-256:AC05B5309D3D2D1ED26197B7387015779873FE5AD798D11AAFB24883293998FD
      SHA-512:C8AA478ACB70DC1F0FFE948CC8AEB075FCB3FA01E927B8C2554DAA6D305FE956BED73E55ADB129C2071DC70DE4AC1CF82826AE90CA2EE20F3BB5DF5051C66100
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P..W....................W....R..s.......W
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.162653166597382
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMullNiHyC:SvdXC
      MD5:F7824A6561441504F1ED9A2CF43149F2
      SHA1:EC9E05A4DA7636FB737666D40461FD8447F0849E
      SHA-256:849C7B03350D7AD6191B21CB38AE728D7469A2C7B2B51611C21A4BC9FF2FCCF4
      SHA-512:872C2196F54F0C87844CD75E6878385D4BB821EE5431BFDB5DA7B7BE0821EE1758D285573D798B1C3508D41C8AE4CD3E66CFD8D5F086E3BA5D3F5F8075CD2A6C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P..W....................W....R..s....j.V..W#0
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.411243631352237
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/E9:SBtkJ1li6gml/o
      MD5:A0E7F0023EFE9D9DA802A0C5A941F8CE
      SHA1:E4522C97B99704605469449C21AEEF8E03A0AD3E
      SHA-256:756032017E2D9DEB9EC1508DAFB605009EADF6D859FF309BBCD6E49BB2D8D9F2
      SHA-512:2B06564FB675F51D96E9945A303D9AADAEABB8173222AC644AC3415D5AC1AEC958D70F651A5C85561CDD79E0F4B713D43117332A8536A251F4FB48800076AB01
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s....s...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.925547915629603
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDklU8gl8l/E7Rysh3:SBtkJYlU8g8l/A9
      MD5:213DE4A1ECC8A496153A51F4B2D263DB
      SHA1:378FAE5458D865287F39894A67342711FD28EF45
      SHA-256:6C119D44F243C92115286A9A360648640C7CEB0949EEAD9CD823202168389606
      SHA-512:A09E5EACB5F967884DCBB23722DE3AEBEFB976971911F4D330CE9F9A1DBFB60A9560EC6BA4C7D1CF4DA7D0B6BE389484717B55B65D3AC6AA12136E1109835E7C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................R..s..z.h._.H.a.n.t._.M.O...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):10896
      Entropy (8bit):4.848304799348323
      Encrypted:false
      SSDEEP:192:EFugFaBLsBkqhFjbD/uZnxd4q6DN6W+qG0RxKw5jmieQ3IXkkHJ61D:cuiiLseiFfD/u5xd4q6DN6W+uRxKRyYc
      MD5:D04534CBE1DF91398D60A89FEB773C3D
      SHA1:FB1E3D2FCBE3D83B70344F0445973F5DE4449096
      SHA-256:788C5AA080BCD6296C7F8F980A37524D449A71F5D6736E9DB9D8B1D5AF2FE9A7
      SHA-512:7CBF63A16B0A063D5BE87526AF58A844DB2A0CEF27463C2A01F852CDFB2138F5E0941C146676F5BD02054CEA095E60E7683E3857E758E58EBBCF9D95628803EB
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................`...R..s..I.-.B.G.N...i.s.i.-.H.a.n...i.z.i.m.i.l.i...o.k.o.s.i.k.o...i.s.i.-.T.h.a.i...i.s.i.-.A.k.a.n...i.s.i.-.I.g.b.o...i.s.i.-.M.a.r.i...i.s.i.-.U.r.d.u...i.s.i.-.G.r.e.e.k...i.s.i.-.T.a.m.i.l...I.k.h.a.l.e.n.d.a...I.k.h.a.r.e.n.s.i...i.-.E.n.g.l.i.s.h...i.s.i.-.G.u.s.l.i...i.s.i.-.I.r.i.s.h...i.s.i.-.K.o.n.g.o...i.s.i.-.M.a.l.a.y...i.s.i.-.W.a.r.a.y...{.0.}. .. .A.l.l...i.s.i.-.A.r.a.b.i.c...I.z.i.n.o.m.b.o.l.o...U.l.i.m.i.:. .{.0.}...a.m.a.s.i.m.b.u.l.i...i.s.i.-.A.z.e.r.i.a...i.s.i.-.F.r.e.n.c.h...i.s.i.-.G.e.r.m.a.n...i.s.i.-.K.y.r.g.y.z...i.s.i.-.N.e.w.a.r.i...i.s.i.-.P.o.l.i.s.h...i.s.i.-.Y.o.r.u.b.a...H.l.e.l.a. .k.o.n.k.e...i.-.F.u.l.l.w.i.d.t.h...i.s.i.-.A.l.b.a.n.i.a...i.s.i.-.A.r.m.e.n.i.a...i.s.i.-.B.e.n.g.a.l.i...i.s.i.-.B.u.l.g.a.r.i...i.s.i.-.C.h.i.n.e.s.e...i.s.i.-.F.i.n.n.i.s.h...i.s.i.-.G.a.l.i.c.i.a...i.s.i.-.H.a.i.t.i.a.n...i.s.i.-.K.o.n.k.a.n.i...i.s.i.-.K.u.r.d.i.s.h...i.s.i.-.P.e.r.s.i.a.n...i.s.i.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2808
      Entropy (8bit):5.678019583191219
      Encrypted:false
      SSDEEP:48:rcHAlKB1d8GlD48r0l/gh454L0cl4LcBXqhuH/HyJ2JO6HmXdm5:ggWVm8gdsdl4wXqT+OQ95
      MD5:B7A53C5BF8FFFEBD3B3A3575E406F2AF
      SHA1:EBB6199CADAE6F12F9C4714B28115FEEDB277B61
      SHA-256:CD084B89A2E2A83CCC11D876DAAE11FF1D0366B8F67A4DEC2EDFBE0716C3C531
      SHA-512:C6FB7908DCCC1BD3B14FDEF7A3AB97DFBC6BD2078DC35E17D1CC8C5D5EC799DA3C544B0F8469DDB054DA33532FB963F11CA85331FE413D1C9A14887A1006334F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................+................M.e.y...Z.o.m...A.o.g...J.o.l...J.o.n...O.r.a...A.l.a.h...A.l.a.k...A.l.a.r...J.o.n.a...Z.o.m.a...A.n.i.o...A.l.a.t.s...J.o.l.a.y...A.n.d.r.o...O.m.a.l.y...T.a.o.n.a...A.p.r.i.l.y...M.a.r.t.s.a...V.o.l.a.n.a...A.l.a.h.a.d.y...J.a.n.o.a.r.y...O.k.t.o.b.r.a...M.i.n.i.t.r.a...A.l.a.r.o.b.i.a...A.s.a.b.o.t.s.y...D.e.s.a.m.b.r.a...F.e.b.r.o.a.r.y...N.o.v.a.m.b.r.a...S.e.g.o.n.d.r.a...A.l.a.k.a.m.i.s.y...A.o.g.o.s.i.t.r.a...S.e.p.t.a.m.b.r.a...H.e.r.i.n.a.n.d.r.o...R.a.h.a.m.p.i.t.s.o...A.l.a.t.s.i.n.a.i.n.y...A.l.o.h.a.n.. i. .J.K...A.o.r.i.a.n.. i. .J.K...[.c. .q. .u. .w. .x.]...T.e.l.o.v.o.l.a.n.a. .f.a.h.a.r.o.a...T.e.l.o.v.o.l.a.n.a. .f.a.h.e.f.a.t.r.a...T.e.l.o.v.o.l.a.n.a. .v.o.a.l.o.h.a.n.y...+.[.A. .B. .D. .E. .F. .G. .H. .I. .J. .K. .L. .M. .N. .O. .P. .R. .S. .T. .V. .Y. .Z.]...A.[.a. ... ... .b. .d. .e. ... ... ... ... .f. .g. .h. .i. ... ... ... .j. .k. .l. .m. .n. ... .o. ... .p. .r. .s. .t. .v. .y. .z.].....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):1688
      Entropy (8bit):5.056917531863066
      Encrypted:false
      SSDEEP:48:rk2pmjsSeNjpr2E6DDMxSxVxo5+c9EzuxEzV0lDOXKzFeGXK2EyEZpl0ezeCR:rkemjKNjpqE6PMxSxVxo5+c9ESxEp0k/
      MD5:EAD5D7580E3C134B0111067E96716565
      SHA1:C68B589B9C15E1D6A38A826608FF3A4C2B084EA4
      SHA-256:B9F60530043A737B639276EF9CE5BB108B0132159E7377F704C0716D56767E05
      SHA-512:5D879FD1ABC8CC928C4525D495ABD1B421B309E6B7C79B811D8A929F4F4DDB79CE37FBBCD23DFC1A9B5665BFA5842E22DD0291303C4293CF52A05A8812A4A70E
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................P........H.Y...Y.Y...A.r.a...C.h.e...K.u.m...K.w.a...M.o.c...M.o.j...N.a.n...R.a.r...T.i.s...U.n.a...Y.e.l...i.s.a.a...y.a.k.a...m.w.e.r.i...S.a.b.a.t.o...l.e.l.. l.o...m.e.. l.l.o...n.i.h.u.k.u...k.a.l.. l.a.i...n.. c.h.a.n.a...w.i.c.h.i.s.h.u...i.s.e.k.u.n.d.e...A.r.a.h.a.m.i.s.i...m.c.h.o.c.h.i.l.. l...Y.o.p.i.a. .y.e.s.u...i.w.i.k.i. .m.o.c.h.a...H.i.n.a.p.i.y.a. .y.e.s.u...M.w.e.r.i. .w.o. .k.u.m.i...M.w.e.r.i. .w.o. .n.a.n.e...M.w.e.r.i. .w.o. .s.a.b.a...M.w.e.r.i. .w.o. .t.i.s.a...M.w.e.r.i. .w.o. .k.w.a.n.z.a...M.w.e.r.i. .w.o. .u.n.a.y.e.l.i...M.w.e.r.i. .w.o. .u.n.e.r.a.r.u...M.w.e.r.i. .w.o. .u.n.e.t.h.a.n.u...M.w.e.r.i. .w.o. .u.n.e.c.h.e.s.h.e...M.w.e.r.i. .w.o. .k.u.m.i. .n.a. .m.o.j.a...M.w.e.r.i. .w.o. .k.u.m.i. .n.a. .y.e.l.. l.i...M.w.e.r.i. .w.o. .t.h.a.n.u. .n.a. .m.o.c.h.a...n.i.h.u.k.u. .n.o. .m.w.i.s.h.o. .w.a. .w.i.k.i.........NN....k..)...4.wEy................................!.$.....0............. .'.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):18956
      Entropy (8bit):5.810867234104039
      Encrypted:false
      SSDEEP:192:IHiKBMPHKIb6qyMQo2uvNsXiOn019ZB9eu6WfbC4ffUR5QYqbLTZF00DrYc7iYly:wIbW6NsXiH3rjC4KQYARfzly
      MD5:84282F62A1AA229A48F931C7018D2C87
      SHA1:9C20DB16599E668A275850C5414FA7164D3CF24F
      SHA-256:C0C7AB86A76C399B80795BA2B5DF138C3A25BC407EA4ED7FC1F0FA3341FA93BF
      SHA-512:AF63B8AB19CDFC3BF041C559887ED3C2BAFFF1CDAA521D7B72F55077352F1E124C7933735EB7CC900088E158B72F253889AEF5DBCAC96A2A9B871F76603AB418
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................b.. .<......{...{...V.....<.i........m...k...l...n...o.......6.......g.g...g.h...g.i...g.f.....G.....5...&.G...6.A...&.A...6.....8.............A.....B...!.?...(.K...+.G.....>...8.>.........$.?.j.....B.(...$.?.0...$.G.0...$.L.$...*.L.7.....>.....$.>.8...........$.?.g...$.?.h...$.?.i.....?.....0.......0.5.?...6.(.?...8.+.....8.+.0...8.G.......>.2.....>.!.../.A...0.../.A...1.................>.0.....&.>.0.....,.>.(.....7.>.".....*.?.*...../.>.0.....2.A.2.....A.2.H...$.K.,.>...(.>.8.@...*.9.>.....,.>.,.>...8...>.3...8.G.(.G.....0...9.....>.(.G...'.M.5...........3.....K.9.....0...>.....0...>.,...H.-.m.m.../.B...8.../.B...G...9.>. .0...9.C.&./...-.>.&.M.0.......*.B.........6.?.0.....H.$.M.0...$.>...A.....$.?.6.0.@...$.G.5.G.$...&.A.*.>.0...(.?.8.>.(...*.>...(.>.....G.9.G.0...6.G.5.>.$...8.?.5.>.(...9.>.$.K.0...9.G.&.>.0.....0.0...9.....?.....B...9.>. ...A...9.>. .......9.>. .8.K.....8.*.B.......*.M.0.?.......M...K.......8.M.....!.?.8.G.........0.>.......K.9.0.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):220
      Entropy (8bit):4.5062548838343375
      Encrypted:false
      SSDEEP:6:SvGfCllKtu1/tY+6oxf6224LyPqhUG/oX0FAQnUqN:jmQtu1D1f6sWPTG6GUqN
      MD5:EDBCCF817D5DBD629FB8596125B49775
      SHA1:56C2FF31B97882EBCDD4BF34050583826C5AE6B1
      SHA-256:80B4FA07CF54225E5940E6C8D1F515302D8274960DA296C9B51A0C286DA23F69
      SHA-512:0309D7659F088AAFDD9B8D2C90005734C13FE4F91F83568E62085C5BDC5D86D3A976E124A64031A8799F47CD38F25E2F3B05314B8250265D34E7CCAE1200A285
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................*.. ......../.../........................Y4......NN.....h.B7w.3DyEyy................h.B7w.3.yW*eh9........................P...P....... ....................`...".. $.. ....o.w. .. ...`&..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):9752
      Entropy (8bit):5.445383449559793
      Encrypted:false
      SSDEEP:192:RKLLE4z7cu7an+pzZv+2AaJONv1LqztvBaTMA9ZfqWiglBYy:RKLwK4DaF9BaoA9VqWNlBZ
      MD5:14378C6F55EA8C017AE94A0CDA1CF27B
      SHA1:B5C1240FCB923C80B2A3C113D396EFBB95F6A73D
      SHA-256:57CDE9931598171C8EF4C48A1B2F0CE44A2798604FB27609D05D2CE19E5E42C6
      SHA-512:F5B1F0EC83ACC5C69EA2D42068586CCC7021CBF0123E122D3A18F5138F5F48065A3CEAF4B42E6837BB2B867B3A01CB157D8B90E9C6AF04EFC0F6BE0A059E2496
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................h.. ........~...~...4.......B........ ...&.m...E.r...S.b...T.l... .m...&.d...A.p...A.w...D.....J.n...L.j...M.j...M.z...N.v...O.b...Q.K...S.t...T.n...W.K... .n...E.r.b...S.i.b...T.l.i...T.n.e... .i.m...&.a.d...&.a.m...Q.E.K...A.w.w...D.i.....F.r.a...L.u.l...M.e.j...O.t.t... .u.n...j.u.m...S.e.n.a...F.r.a.r...|.o.n.a...i.s.s.a...L.u.l.j.u...M.a.r.z.u...M.e.j.j.u...X.a.h.a.r... .u.n.j.u...[.c. .y.]...g.'.a.d.a...i.l.l.u.m...J.a.n.n.a.r...E.,. .M.-.d...A.w.w.i.s.s.u...I.l.-.&.a.d.d...I.s.-.S.i.b.t...O.t.t.u.b.r.u...M.e.t.r.i.k.u...l.b.i.e.r.a.'...s.e.k.o.n.d.a...D.i...e.m.b.r.u...I.l.-.&.a.m.i.s...L.-.E.r.b.g.'.a...N.o.v.e.m.b.r.u...Q.Q.Q.Q. .-. .y...{.0.}. .u. .{.1.}...1.e.l. .k.w.a.r.t...2.n.i. .k.w.a.r.t...3.e.t. .k.w.a.r.t...I.l.-. .i.m.g.'.a...I.t.-.T.l.i.e.t.a...S.e.t.t.e.m.b.r.u...s.i.e.g.'.a. .i.l.u...{.0.}.,. .u. .{.1.}...!.i.m.g.'.a. .i.l.u...4.b.a.. .k.w.a.r.t...m.i.n.u.t.a. .i.l.u...{.0.}. .&.d... .i.l.u...G.G.G.G.G. .M.M.M. .y...W.a.r.a. .K.r.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):14992
      Entropy (8bit):5.553911380584789
      Encrypted:false
      SSDEEP:384:rXWoOPKq0HdI+ukEs4nhyliMJoH2r9kx+GKiSxMMKQ3Wil4q:1Xi5QGil4q
      MD5:3A86006F374C9039ABABF84626068173
      SHA1:B5AE8DEA97D4F93EAAEF82A3EB5AE6AAB2AF625F
      SHA-256:AFC117398E2508DC84F3F6F0766E10260DED0D16DB25F0F2594818E333E621B7
      SHA-512:921A95FBAB345BEE995B6C240D0B98FB5B785875AC3B804006BC1925EFB72A598D46C44433D51BED52BB566957AA6BF8F661E241AADD4A34E8F110566D4D1985
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................V.......:....................!...'...).......................J.....1...!.......0.........../.....1.....0.......1.......:.......:.......:.....-./......./...!...,...!...6.....=...:...../...:...m.y.m.r...'...<.................../.........1.7.........6...!...=.2...!...1.....!.....:...!...-./.....6.....:...!.1.,...:...).../...:......./...:.......1.7.........:...;...!...<.,.8.....1.7.....:.....1.,...<.,...!...:.9...+...$...-.....:...B. .H.:.m.m...c.c.c...1.7...d./.M.J. .E...{.0.}.....:...../...1.0......./...1.0.......6...+...:.........:.9...,...$.....1...1.7...../.6...1...:.......0.../...1.....0...-./...:...........:...,...........!...8.......:...1.7.........0.....:.8.....;...:.8...6......./...>...:.....,.....7.:.....!...0.8...<./...!.../...:...,...!...6...;.,.8...!.,.8.....,.8...$.!...;.-...:.....<.,.......1.8...../...9.....0.8.......0.0.../...1.......0...1.,...-.......0...1.,...:.......:.....:...,.......:.....+.........-./.....:...,.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):53856
      Entropy (8bit):5.901391108627108
      Encrypted:false
      SSDEEP:768:10O6vxFTmBsncJOgSsCzH3rgrPF1upF7DJ03AHhPRjelRP:136vH0qcMgSswgF1u7iAHhPR6r
      MD5:A45E58F36E178B29D487B4D23E53971A
      SHA1:FDAC567626074D20C678DFC0F858C5F2E4402B99
      SHA-256:BB31DD85424A3BA36C90FA7C0BFDFF5B63F91E94E0AA1CC3630A9AB1F8396532
      SHA-512:CE59B53CFE57D586C77DBF0B5C53141E20E0A25D29DB6A6504E90B4A749989B7081A6D458277D40C3F50471548B75E23C4ADCE60AC8276D7AD9230ED7AA6BB5D
      Malicious:false
      Reputation:low
      Preview: ..'........Nrm2................P....i..4...4...4...4...4...4...............X)...g......R....`...e...g..........3irT..E.a-..+.~...@.{.....;.{.....+.Y.......Q.......M...+.+.....6.n.+.......+.1.o...+.....G.g.....".A.~.g.....$.+.^.u.......+.A.a.........U.......+.%.3.s.......+.+.+.+.+.(.+.+.+.+.+.+.+.+.+.+.+.+.+.+.T.+.+...+.+...+...+.+.+...-.m.+.......K.F.+.+.......2.r.....2.r.....2.r.....1.a.....!.T.......F.t.+.+.+.+.......+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.S.`.+...+.+.+.+.+...+...+...+.2.+.+.r.......R.......K.......K.+.......K.......K.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):29580
      Entropy (8bit):6.01533807474763
      Encrypted:false
      SSDEEP:768:elqnsK1s1dSE4kV/AE1GZ555xkKSqH9d8a:el1KCS6A555SU
      MD5:AC2F4EC11C08420A951B944B29CE2429
      SHA1:902078221B3223AB738835C6AF0D68465E34B5B7
      SHA-256:FFA8D90455FEF85E98E8095B99011F9619FD00122682DEB4C22166563C564A78
      SHA-512:6781DFD23CFB4B5361ADBBF192629E801370334D7458F7BDDFE683CC2EE5B7E6FBA4609B211D635B35FD52114415B2CDBA6E79F2E8D0E7F251BE072B4A0EF44E
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................V................O.s...A.a.p...R.a.t...T.u.t...m.e.i...v.g.j...G.e.i.t...H.a.a.n...H.o.n.d...h.e.e.t...k.o.e.l...k.o.u.d...w.a.r.m...A.b.i.b...T.. e.r...S.j.a.....m.r.t.....d.i.e.r...h.a.r.t...n...C.....p.i.j.l...v...C.....v.l.a.g...D.r.a.a.k...P.a.a.r.d...S.l.a.n.g...B.a.b.a.h...T.u.b.a.h...e.r.a. .0...m.n.d. .1...m.n.d. .2...m.n.d. .3...m.n.d. .4...m.n.d. .5...m.n.d. .6...m.n.d. .7...m.n.d. .8...m.n.d. .9...a.v.o.n.d...M.o.e.h.....S.j.a.w.....e.r.a. .1...m.a.a.r.t...B.r.i.t.s...t.o.e.t.s...K.o.n.i.j.n...T.i.j.g.e.r...V.a.r.k.e.n...A.d.a.r. .A...A.d.a.r. .B...E.l.l.o.e.l...K.i.y.a.h.k...M.a.a.g.h.a...S.j.e.v.a.t...m.n.d. .1.0...m.n.d. .1.1...m.n.d. .1.2...S.j.a.w.a.l...v...g...j.....c.i.j.f.e.r...d.-.M.M. .U...g.e.b.o.u.w...n...C.h.r.....o.p.m.a.a.k...r.e.i.z.e.n...v...C.h.r.....B.a.. u.n.a.h...P.a.g.u.m...n...T.a.m.m.o.e.z...T.i.s.j.r.i.e...m.a.a.n.d. .1...m.a.a.n.d. .2...m.a.a.n.d. .3...m.a.a.n.d. .4...m.a.a.n.d. .5...m.a.a.n.d. .
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):468
      Entropy (8bit):5.158352410801337
      Encrypted:false
      SSDEEP:12:KxXyBXyAy5f1xZWhlcXW+Qn1xZpRmLwMIW6hkdZ:IyRyAy5dxozK9Q1x3RmvIg
      MD5:93AAE249BF77235A65969F2896B6F636
      SHA1:7C8F3F9448A296137D88E6AE75508CF83C9ACE39
      SHA-256:6F94707053552011B89FA20CC3E5DECD505683F864A28D4F4E4B95CC91789C08
      SHA-512:28891A449C88B7EB01F97E6684C48AE8BFAB5F3A9094BD2A327D6A05C88215AD9A77E6190E514722DAA541CC8829AFB6697BF302BB1D42C37520BDED74BD9A21
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................i.. .f......m...m.........f.K........E. .d./.M.M./.y. .. .E. .d./.M.M./.y. .G.....k..)...4mhEy...\...F.F........!........5...\e......$.]o]o....$..6.6.......O.O....$...g.g.g.....$...........k..)...4.MW*eh.)...F.F........!..... ..5..N.'..4....$.]o]o....$..6.6..............$.............$....l.l.l......!..... .0..P5..P:..P?..PF..P......5.....%..PK.. ....!..... .f..Pk..Pp..Pu..P|..P......5.M...[..PX.. ....`...S.. `.. ..o.w......`e..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):88
      Entropy (8bit):2.6835941172605455
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlKelBjlgljl/wP5Fja7n:SBtkJTl4S2
      MD5:1929DEFEE467163B0CD728B6D59F8CE0
      SHA1:8B3D327517678CFC0819CD41B2DD788D7CE93B61
      SHA-256:1F55FECE3C18E10D5A03074F9200546B0C6FC1701A80AB7ADFA7AE230F4DED4E
      SHA-512:2A60AD62F64DE972EFADF999F431BD900A737ED6B1E270DBA214B53013EAFF2960AF4459EE7B4A16D73A90DCD3ECC291C66EBEFC42CD86E706E5316E32B22B32
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.................................n.b._.N.O.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):88
      Entropy (8bit):2.6608668445332726
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlKelBjlgljl/wP5Rja7n:SBtkJTl4S6
      MD5:73403BA652DA107A8E56986D72F5243B
      SHA1:8AB3AF9BDC29BBF3058167DE4BE40FF02A5E6937
      SHA-256:A1AC086A8942F081E82B5AE88CF3F69E501438B15E321733B21C0A5CC7ECC536
      SHA-512:AEFC103FA6264783A2B2DB38A27A3A8A1578F8C0395F322EEC51B718EC21A2FF1316EC03C6998DBC9B623F38488645EBFCE2A032FBAE4A5A03B92E7EB99E0C43
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.................................n.n._.N.O.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):1232
      Entropy (8bit):5.536271573364604
      Encrypted:false
      SSDEEP:24:ng+tAIL3kZtYT7tqi/7t6j6TvMIe06TvMs4YT86zVJEVi:g+tp3otYdZ6+jMIerjMzYT3EVi
      MD5:F3808D807307AAE69A1753E613D76A94
      SHA1:EFD294AF4278290BF7D114FDDF2EF7FB1C05C37E
      SHA-256:B2E5EFFE5DD7FFBFE9319FD40F632D058D718C4969C175D31B232F24967B07EF
      SHA-512:466046BFBB246FBA5BD3B492E11995197F57FF4049FAE2343750C2A4249479C1D0C6A789CCB0D0D23145A078BF14050561FF6B123F5D124AED0F41A79A114BF1
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................!.. .m......,...,.........m..........K.B.Z...K.K.N...K.M.K...K.M.N...K.M.S...K.M.W...K.N.B...K.N.K...K.S.T...K.T.N...O.K.B...O.K.N...O.K.S...O.K.T...O.R.K...S.A.N...S.a.n.d.e...E.s.a.n.d.e...S.h.a.a.h.a...E.i.z.o.o.b.a...K.W.O.T.A. .1...K.W.O.T.A. .2...K.W.O.T.A. .3...K.W.O.T.A. .4...O.b.u.n.a.k.u...E.r.i.z.o.o.b.a...O.k.w.a.k.a.n.a...O.r.w.a.k.a.n.a...E.s.h.a.a.h.a. .z.a........)..k..)...4.wEy..................................!.$...0.............'./..4....eN>...D....L...3..].N..).P.M.N......k..)...4.wW*eh................................!.$...0.............'./..4....eN>...D....L...3..].N..).P.M.N..................4=Y0.=...=(=..>.....>......4..j.R......}..n.1...r..v.~.z..M.......=80.<...<.<1I.<C0t%..l...G.A..4D..4G.G.D.>.J.../...^.a.d.g.............h.~.................H....<..<....Y.........................................<....................P....... ...............P........ ...(.......0.............. ... ........8...;...........>...K...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):14580
      Entropy (8bit):5.68156160232456
      Encrypted:false
      SSDEEP:384:XGw4vvkTeSuGT3pQsLB8vDyNjtXuBqMD/+:X+vvkTeSuGT3pQsLqv0tXuBDr+
      MD5:C065C1817B5FD2811F2850C5298DAE7A
      SHA1:CF3F70C18690ADE405BB3B4F815E7E24E19A686E
      SHA-256:F5111C749FD7D610A60E22D900D445DCBB19CC2BADAABB06786B0C98EB421441
      SHA-512:BA6FB105D83A50E549524200E6AD64D8F7C46E9BDE55AFC186ACAC7AD6FE1AA46099C3D0FDC8B55CAD8B85ACF50C54740CA77324BD29CDD007F3013E5F52B331
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........5...5...V....................6...........A.....A.........!.?...+.G...,.....,.A.....>...8.G.........*.B...8.K.......A.(...0.,.?...6.(.?.....0.9...*.6.A.....?.........?...8.G.......A.0.A.....0.0.9.....0.(.?.....0.,.?...o.r.y.a.......M.......(.M._...6.0.@.0...9.C.&._..._.A...G.......7.M.......A.2.>.........M...3...6.A...M.0.....0.0.0.9.....0.0.(.?.....0.0.,.?...$.M.0._.........K...?.....$. .8.K...*.$.>...>...*.A.0.A.7...,.?.,.?.'.....9.?.3.>.../.K.!.<.>.....*.M.0.G.2.....0.0.0.(.?.....0.0.0.,.?.....0...M.0.?.....9.?. .8.K...9.>...M...>.....>...M...?.....$. .,.A.'.....$. ...>.8.....$...>.2.?...*.&.>.0.M.%...,.M.0.G.2.M.../.>.$.M.0.>...8...6.K.'....._.A...8.M.. ......M...K.,.0.....>.(.A...0.@...(.-.G...M.,.0...+.G.,.C...0.@.....>.0.M...M.......0.0...M.0.?.....9.?. .,.A.'.....$. .0.,.?.......$. .6.(.?.....{.0.}. .&.?.(.....9.?. ...>.8.....M.0.@.!.<.>.....$. .,.0.M.7.....$. .,.A.'.......$. .8.K.......*.>.#.?.*.>.....8.M...>...2.?...0.0.0. .9...>.0.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):17376
      Entropy (8bit):5.864006114762211
      Encrypted:false
      SSDEEP:192:2uZ0sDRJM4RfEfzbfYPEDLquOn9wFPOU19bxvrcfi2F4ghuuQNxm4BYx7y755nL5:2w0IRJ5ERWub9Ii2FvhuuQNc4BG7YqMN
      MD5:3955A45BD6CD23FBBB5E84843E3B680E
      SHA1:50CA52EDA3A8C758526D25E0FB6A140E13952AB1
      SHA-256:D940D24BC363B18733F4A5FC68DDD96BBCCF765704DB01B75A714F44E20DE93C
      SHA-512:CC0D7F7D0902E6A04BD26A76E959A37B4D6AFF01B77500ECD03E49442DA0A3ADBAA1A9E978965D3ED396B5CDBD3592543CFA05540D1682C8F58FF22316448003
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................V....................i...j...k...l...m...n...o.....5.........g.g...g.h...........(.....A.....B...+.<.....>.....p...5.@...8.K...g.f.....p...!.G.......&.0.....q.......G.$.....B.(.....G. .....?.0...*.K.9.....>.....8.@.(...9.>.\...9.A.#...&.8.p...(.5.p...+.<.0...,.A.q.....p.....0...,...8.$.p...8.+.....8.+.0.....p.......0.$.....G.!...&.?.2...8.<.....9.K.0...9.G...0.....>.2.0.....>.2.1......./.0.....*.H.*.....,.>.(.....q.8.B.....2.A.2.....@.........q.$.......G.5.......K.......$.K.,.>...+.q...#...,.>.,.>.....>.0.......G.9.0.....q...0...8.>...#...9...2.G...9.H.!.0...-.2...G.....?.p.....8.>...>...8.p...$.......$.B.......8.$.....A.2.>...0.>.......0.>.......8.<.......8.<.>.....g.u.r.u.....p.!.>.....p.!.G...*.L.&.>...,.#.$.0.....L.8.....5.?.q.%...8.0.@.0...8.<.>.....8.5.G.0.G...0.>.$.@.........<.>.0.....&.0. .I.....8.+.p.!.....K.!.0.!...$.>.9.8.8...(.?.8.>.(...(.G...<.@...*.>...(.>...,.>.9...(...-.>.&.K.......H.8.0.>...5.H.8.>.....8.<.G.5.....8.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.870450165586334
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDklU8gl8l/6nEoMx/E3:SBtkJYlU8g8l/f5Z4
      MD5:4F503FC7E15796F5859820FFD974D465
      SHA1:B9BEFED1CD772E3A79A6061C80CFB8E20F197950
      SHA-256:AD2AAAD02567047B612355694D4CD372D941465E69343D2455EAB6BBE5F2C75A
      SHA-512:19864CB9B1845E94008FD3D0D21F486BA9F64BF99A3E7B53AFB2048105D97E796217BBF416D09EDAADD88F92B2CC95E6787D54BEF7D4D8C917CF2B70480BC20B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.................................p.a._.G.u.r.u._.I.N...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):9048
      Entropy (8bit):5.9844525393082115
      Encrypted:false
      SSDEEP:192:LPsb7j7bKfIHLPLsXYmDOcr9vALALr4bxnxxND0CZ8H:L4z+gxhLAL6f+
      MD5:4380FEB3B2EB10293C94823E470BAAB2
      SHA1:CF1090D3504DA519805DC5A13A4227D9CF0B4E66
      SHA-256:4D70C5C2D9373474A07D279F6A91036962A13B5AE64C808C30A68899F31E5854
      SHA-512:AA14EFE80C74FE8E35861BAF03F61035A757F2FFD6892940FCB9810BDFB33FF1804E3D0D9D9FE1FB70C60DA47B72190CAF2CD655CC4C4C60F481203671A11B43
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................V...............E.......(...D...E...*.D.G...H.......~...1...2...G...9...~.....J.2...:...E...../.H.F.....:...H.....J.H.F.....1.(.J.9...2.E.1.....:.H.......E...G.'...5.A.1.G...(.J.1.:...,.H...G...D.H.(.G...F.(.'.*...H.,.H./.....F.(.F.../.1...F.......D.1.F.....,.E.'.9.G...,.F.H.1.J...1.'.,.'.(...D...F./.....~.'.H.3.'.....F...'.......J.*.1.'...+.'.F.J.G.../.B.J.B.G...E.J.'.4.*...*.F.B.J.7...4.E...1.....E...|.1.....H./.'.F.......'.1.H.......F...(.*.......J.F.G.........'.~...H.J.3.'...'...~.J.F...F.....'.3.'./.G.'...'.3.H.J.F.'...(.G.'./.1.'...,.J.'.3.*.'...3.D.H.'.:.G...E.1.:.H.E.....(.D. ...'.D...A.(.1.H.1.J...'...E.H.,.....A.9.'.D.J.*...E.*.A.1.B.G...F.'.1...F.G.....'.1.*.J...'...-.D.'.D. .-.,...1.(.J.9. .I.I...3.1.'.H.'.F.'...:.(.1...H.D.....3...~.*.E.(.1...(./.D.H.H.F.....(.1.J.*.'.F.J...(.J.1.:.H.F.G...:... .,.'.E.H...A...(.1.H.1.J...E.3...../.D.....|.H.F. .F...G...~.1.H.3.....'.D...,.E.H.E.'. .I.I.../.'.D.B.'.9./.G...~.G.'.D...H.F.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):1160
      Entropy (8bit):4.960794057853641
      Encrypted:false
      SSDEEP:24:v4sMPswpOVz+4Cc4BfqmP/obXMx8dRipXXVThx7dzu8Hl1m:jeswoETc4fqs/WMadkpXXVxJl8
      MD5:68477842628D434CFCE58920047AA144
      SHA1:BD31ADAEC756D2624B4E0D33AD138E25D8B299CC
      SHA-256:ED511E99E287B4E7D6F72562CC2A4C874BD9CC24915C086A4AAC3BCD298854C9
      SHA-512:0DA3182D55786F0494D3691E11972A582B98392FE86B3DC901A98649B854FB301C891EA2D072F4D3021D983316DE7DB768FFA45F4197E359335DD09B4F224F02
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .................................1.(.J.9...,.E.'.9.G...1.'.,.'.(...4.E...1.....-.D.'.D. .-.,...1.(.J.9. .I.I...E.3...../.D.....,.E.H.E.'. .I.I.../. .5.A.1... ./.../.'.D.B.'.9./.G...[.. .. .. . ]...{.0.}. ...'.D. .E.........(... .H.'.|.F.G. ...H.D...{.0.}. ...'.D.G. .E........./. .E.J.'.4.*... .'.H.F.....~.G. .{.0.}. ...'.D. .......~.G. .{.0.}. ...'.D.H.F.H. ......./. .E.J.'.4.*... .'.H.F... .H.1...../. ...*.J..... .'.3.J.'. .3...1...~.|...{.[.N. .P. .O. .K. .M. .L. .Q. .R. .T. .p. .". .'. .#. .!. .(. .~. .*. .|. .+. .,. ... ... ... .-. ... ./. ... .0. .1. ... .2. ... ... .3. .4. ... .5. .6. .7. .8. .9. .:. .A. .B. ... ... ... .D. .E. .F. ... .G. .). .H. .$. ... ... .J. ... ... .&.]......h.B7w.3....L................................................................".-...A.........................../...../...../.....J.........J........J.........J........J.........J..........L.......Z.......g.............. ... ..H.... ..`........ ... ........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1470892603744245
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllpxlRhstP9hGn:SvMMZhstWn
      MD5:1EBD2CF7B1B1688EDBA5E6481651878D
      SHA1:D7475C1E2105A5316F89BAD639102A22E59E8206
      SHA-256:8840ADEBC3ABC62843F8E6350F2E28528A3CA15D65FA9979BED3BF44566867A9
      SHA-512:208EF55200983034D2E782B061C3C065E60832CB443D5B4CFDBE9297D338E9867089B7F26FD2A7BD7C25BDD11E8B5C7C7BDAA77A409DC679A931256CA038AA0A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.....................................o.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1470892603744245
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllpxlRhstP9hGn:SvMMZhstWn
      MD5:1EBD2CF7B1B1688EDBA5E6481651878D
      SHA1:D7475C1E2105A5316F89BAD639102A22E59E8206
      SHA-256:8840ADEBC3ABC62843F8E6350F2E28528A3CA15D65FA9979BED3BF44566867A9
      SHA-512:208EF55200983034D2E782B061C3C065E60832CB443D5B4CFDBE9297D338E9867089B7F26FD2A7BD7C25BDD11E8B5C7C7BDAA77A409DC679A931256CA038AA0A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.....................................o.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):7612
      Entropy (8bit):5.700235005775752
      Encrypted:false
      SSDEEP:192:zbdt8C1Y3QjaFpJF2YYyiiKWkqtWEfYCg6c:5n6tiiQ5gc
      MD5:2E275A6E4C3F7184E8D9D6DC8B097126
      SHA1:A23F12E961EDB0A6DA20B54000013F173BE04E77
      SHA-256:BE06000773B6585D1419BEDB574471BDB18A9C34E71AB90A23BD19FFE12D992B
      SHA-512:599F2AB9D93E01254820DACA7E73E7F69F64664F437009792A14AA73A44141311F58384F9AD85A72007D2F68A40A38384522CD59F5DE8EFB9556B1EB68077927
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................Y.. ........g...g...B.......Y........X...d.C...D.o.m...J.u.e...M.i.....V.i.e...D.a.y...D.i.c...E.n.e...p.a.q.a.r.i.n...k.a.y. .h.o.r.a...-.{.0.}. .L.u.n.e.s...+.{.0.}. .L.u.n.e.s...d. .M.M.M. .y.,. .G...h.a.m.u.q. .w.a.t.a...k.a.y. .m.i.n.u.t.o...k.u.n.a.n. .w.a.t.a...q.a.y.n.a. .w.a.t.a...-.{.0.}. .J.u.e.v.e.s...-.{.0.}. .S...b.a.d.o...+.{.0.}. .J.u.e.v.e.s...+.{.0.}. .M.a.r.t.e.s...+.{.0.}. .S...b.a.d.o...k.u.n.a.n. .L.u.n.e.s...q.a.y.n.a. .L.u.n.e.s...h.a.m.u.q. .L.u.n.e.s...h.a.m.u.q. .k.i.l.l.a...k.u.n.a.n. .k.i.l.l.a...q.a.y.n.a. .k.i.l.l.a...-.{.0.}. .V.i.e.r.n.e.s...+.{.0.}. .V.i.e.r.n.e.s...h.a.m.u.q. .J.u.e.v.e.s...h.a.m.u.q. .M.a.r.t.e.s...k.u.n.a.n. .J.u.e.v.e.s...k.u.n.a.n. .M.a.r.t.e.s...k.u.n.a.n. .S...b.a.d.o...q.a.y.n.a. .J.u.e.v.e.s...q.a.y.n.a. .M.a.r.t.e.s...q.a.y.n.a. .S...b.a.d.o...{.0.}. .s.e.m.a.n.a.p.i...h.a.m.u.q. .S...b.a.d.o...h.a.m.u.q. .s.e.m.a.n.a...k.u.n.a.n. .s.e.m.a.n.a...q.a.y.n.a. .s.e.m.a.n.a...Q.a.y.n.a. .V.i.e.r.n.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):88
      Entropy (8bit):2.64671783887604
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlW/lRl/jlklbl+3N/lnPn:SBtkJGtaaPn
      MD5:AA8A7AA673D89EF3789A8F51E0A80829
      SHA1:052FC49617344392438BD75F84E6F7662C50D294
      SHA-256:0C3E87EC57077F2273433A6859EA6DDD7AFC5B2A272E475EDA076833239882C5
      SHA-512:B96A6BF5258AF5D6EE582E2EF722F31017DC8FE8CAAF92A912AADB4E38E10645F451FCCAB8FC5EE95B48DF52A2A9E760F12C4255EC80B03BEF791C6551227CB5
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................%%ALIAS...a.r..... .....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2724
      Entropy (8bit):3.8125465320367646
      Encrypted:false
      SSDEEP:24:W2aPeNfBSfxkhrHNpVMnRzklEfOcTJmPm58mdJjRXExJVSfRbQuM1uMxg4WFLsdN:UPeWsTedJur0JjRqJVSfRMuuuKg4WmP
      MD5:821396B7A9D6576E8990CE5BD73F877D
      SHA1:3ABFF51745D30E34FDFBF962A996C9471D9C6C78
      SHA-256:DAD4F85C45A47C1C5A79A71E297EB80DA2F08A1E6D61DF3E372F8056AAC86943
      SHA-512:75500CFCF13A4A55F08C327E972AA292108A6C27B7CA5EDCFEE4E4D16835A522FA290B6F05749B46D13D12B41E0DD28AC3D3201D3C08EE53CC746EA6427526C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................RBNFRules.SpelloutRules.Version...2.:. .d.v.a.;...2.:. .d.v.e.;...3.:. .t.r.i.;...5.:. .p.e.t.;...0.:. .n.u.l.a.;...6.:. .a.e.s.t.;...8.:. .o.s.a.m.;...1.:. .j.e.d.a.n.;...1.:. .j.e.d.n.o.;...2...1...2.7...2.2...7.:. .s.e.d.a.m.;...9.:. .d.e.v.e.t.;...1.0.:. .d.e.s.e.t.;...4.:. ...e.t.i.r.i.;...x...x.:. .=.0...0.=.;...1.:. .j.e.d.i.n.i.c.a.;...-.x.:. .m.i.n.u.s. .>.>.;...1.2.:. .d.v.a.n.a.e.s.t.;...1.3.:. .t.r.i.n.a.e.s.t.;...1.5.:. .p.e.t.n.a.e.s.t.;...1.0.0.:. .s.t.o.[. .>.>.].;...1.1.:. .j.e.d.e.n.a.e.s.t.;...1.4.:. ...e.t.r.n.a.e.s.t.;...1.6.:. .a.e.s.t.n.a.e.s.t.;...1.8.:. .o.s.a.m.n.a.e.s.t.;...1.7.:. .s.e.d.a.m.n.a.e.s.t.;...1.9.:. .d.e.v.e.t.n.a.e.s.t.;...6.0.0.:. .a.e.s.t.o.[. .>.>.].;...2.0.0.:. .d.v.e.s.t.a.[. .>.>.].;...3.0.0.:. .t.r.i.s.t.a.[. .>.>.].;...5.0.0.:. .p.e.t.s.t.o.[. .>.>.].;...5.0.:. .p.e.d.e.s.e.t.[. .>.>.].;...x...x.:. .<.<. .z.a.r.e.z. .>.>.;...2.0.:. .d.v.a.d.e.s.e.t.[. .>.>.].;...3.0.:. .t.r.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):8256
      Entropy (8bit):3.6514733298145963
      Encrypted:false
      SSDEEP:192:MORhOM+Zr8qMa9bdTccODcImjrzUfB7eeeperKGL5sLQHoCA3M8P2+F9vQFFdsYA:MORhOM+Zr8qMa9bdTccODcImjrzUfB7W
      MD5:CC029FAF0B35257C9BC280F6C49E5AAF
      SHA1:6E0DC67FB2C8AF385D57AC643B9E5F28407DD149
      SHA-256:323F889FD6976D0D64A659218BA951ADB53348BF8323794990708E15F055467C
      SHA-512:415BFD4E3497EFD23752DA9B6E5D1FEC40770C721A851BC0ADB196393DBAE03BC50C1428DA6896041618FDF89108DDF8B38C6AF7227CF41E27E9E81ED52CE838
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................RBNFRules.SpelloutRules.Version...0.:. .e.;...0.:. .t.e.;...0.:. .d.e.;...1.:. .e.n.;...1.:. .e.t.;...2.:. .t.o.;...9.:. .n.i.;...0.:. .n.u.l.;...1.0.:. .t.i.;...3.:. .t.r.e.;...5.:. .f.e.m.;...7.:. .s.y.v.;...4.:. .f.i.r.e.;...6.:. .s.e.k.s.;...8.:. .o.t.t.e.;...0.:. .n.u.l.t.e.;...1.2.:. .t.o.l.v.;...2...1...2.7...2.2...2.:. .a.n.d.e.n.;...2.:. .a.n.d.e.t.;...5.:. .f.e.m.t.e.;...1.:. .f...r.s.t.e.;...%.%.o.r.d.-.e.-.c.:...%.%.o.r.d.-.e.-.n.:...1.8.:. .a.t.t.e.n.;...3.:. .t.r.e.d.j.e.;...4.:. .f.j.e.r.d.e.;...6.:. .s.j.e.t.t.e.;...9.:. .n.i.e.n.d.e.;...%.%.o.r.d.-.d.e.-.c.:...%.%.o.r.d.-.d.e.-.n.:...%.%.o.r.d.-.t.e.-.c.:...%.%.o.r.d.-.t.e.-.n.:...1.0.:. .t.i.e.n.d.e.;...1.1.:. .e.l.l.e.v.e.;...1.2.:. .t.o.l.v.t.e.;...1.5.:. .f.e.m.t.e.n.;...1.7.:. .s.y.t.t.e.n.;...1.9.:. .n.i.t.t.e.n.;...7.:. .s.y.v.e.n.d.e.;...8.:. .o.t.t.e.n.d.e.;...x...x.:. .=.0...0.=.;...%.%.a.n.d.-.s.m.a.l.l.:...1.1.:. .e.l.l.e.v.t.e.;...1.3.:. .t.r.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):7840
      Entropy (8bit):3.77137862592975
      Encrypted:false
      SSDEEP:192:Yft6G3tYGp4JLGL3dQEU8w3uW5xoQ7zqS1tkMLK/yRJSfCvuJIrqFErV4HMCiHR0:6xnp4JLGLNQEU8w3uW5xoQ7zqS1tkMLY
      MD5:F96736364A1510705D95E38827ADE063
      SHA1:CFF0A353A2A86D60A1990A59565D63B5A0D87949
      SHA-256:03DD1121F14C7CBCCA3D474A309A34BEE7776FACD2DB746A28B26EFC8A48B8B6
      SHA-512:004CB0E1BFF063C34641AE604B13650B1B6D891507ADE42793249DE7AB8B1D694A5471C14FEA57D834DA56DEDC9CA2D8B8525D5BB3629DE90C39B50776382755
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................%%Parent.RBNFRules.OrdinalRules.SpelloutRules.Version.....%.%.t.h.:...0.:. .t.h.;...%.%.a.n.d.:...e.n._.0.0.1...1.:. .o.n.e.;...2.:. .t.w.o.;...6.:. .s.i.x.;...%.%.a.n.d.-.o.:...%.%.t.i.e.t.h.:...-.x.:. ..">.>.;...0.:. .z.e.r.o.;...1.0.:. .t.e.n.;...4.:. .f.o.u.r.;...5.:. .f.i.v.e.;...9.:. .n.i.n.e.;...%.%.c.o.m.m.a.s.:...0.:. .t.i.e.t.h.;...1.:. .f.i.r.s.t.;...2...1...3.5...1.3...3.:. .t.h.i.r.d.;...3.:. .t.h.r.e.e.;...5.:. .f.i.f.t.h.;...6.:. .s.i.x.t.h.;...7.:. .s.e.v.e.n.;...8.:. .e.i.g.h.t.;...9.:. .n.i.n.t.h.;...%.%.2.d.-.y.e.a.r.:...0.:. .z.e.r.o.t.h.;...1.0.:. .t.e.n.t.h.;...2.:. .s.e.c.o.n.d.;...4.:. .f.o.u.r.t.h.;...8.:. .e.i.g.h.t.h.;...%.%.c.o.m.m.a.s.-.o.:...0.:. .h.u.n.d.r.e.d.;...1.1.:. .e.l.e.v.e.n.;...1.2.:. .t.w.e.l.v.e.;...7.:. .s.e.v.e.n.t.h.;...1.2.:. .t.w.e.l.f.t.h.;...1.5.:. .f.i.f.t.e.e.n.;...1.6.:. .s.i.x.t.e.e.n.;...-.x.:. .m.i.n.u.s. .>.>.;...1.1.:. .e.l.e.v.e.n.t.h.;...1.3.:. .t.h.i.r.t.e.e.n.;.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):8456
      Entropy (8bit):3.8624830970369954
      Encrypted:false
      SSDEEP:192:YL/zBbubZbRKE/zV7Ksr7fSNqCLenaWdmdQhQ7vN/0ReR+U:Y/zQ9bvZlr7fSNqCLenddCQhQ7l/0ReV
      MD5:7939D34D047E6C7161E1BF695112964E
      SHA1:B5AB319C696A3847E91970D98B1ACCB9C3D16802
      SHA-256:6E42D0A53C0B2BA3F236D6AD4BAD59358DB36677142AE38ABAE39C13EB383E76
      SHA-512:E731C9889510311A3F97EAE82A1606E56581F02255E1EC6A138AB445062A4D4CBD75E206B31E0E9C005202CD2BF9E2D917274AB10CD93E4123CD1379D7FAF4D4
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................6.. ........:...:...........2...RBNFRules.OrdinalRules.SpelloutRules.Version......0.:. ...;...2.:. ...;...4.:. ...;...1.:. .u.n.;...1.:. .I...;...3.:. .I...;...1.:. .u.n.a.;...1.:. .u.n.o.;...2.0.:. .>.>.;...2.:. .d.o.s.;...0.:. .c.e.r.o.;...-.x.:. ..">.>.;...1.0.0.:. .>.>.;...3.:. .t.r.e.s.;...6.:. .s.e.i.s.;...8.:. .o.c.h.o.;...6.:. .s.e.x.t.o.;...1.0.:. .d.i.e.z.;...1.1.:. .o.n.c.e.;...1.2.:. .d.o.c.e.;...2...1...2.7...3.3...5.:. .c.i.n.c.o.;...6.:. .s.e.x.t.a.;...7.:. .s.i.e.t.e.;...9.:. .n.u.e.v.e.;...1.0.0.:. .c.i.e.n.;...4.:. .c.u.a.r.t.o.;...5.:. .q.u.i.n.t.o.;...8.:. .o.c.t.a.v.o.;...9.:. .n.o.v.e.n.o.;...1.3.:. .t.r.e.c.e.;...1.:. .p.r.i.m.e.r.;...3.:. .t.e.r.c.e.r.;...4.:. .c.u.a.r.t.a.;...4.:. .c.u.a.t.r.o.;...5.:. .q.u.i.n.t.a.;...8.:. .o.c.t.a.v.a.;...9.:. .n.o.v.e.n.a.;...1.0.:. .d...c.i.m.o.;...2.:. .s.e.g.u.n.d.o.;...7.:. .s...p.t.i.m.o.;...1.0.:. .d...c.i.m.a.;...1.5.:. .q.u.i.n.c.e.;...1.:. .p.r.i.m.e.r.a.;...1.:. .p.r.i.m.e.r.o.;...2.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):96
      Entropy (8bit):2.767068904684046
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlF12PllvlsltloBk6lY0kEPn:SBtkJuelXo1lzn
      MD5:01AC728B63D66869B5A2D94A2F88B64F
      SHA1:E12801ED14CB0B7BB6252A3666C9C97820F15EE9
      SHA-256:59A741F29DB4FD6792C6B24842F42AA8F9EF4E61C3F9085FDE8B92F29C76960C
      SHA-512:132080285A86E399D3F920F470FAFCF39AC76D5370A492BEC00AF161C2C537E8368335F675E006B2EE64F6FFB02A78423A4BC7BB636342C5B92F13F4AB4C3E39
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................%%ALIAS...e.s._.4.1.9..... .....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):10236
      Entropy (8bit):4.30288241120569
      Encrypted:false
      SSDEEP:192:ryWMULPyUSwVx8gV+mx8H24NTp73TKyjxIsxov9W5xpdwNisjtsbAsctUcwgXAwM:PLRVx8gV+mxM24NTp7Tpk9W5xHwNgAs3
      MD5:197500A0C869F3CA04F2D1C865B8E282
      SHA1:556662FF748B61695076EDE9EA7AA4C06206C460
      SHA-256:C01C8336FA3F17895628B80D52C67195B68630DDA8233B870BAFB1F0D1B1387F
      SHA-512:C41C105D853D40C722961BA0C32411162516A25B68CD49DA7E1393266D77B6C73F05BBE29823FDB70D1779EAD7D447179F8BC50342F6A0209E7F36EE1453D737
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................RBNFRules.SpelloutRules.Version...6.:. .....;...0.:. .......;...1.:. .......;...2.:. .......;...2.:. .......;...1.:. .......;...5.:. .......;...6.:. .......;...7.:. .......;...9.:. .......;...6.:. .........;...7.:. .........;...9.:. .........;...1.0.:. .......;...2.:. .........;...3.:. .........;...4.:. .........;...5.:. .........;...6.:. .........;...7.:. .........;...9.:. .........;...8.:. ...........;...1.0.0.:. .......;...1.0.:. .........;...2.:. ...........;...3.:. ...........;...4.:. ...........;...5.:. ...........;...8.:. ...........;...1.0.:. .........;...1.:. ...........;...2...1...3.8...3.4...2.:. ...........;...3.:. ...........;...3.:. ...........;...4.:. ...........;...4.:. ...........;...5.:. ...........;...6.:. ...........;...7.:. ...........;...8.:. ...........;...9.:. ...........;...2.0.:. ...........;...6.0.:. ...........;...7.0.:. ...........;...9.0.:. ...........;...1.0.:. ...........;...1.:. ...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):88
      Entropy (8bit):2.64671783887604
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlW/lRl/jlklbl+/+GPn:SBtkJGtaDYn
      MD5:10B328EA87427AC0A91DB7AD5D9043DC
      SHA1:34ECD90BE5FFB01A9DF4AFB11DD68D3E6353C709
      SHA-256:137192AB9E551B5215DBE7072638AD3EC74B6B3591BED05665D6243FDAB63AEE
      SHA-512:25C99AD2F4157C7C08430322CD2821FDF1E8CA3DCE8474FC9A2038F690BBC58E09A1E26AB594DD8FCF5BA87548BD3371911E60E6C879D1C7E981517A22E98D4C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................%%ALIAS...i.d..... .....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):3072
      Entropy (8bit):3.6206983228534515
      Encrypted:false
      SSDEEP:48:erYXR/SrQIHRsR2YfmB65iJHJxR0K0i3q12f25kxfcJrVBS2V4C+BY4avakxmG8I:x/qenfeJHJ30KK+NxfcJruCE+ZpPDf
      MD5:B9773C5EA3C7968F4F48C0BF6120E929
      SHA1:1D0E7A8019FDF1FFC29A5424A1D31F82988A5299
      SHA-256:BFA24A298DD628CA101B298A52AF55C72F37B345AAFC7F7720583B1F3A848D08
      SHA-512:52D2D55CAD82BBBE9511573C13102EFE63253D2ADE2CE1BAF2D60CFCD48C21B5B3C9D5EF2F30EC7348AABAD2FB5EDC5E5245FF3A2EAE3606DFEF9AD8A9CE6677
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................RBNFRules.SpelloutRules.Version...0.:. .n.u.u.l.u.;...2...1...2.7...2.2...1.0.:. .q.u.l.i.t.;...2.:. .m.a.r.l.u.k.;...1.:. .a.t.a.a.s.e.q.;...4.:. .s.i.s.a.m.a.t.;...x...x.:. .=.0...0.=.;...1.0.:. .q.u.l.i.n.i.k.;...3.:. .p.i.n.g.a.s.u.t.;...5.:. .t.a.l.l.i.m.a.t.;...-.x.:. .m.i.n.u.s. .>.>.;...2.:. .m.a.r.l.u.n.n.i.k.;...4.:. .s.i.s.a.m.a.n.i.k.;...%.%.n.u.m.b.e.r.t.i.m.e.s.:...1.1.:. .a.q.q.a.n.i.l.i.t.;...3.:. .p.i.n.g.a.s.u.n.i.k.;...5.:. .t.a.l.l.i.m.a.n.i.k.;...6.:. .a.r.f.i.n.i.l.l.i.t.;...1.1.:. .a.q.q.a.n.i.l.i.n.i.k.;...6.:. .a.r.f.i.n.i.l.i.n.n.i.k.;...x...x.:. .<.<. .k.o.m.m.a. .>.>.;...1.6.:. .a.r.f.e.r.s.a.n.i.l.l.i.t.;...7.:. .a.r.f.i.n.e.q.-.m.a.r.l.u.k.;...1.0.0.:. .u.u.t.r.i.t.i.t.[. .>.>.].;...%.s.p.e.l.l.o.u.t.-.c.a.r.d.i.n.a.l.:...1.2.:. .a.q.q.a.n.e.q.-.m.a.r.l.u.k.;...9.:. .a.r.f.i.n.e.q.-.s.i.s.a.m.a.t.;...%.s.p.e.l.l.o.u.t.-.n.u.m.b.e.r.i.n.g.:...1.4.:. .a.q.q.a.n.e.q.-.s.i.s.a.m.a.t.;...1.6.:. .a.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):1608
      Entropy (8bit):4.351115188008445
      Encrypted:false
      SSDEEP:24:WE2SFlNz9zEij/0VZcWftJQh2M5JmvVOaEYmdJm59aoX8ffIp8E:HFlNz/SiWftJQh2CJ+VO+0JqaDIpF
      MD5:5C4C33E736544B8000AB3E420CE0760E
      SHA1:DDC214898D46CD2A61BC52E514C035AD75ED115D
      SHA-256:4866ADDBB0F027D694567820AA80387B2F8D73AD4A2A97625DD7816D3202A2F3
      SHA-512:D8844DCC8A74FFC65149B674774EDAF5B6256BC1EA8A6FCFB09648F693316E16F93C5F55CFABBC48756C627048AC3BAB89E5C7815B0853AEBBD47777A39C08E2
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................RBNFRules.OrdinalRules.SpelloutRules.Version......3.:. .....;...1.:. .......;...2.:. .......;...4.:. .......;...-.x.:. ..">.>.;...0.:. ...........;...2...1...1.9...1.4...5.:. ...........;...-.x.:. ...... >.>.;...8.:. ...............;...6.:. .................;...7.:. .................;...9.:. .................;...0.:. .....=.#.,.#.#.0.=.;...1.0.:. .......[.. >.>.].;...2.0.:. .........[.. >.>.].;...4.0.:. ...........[.. >.>.].;...5.0.:. ...........[.. >.>.].;...9.0.:. ...........[.. >.>.].;...%.%.l.e.n.i.e.n.t.-.p.a.r.s.e.:...%.d.i.g.i.t.s.-.o.r.d.i.n.a.l.:...1.0.0.:. .<.<.. ....[.. >.>.].;...3.0.:. .............[.. >.>.].;...6.0.:. .............[.. >.>.].;...7.0.:. .............[.. >.>.].;...x...x.:. .<.<.. ....... >.>.>.;...8.0.:. ...............[.. >.>.].;...%.s.p.e.l.l.o.u.t.-.o.r.d.i.n.a.l.:...%.s.p.e.l.l.o.u.t.-.c.a.r.d.i.n.a.l.:...1.0.0.0.:. .<.<.. ........[.. >.>.].;...%.s.p.e.l.l.o.u.t.-.n.u.m.b.e.r.i.n.g.:...1.0.0.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2640
      Entropy (8bit):3.7860179628388178
      Encrypted:false
      SSDEEP:48:RGEdE53ED4UurVJRqJ3vqActXcfHjurjuSoCo6:RGKY3i4UurVJcJ3vqAcNcfDsj1oCP
      MD5:F4ABEDC58338889FC6D06BF10AF5E3EA
      SHA1:35212AF034052457F2686E1E0B5D31AB1DE8F2D2
      SHA-256:7BB0259CFAEEE039E9EBF5E558672DE9A2A593B0FEA7FB0568DDA3FAF56E488B
      SHA-512:0863676CA9CBBEAF734EED03B3A8E83B69069E849C3B084931114F5915FB637B83D23A9A17D30F274CF35CC98A10044AE12B4EDA3FF69EF26FE4AAE41BF263D7
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................RBNFRules.SpelloutRules.Version...2.:. .d.i.v.;...6.:. .s.e.a.;...3.:. .t.r.+.s.;...1.:. .v.i.e.n.;...2.:. .d.i.v.i.;...4.:. ...e.t.r.;...5.:. .p.i.e.c.;...6.:. .s.e.a.i.;...0.:. .n.u.l.l.e.;...1.:. .v.i.e.n.a.;...1.:. .v.i.e.n.s.;...2...1...2.7...2.2...2.:. .d.i.v.a.s.;...4.:. ...e.t.r.i.;...5.:. .p.i.e.c.i.;...6.:. .s.e.a.a.s.;...8.:. .a.s.t.o.F.;...9.:. .d.e.v.i.F.;...1.0.:. .E.R.R.O.R.;...4.:. ...e.t.r.a.s.;...5.:. .p.i.e.c.a.s.;...7.:. .s.e.p.t.i.F.;...8.:. .a.s.t.o.F.i.;...9.:. .d.e.v.i.F.i.;...1.0.:. .d.e.s.m.i.t.;...7.:. .s.e.p.t.i.F.i.;...8.:. .a.s.t.o.F.a.s.;...9.:. .d.e.v.i.F.a.s.;...x...x.:. .=.0...0.=.;...7.:. .s.e.p.t.i.F.a.s.;...-.x.:. .m.+.n.u.s. .>.>.;...1.0.0.:. .s.i.m.t.[. .>.>.].;...x...x.:. .<.<. .k.o.m.a.t.s. .>.>.;...1.0.0.0.:. .t.k.k.s.t.o.a.[. .>.>.].;...%.%.s.p.e.l.l.o.u.t.-.p.r.e.f.i.x.e.d.:...%.s.p.e.l.l.o.u.t.-.n.u.m.b.e.r.i.n.g.:...%.s.p.e.l.l.o.u.t.-.n.u.m.b.e.r.i.n.g.-.y.e.a.r.:...0.:. .=.%.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):1732
      Entropy (8bit):3.701304332168578
      Encrypted:false
      SSDEEP:24:Wk/WZlKB2JBEjEoKPJQcwNlJQJmGhpJm58meJvqEj9P2A0Z:WZl62JtPJQcwNlJQJhhpJrJvF9D0Z
      MD5:1460F4EA03CF6115DE2DC70F022C5816
      SHA1:3884E0697F4969D487F19BF5280CD54F0BE611D3
      SHA-256:9C4A65707B6E08B8284BAC29DD1AD122CD813580CF02D804184CFC54BC2F86D9
      SHA-512:A888F8E6F89B03B08A969275C8B870B697EE074655F823E61FB40C4BC86C084974F061A0609037F79C1898FC7186773524674E7F61800FCA10B1C15EE5EAF013
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................RBNFRules.OrdinalRules.SpelloutRules.Version......2.:. .d.u.a.;...1.:. .s.a.t.u.;...3.:. .t.i.g.a.;...5.:. .l.i.m.a.;...6.:. .e.n.a.m.;...1.:. .N.o... .1.;...2...1...4.9...2.4...4.:. .e.m.p.a.t.;...7.:. .t.u.j.u.h.;...8.:. .l.a.p.a.n.;...0.:. .k.o.s.o.n.g.;...1.:. .p.e.r.t.a.m.a.;...x...x.:. .=.0...0.=.;...0.:. .k.e.k.o.s.o.n.g.;...1.0.:. .s.e.p.u.l.u.h.;...1.1.:. .s.e.b.e.l.a.s.;...9.:. .s.e.m.b.i.l.a.n.;...1.2.:. .>.>. .b.e.l.a.s.;...0.:. .k.e.-.=.#.,.#.#.0.=.;...2.:. .k.e.-.=.#.,.#.#.0.=.;...-.x.:. .n.e.g.a.t.i.f. .>.>.;...x...x.:. .=.#.,.#.#.0...#.=.;...%.d.i.g.i.t.s.-.o.r.d.i.n.a.l.:...-.x.:. .."k.e.-.>.#.,.#.#.0.>.;...%.s.p.e.l.l.o.u.t.-.o.r.d.i.n.a.l.:...1.0.0.0.:. .s.e.r.i.b.u.[. .>.>.].;...1.0.0.:. .s.e.r.a.t.u.s.[. .>.>.].;...2.0.:. .<.<. .p.u.l.u.h.[. .>.>.].;...%.s.p.e.l.l.o.u.t.-.c.a.r.d.i.n.a.l.:...2.0.0.0.:. .<.<. .r.i.b.u.[. .>.>.].;...2.0.0.:. .<.<. .r.a.t.u.s.[. .>.>.].;...%.s.p.e.l.l.o.u.t.-.n.u.m.b.e.r.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):4624
      Entropy (8bit):3.732707836468624
      Encrypted:false
      SSDEEP:96:YsqXJG7JKOuw+xojaNE7JtTpCHHjsvJJpmrqoQHN3tCwzsnVkbQ:RsGFKOuw+xojaNEFZpCHHjsvJJpmrqoz
      MD5:77882A56008261A3F1C1B82C4742F04A
      SHA1:74A3A994A98426A4DF69110784CB9615CFAD1CC7
      SHA-256:69023C6711C9E5F709807508D1C3D0D0DD6004CE3B67D5E63775B06817B1B695
      SHA-512:4EF697373D45BD3890F099F84FCF4CCAC5E0FB72D99A7A78A9FB414B73DBA1A33A926B215A7CBB9F6586A13354DB4A099BE8C476B61986D78E198A1ABC627CAC
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................x.. ........|...|...........t...RBNFRules.OrdinalRules.SpelloutRules.Version......0.:. .n.u.l.;...0.:. .s.t.e.;...1.:. .e.e.n.;...6.:. .z.e.s.;...-.x.:. ..">.>.;...1.1.:. .e.l.f.;...2.:. .t.w.e.e.;...3.:. .d.r.i.e.;...4.:. .v.i.e.r.;...5.:. .v.i.j.f.;...8.:. .a.c.h.t.;...1.0.:. .t.i.e.n.;...2...1...2.7...2.2...3.:. .d.e.r.d.e.;...7.:. .z.e.v.e.n.;...9.:. .n.e.g.e.n.;...%.%.2.d.-.y.e.a.r.:...%.%.o.r.d.-.s.t.e.:...0.:. .n.u.l.s.t.e.;...1.:. .e.e.r.s.t.e.;...2.:. .t.w.e.e.d.e.;...-.x.:. .m.i.n. .>.>.;...0.:. .h.o.n.d.e.r.d.;...1.2.:. .t.w.a.a.l.f.;...1.:. .e.e.n...e.n...;...x...x.:. .=.0...0.=.;...%.%.n.u.m.b.e.r.-.e.n.:...0.:. .=.#.,.#.#.0.=.e.;...1.3.:. .d.e.r.t.i.e.n.;...1.6.:. .z.e.s.t.i.e.n.;...2.:. .t.w.e.e.....n...;...3.:. .d.r.i.e.....n...;...1.4.:. .v.e.e.r.t.i.e.n.;...1.5.:. .v.i.j.f.t.i.e.n.;...1.8.:. .a.c.h.t.t.i.e.n.;...1.7.:. .z.e.v.e.n.t.i.e.n.;...1.9.:. .n.e.g.e.n.t.i.e.n.;...x...x.:. .=.#.,.#.#.0...#.=.;...%.d.i.g.i.t.s.-.o.r.d.i.n.a.l.:...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):25220
      Entropy (8bit):3.7264725011803574
      Encrypted:false
      SSDEEP:768:Ih1+wDzFI1ZWX2yrKPeyLRaAoCETlR4BB7P04Q/L+YQYc3G/2qksDYnRRXN05OAS:IhnzFI1Zz
      MD5:2E98F4B0C4F9B87B9EAF9DABBBE909F4
      SHA1:11E45654290B44B19B0A6168ED1219242015EB5A
      SHA-256:8EFD9EDC995E6522DCD7C4698698AC5EE1758D5B89C2F7ED5DCCC3402103B2D1
      SHA-512:C34529A88F44624A44A829AE6265816F49BC43E6B0FBBE9FBC1B9F74FD2E3264A2D71D34B5C0834EC0EE1DCA46F4BE7E1EF4DE489E29B49E20F873DF4F2B156B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................RBNFRules.SpelloutRules.Version...2.:. .d.w.a.;...0.:. .z.e.r.o.;...0.:. .z.e.r.a.;...0.:. .z.e.r.u.;...3.:. .t.r.z.y.;...5.:. .p.i.....;...2.:. .d.w.a.j.;...2.:. .d.w.i.e.;...2.:. .d.w...m.;...1.:. .j.e.d.e.n.;...8.:. .o.[.m.i.u.;...0.:. .z.e.r.e.m.;...0.:. .z.e.r.z.e.;...1.:. .j.e.d.n.o.;...1.:. .j.e.d.n...;...2.:. .d.w...c.h.;...6.:. .s.z.e.[...;...8.:. .o.s.i.e.m.;...1.:. .j.e.d.n.a.;...2...1...2.7...2.2...2.:. .d.w.o.m.a.;...3.:. .t.r.z.e.j.;...3.:. .t.r.z.e.m.;...1.:. .j.e.d.n.e.j.;...5.:. .p.i...c.i.u.;...1.:. .j.e.d.n.y.m.;...3.:. .t.r.z.e.c.h.;...4.:. .c.z.t.e.r.y.;...7.:. .s.i.e.d.e.m.;...1.0.:. .<.<. .>.>.;...2.:. .d.w.i.e.m.a.;...3.:. .t.r.z.e.m.a.;...6.:. .s.z.e.[.c.i.u.;...7.:. .s.i.e.d.m.i.u.;...1.:. .j.e.d.n.e.g.o.;...1.:. .j.e.d.n.e.m.u.;...4.:. .c.z.t.e.r.e.j.;...4.:. .c.z.t.e.r.e.m.;...8.:. .o.[.m.i.o.m.a.;...x...x.:. .=.0...0.=.;...4.:. .c.z.t.e.r.e.c.h.;...9.:. .d.z.i.e.w.i.....;...1.:. .d.z.i.e.s.i...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):17280
      Entropy (8bit):4.238350514170709
      Encrypted:false
      SSDEEP:192:oc+4C2W7kf0W+crMhJf7lJGJGfg6GuqkPB4vrngY:U4A2kJTlYYY6GprnF
      MD5:58AC541781B11DCC8F721CCCCD705366
      SHA1:99D2EA7E7A71E287F36545F68F5589026E3BAA25
      SHA-256:CBD89E41C0C7C95EB88EC3940253E16F55D28F4DB561AE03A8D3CCBFA89CF381
      SHA-512:00E3ACF1D17A5474E8AB4F29EC114DF7F3FAD4C7113181AFACEC8C50137EC866AB498A9578F2779268DC2740DCB5B4D8D928273DAABB4E4406FA24E1F5C9F955
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................RBNFRules.DurationRules.NumberingSystemRules.OrdinalRules.SpelloutRules.Version...0.:. ...;...0.:. .0.;...0.:. .N.;...0.:. .n.;...0.:. ...;...0.:. ...;...0.:. ...;...0.:. .|.;...1.:. .I.;...1.:. .i.;...1.:. ...;...1.:. ...;...1.:. .0.;...1.:. .1.;...1.:. .a.;...1.:. ...;...1.:. ...;...1.:. ...;...1.:. .i.;...2.:. ...;...2.:. ...;...2.:. .2.;...2.:. .2.;...2.:. .b.;...2.:. ...;...2.:. ...;...2.:. ...;...2.:. .j.;...3.:. ...;...3.:. ...;...3.:. .3.;...3.:. .3.;...3.:. .c.;...3.:. ...;...3.:. ...;...3.:. ...;...3.:. .k.;...4.:. ...;...4.:. ...;...4.:. .4.;...4.:. .4.;...4.:. .d.;...4.:. ...;...4.:. ...;...4.:. ...;...4.:. .l.;...5.:. .V.;...5.:. .v.;...5.:. ...;...5.:. ...;...5.:. .T.;...5.:. .5.;...5.:. .e.;...5.:. ...;...5.:. ...;...5.:. ...;...5.:. .m.;...6.:. ...;...6.:. ...;...6.:. .U.;...6.:. .6.;...6.:. .f.;...6.:. ...;...6.:. ...;...6.:. ...;...6.:. .n.;...7.:. ...;...7.:. ...;...7.:. .7.;...7.:. .7.;...7.:. .g.;...7.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):3580
      Entropy (8bit):3.8104436721883586
      Encrypted:false
      SSDEEP:96:iPhTXA6Jur0JjcJVSF72dIEB8j9hxgVqAD0as:MhU0urKjyVSF72dIEB8j9hxgVqus
      MD5:EC42639574648397DCD567F7C42EE2C5
      SHA1:DA9E597605FE0D68DF2EA2B75BBC3A1FE8824E52
      SHA-256:2EE11EDAD8854492F07CB713D82AC77CAE93345FCE997F366634485E5FE2850F
      SHA-512:4FE4EE5C58FB76DA73C6A874EDC06A77F96DD1AFE4A4E208D4C76C210F78EE5822AA82A8C7883A57CD825A8BECD4E1E6E2FC6DC53242C1AC8515BDE08520616C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................s.. ........w...w...........q...RBNFRules.SpelloutRules.Version...0.:. .n.i...;...1.:. .e.n.a.;...2.:. .d.v.a.;...2.:. .d.v.e.;...3.:. .t.r.i.;...5.:. .p.e.t.;...6.:. .a.e.s.t.;...8.:. .o.s.e.m.;...2...1...2.7...2.2...2.:. .d.v.i.j.e.;...4.:. .a.t.i.r.i.;...7.:. .s.e.d.e.m.;...9.:. .d.e.v.e.t.;...1.0.:. .d.e.s.e.t.;...1.1.:. .e.n.a.j.s.t.;...x...x.:. .=.0...0.=.;...-.x.:. .m.i.n.u.s. .>.>.;...1.2.:. .d.v.a.n.a.j.s.t.;...1.3.:. .t.r.i.n.a.j.s.t.;...1.5.:. .p.e.t.n.a.j.s.t.;...1.0.0.:. .s.t.o.[. .>.>.].;...1.4.:. .a.t.r.i.n.a.j.s.t.;...1.6.:. .a.e.s.t.n.a.j.s.t.;...1.8.:. .a.s.e.m.n.a.j.s.t.;...1.7.:. .s.e.d.e.m.n.a.j.s.t.;...1.9.:. .d.e.v.e.t.n.a.j.s.t.;...2.0.:. .d.v.a.s.e.t.[. .>.>.].;...6.0.0.:. .a.e.s.t.o.[. .>.>.].;...3.0.0.:. .t.r.i.s.t.o.[. .>.>.].;...3.0.:. .<.<.d.e.s.e.t.[. .>.>.].;...5.0.0.:. .p.e.t.s.t.o.[. .>.>.].;...1.0.0.0.:. .t.i.s.u...u.[. .>.>.].;...2.0.0.:. .d.v.j.e.s.t.o.[. .>.>.].;...8.0.0.:. .o.s.e.m.s.t.o.[. .>.>.].;...x...x.:. .<.<.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):8276
      Entropy (8bit):3.771984449203231
      Encrypted:false
      SSDEEP:192:66VQU0XJMWXpTNp1GyB3AuZDvNpJlHdXeD2AmAXG8jzuzQ2saKfLKDawAM1p1DII:hSU0XJMWXpTNp1GyB3AuZLNpJl9XeShZ
      MD5:BB198B47D17ADE021BF1C30C33225F6A
      SHA1:A3F69C6713884F2A8E8123C34E50BB16DA175906
      SHA-256:56C8078F0BA9995C3AD4C90D155A1B05AC2E83E57EB4CAB83520981670BF4D36
      SHA-512:3F146BB7B994C47B544939D3587373A0563C8C18E4CFB4B1BD1C1AE0AF207029E8DA4BB8EAAF47EF2AD84F86E7726429701316A233B15EBE8EEBAE579EE4074E
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................RBNFRules.OrdinalRules.SpelloutRules.Version......0.:. .t.e.;...0.:. .d.e.;...1.:. .e.n.;...1.:. .e.t.;...0.:. .n.d.e.;...2.:. .t.v...;...3.:. .t.r.e.;...5.:. .f.e.m.;...6.:. .s.e.x.;...7.:. .s.j.u.;...9.:. .n.i.o.;...1.:. .e.t.t.;...-.x.:. ..">.>.;...0.:. .n.o.l.l.;...1.0.:. .t.i.o.;...4.:. .f.y.r.a.;...8.:. ...t.t.a.;...1.1.:. .e.l.v.a.;...1.2.:. .t.o.l.v.;...2...1...3.4...8.1...2.:. .a.n.d.r.a.;...2.:. .a.n.d.r.e.;...5.:. .f.e.m.t.e.;...0.:. .n.o.l.l.t.e.;...1.8.:. .a.r.t.o.n.;...1.1.:. .e.l.f.t.e.;...1.:. .f...r.s.t.a.;...1.:. .f...r.s.t.e.;...3.:. .t.r.e.d.j.e.;...4.:. .f.j...r.d.e.;...6.:. .s.j...t.t.e.;...7.:. .s.j.u.n.d.e.;...9.:. .n.i.o.n.d.e.;...1.5.:. .f.e.m.t.o.n.;...1.6.:. .s.e.x.t.o.n.;...1.9.:. .n.i.t.t.o.n.;...1.0.:. .t.i.o.n.d.e.;...1.2.:. .t.o.l.f.t.e.;...8.:. ...t.t.o.n.d.e.;...x...x.:. .=.0...0.=.;...1.3.:. .t.r.e.t.t.o.n.;...1.4.:. .f.j.o.r.t.o.n.;...1.7.:. .s.j.u.t.t.o.n.;...1.0.0.0.:. .E.R.R.O.R.;...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):3376
      Entropy (8bit):4.405866321543506
      Encrypted:false
      SSDEEP:96:Svo9u9qDct+kkJoV2UJur0JjcJVS7WD9UTsrks+7gan:p9u9qDctfkJo4qurKjyVS7WpUTsrkn
      MD5:EEA91630C532D6A0B1AA586781C3E2A0
      SHA1:957EA5B1FE419BCA6DE2E3020E8C26EE90B89270
      SHA-256:E0B64AA76A7CD706ABF068A9EA3B804939C2FFD922E1B38E6E57B02C72703984
      SHA-512:4D1AFF63D794896E2171A91CACE250F630479A7152E56AD1CADD66587ADB40BD8BC4179C5216689C69A4735C1C48E95E9889816A6CB8F4E10150ADB01807D9E2
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................@.. ........D...D...........>...RBNFRules.SpelloutRules.Version...2.:. .4.2.0.;...2.:. .4.2.V.;...3.:. .B.@.8.;...7.:. .A.V.<.;...0.:. .=.C.;.L.;...1.:. .>.4.8.=.;...1.:. .>.4.=.0.;...1.:. .>.4.=.5.;...2...1...3.0...6.2...5.:. .?...O.B.L.;...6.:. .H.V.A.B.L.;...8.:. .2.V.A.V.<.;...4.:. .G.>.B.8.@.8.;...1.0.:. .4.5.A.O.B.L.;...9.:. .4.5.2...O.B.L.;...x...x.:. .=.0...0.=.;...-.x.:. .<.V.=.C.A. .>.>.;...1.0.0.:. .A.B.>.[. .>.>.].;...4.0.:. .A.>.@.>.:.[. .>.>.].;...1.1.:. .>.4.8.=.0.4.F.O.B.L.;...1.2.:. .4.2.0.=.0.4.F.O.B.L.;...1.3.:. .B.@.8.=.0.4.F.O.B.L.;...1.7.:. .A.V.<.=.0.4.F.O.B.L.;...x...x.:. .<.<. .:.>.<.0. .>.>.;...%.%.l.e.n.i.e.n.t.-.p.a.r.s.e.:...1.5.:. .?...O.B.=.0.4.F.O.B.L.;...1.6.:. .H.V.A.B.=.0.4.F.O.B.L.;...2.0.0.:. .4.2.V.A.B.V.[. .>.>.].;...3.0.0.:. .B.@.8.A.B.0.[. .>.>.].;...7.0.0.:. .A.V.<.A.>.B.[. .>.>.].;...1.4.:. .G.>.B.8.@.=.0.4.F.O.B.L.;...1.8.:. .2.V.A.V.<.=.0.4.F.O.B.L.;...2.0.:. .4.2.0.4.F.O.B.L.[. .>.>.].;...3.0.:. .B.@.8.4.F.O.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):5360
      Entropy (8bit):3.9325362330462403
      Encrypted:false
      SSDEEP:96:JFkVgrbFCDDebtedcbafD1FA/hJqvwzyk6yoQrre1JHhM0nwl32+lLIwb4Mlpnbn:Jzh2jEqvwzyk6y/rrebHh0l32+l8wUM3
      MD5:FD4A4AFB2120B5B91A253D5C190864B2
      SHA1:53D9E6DECC9BFF43C59C6A6041CDDD9F7226AA2E
      SHA-256:EFB949EDD7C1AC82CB265E08B13C5B083A0F7D17222CEC8B4B54E717007346BD
      SHA-512:875755F8925163115089BF6656F7A2FA578163F11A510E64CD0C16A49D4536F8481B93CD88FAFF0DF3EF0C2263AFDB59E264BA6684806A4947DFE95B92F7272D
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................0.. ........4...4...........,...RBNFRules.OrdinalRules.SpelloutRules.Version......1.:. .;...0.:. ...;...1.:. ..N;...2.:. ..N;...3.:. ..N;...4.:. ..V;...5.:. ..N;...6.:. .mQ;...7.:. ..N;...8.:. .kQ;...9.:. .]N;...1.:. ..X;...2.:. .iQ;...2.:. ...;...3.:. ..S;...4.:. ...;...5.:. ..O;...6.:. .x.;...7.:. ..g;...8.:. .Lc;...9.:. ..s;...-.x.:. ...>.>.;...2...1...4.6...2.4...%.%.n.u.m.b.e.r.2.:...%.%.n.u.m.b.e.r.3.:...%.%.n.u.m.b.e.r.4.:...%.%.n.u.m.b.e.r.5.:...%.%.n.u.m.b.e.r.8.:...1.0.:. .<.<.>.>.>.;...1.0.:. .AS[.>.>.].;...1.0.:. ..b[.>.>.].;...%.%.n.u.m.b.e.r.1.3.:...1.0.0.:. .<.<.>.>.>.;...x...x.:. .=.0...0.=.;...x...x.:. .<.<..>.>.>.;...0.:. .,{=.#.,.#.#.0.=.;...1.0.0.0.:. .<.<.>.>.>.;...2.0.:. .<.<.AS[.>.>.].;...2.0.:. .<.<..b[.>.>.].;...-.x.:. .,{.">.#.,.#.#.0.>.;...x...x.:. .=.#.,.#.#.0...#.=.;...%.d.i.g.i.t.s.-.o.r.d.i.n.a.l.:...%.s.p.e.l.l.o.u.t.-.o.r.d.i.n.a.l.:...%.%.f.i.n.a.n.c.i.a.l.n.u.m.b.e.r.2.:...%.%.f.i.n.a.n.c.i.a.l.n.u.m.b.e.r.3.:...%.%.f.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):88
      Entropy (8bit):2.587503530614347
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlw1ylRl/jlklbl+vKalllkC:SBtkJQ2aRalsC
      MD5:CD838BDE437B8246547E3DA5B56BC92B
      SHA1:7B56EF405386E67AD77E890927ACF9CE8EBA77C4
      SHA-256:BE404D9CC9737C0A22CB01C5FE5ED35C37CD87A22C5DBE18893AF3DCC8946816
      SHA-512:D9C4D18DE93F999801B873680BE8502ED67DA0665C04E3B182AC1A3BB02E34F82C3B6DDCA54BAD84D37D727F030E2934C73A81FBB6D4779D02CED04528E07492
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................%%ALIAS...y.u.e..... ...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):7788
      Entropy (8bit):3.8632384739723844
      Encrypted:false
      SSDEEP:192:qE2BWPzacwQ+HLMJpvuJIrqFE15KYjOb+2+ld8w+vlo4lG30dUri5wXOHpE8rx0P:qE2BWPzacwQ+HLMJpvuJIrqFE15KOOb+
      MD5:831B03DDF3F05162FA43821D898E2663
      SHA1:521967B3BC3134310430D7FCE2B637F2814B906A
      SHA-256:A8FD7EBDF62A3C1A7DC93E6FDF0160B4FEF4F1A3D006A37A2C0940DA86EA5ABF
      SHA-512:E5FA9C147425AC6698F8EA9BBC2C897EC159CF8F45485944DBE1E6EF4389A821B3B9CB914454D84D35DFCF0C5F02F67CBF1374005F23C616DB29AAB005FD6528
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................%%Parent.RBNFRules.OrdinalRules.SpelloutRules.Version.....r.o.o.t...0.:. ...;...1.:. ..N;...3.:. ..N;...4.:. ..V;...5.:. ..N;...6.:. .mQ;...7.:. ..N;...8.:. .kQ;...9.:. .]N;...2.:. ..N;...0.:. ..0;...1.:. ..X;...2.:. .iQ;...2.:. ...;...3.:. ..S;...4.:. ...;...5.:. ..O;...6.:. .x.;...7.:. ..g;...8.:. .Lc;...9.:. ..s;...-.x.:. ...>.>.;...2...1...2.7...2.2...1.0.:. .<.<.>.>.>.;...1.0.:. .AS[.>.>.].;...1.0.:. ..b[.>.>.].;...1.0.0.:. .<.<.>.>.>.;...x...x.:. .=.0...0.=.;...x...x.:. .<.<..>.>.>.;...%.%.c.a.r.d.i.n.a.l.2.:...%.%.c.a.r.d.i.n.a.l.3.:...%.%.c.a.r.d.i.n.a.l.4.:...%.%.c.a.r.d.i.n.a.l.5.:...%.%.c.a.r.d.i.n.a.l.8.:...0.:. .,{=.#.,.#.#.0.=.;...1.0.0.0.:. .<.<.>.>.>.;...2.0.:. .<.<.AS[.>.>.].;...2.0.:. .<.<..b[.>.>.].;...%.%.c.a.r.d.i.n.a.l.1.3.:...-.x.:. .,{.">.#.,.#.#.0.>.;...x...x.:. .=.#.,.#.#.0...#.=.;...%.d.i.g.i.t.s.-.o.r.d.i.n.a.l.:...%.s.p.e.l.l.o.u.t.-.o.r.d.i.n.a.l.:...%.%.f.i.n.a.n.c.i.a.l.n.u.m.b.e.r.2.:...%.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):96
      Entropy (8bit):2.7533913818199895
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlR/Pllvlsltloe1zRqa:SBtkJJelXoeZH
      MD5:B01F5E12A340DAA68ECF97BEE56D319B
      SHA1:0FFEE54D754C18D881CCCDE4E3E62F1D510C4A6B
      SHA-256:288721EEEF5C876ABD385C1CD229ECB72525B1FE396651ADB546CC681ABFD8EB
      SHA-512:0B2745AB2D7E702C06ADAE932E248024ED4903A05A30244C6CFC56E6BC45B0886CF3F3D6231F693A48FDBF454A3BAD44F6FA675B9D7716EEFA53C67303824570
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................%%ALIAS...z.h._.H.a.n.t..... ...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):5716
      Entropy (8bit):4.524867939073992
      Encrypted:false
      SSDEEP:96:2A6ZJ8Fe/VPPOvqy0Seo+xM+rLHAJPg/hE4kqefJ6aAsZOXV19gV81yWelU0kXF7:eLqRvao7SLHABgpEzVh6atZOXb9gekUh
      MD5:2C4812488B86E32A65469F8A00BDF496
      SHA1:BC7F9E55EE1C39CCB3F1973B51FFC7C780C0BB98
      SHA-256:297CBE32B6E0920037DC365944CB981C622A0F1FA4B9AD798BE269BE20CB5AB7
      SHA-512:601DBA2B99AF9FD1636F1553B9F0A9EFCA7F1698158B442490199A2F75F31B1731ACA5DF5078C64E2D14C9BA9129EFEE67289B43EF282B5B9D7DB7C073C67C2A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .8....................8.....5K.y..C.h.....E.d.z.....K.a.t.....M.a.l.....T.u.g.....U.m...n.....l...n...C.h.i.l.....E.n.d...a...E.t.a.l.....F.i.d.z.i...G.a.a.n.....G...b...n...H...e.t.....K.p.[.l.....K...w.[.....K.h.n.y.....L.e.b...a...L...w.o.s...M.a.a.t.....S.i.l...a...S...d...n...T.e.e.k.....T.u.K.g.......l.u.b.....B...l.a.e.n...B...l.e.v.....C.h.a.e.n.....D.z.o.d...n...D.[.n.h.m.....E.k.w.a.d.....F.h.n.l...n...G.a.m.b...a...G...y.a.n.....G.h...l...s...K.a.n.a.d.....K.p.u.l...n...K.u.u.w.b.....L.o.s.h...a...L...t.h.v.a...L.[.b.a.n.....M.b.u.t...n...M...d.i.v.....M...l.a.w.....M...y.o.t.....M...l.o.k.....M...n.a.k.u...M...a.n.m.....N.a.e.d.z.....N...w.u.l.....N.[.k.p...a...S...m.o.w.....T.a.e.l...n...T.a.e.w...n...Y.[.m.[...n...Z.a.m.b...a.....n.d.o.l.......K.g.o.l.......l...k.h.....B...b.a.d...s...B...h.a.m...s...B...l.u.n.d.....B.[.l...l...s...B.[...m.u.d.....B.[...n.h...K...B.h...l.u.n.....D.z.a.m.a.n.....D.z...k.p...n...D.z...m.[.k.....E.s...v.a.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):120
      Entropy (8bit):3.912622054212684
      Encrypted:false
      SSDEEP:3:XCbVSm/tlmdlzpll8l/Vlld0yzlYq4v/6l/qaMF:Sv2Oltll9zl5EaMF
      MD5:A1D6134CC0DEC5125CBA9339D5658781
      SHA1:073953C53A746A9B003B95462F28D5AF00D1A189
      SHA-256:D7BF75F303DF4BB4E8DBA6016E67B6901947C92144129C4540A258FC9175F785
      SHA-512:166F4CA393A3B514918A586861ECDE4B8FF6E3AC081D1E6A806130011F55E15349B47E456111F2355548768FBAF596F86E2CF8AFC935F377AD530B1F49C54E07
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..Q....................Q....5K.y..#.H.1.H.:.H.'.J.....F.].\..QY>.Q.............P.!.`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.9586234771141804
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMwM86E7lz1BsNE:Sv9t6gz17
      MD5:C22EC8E4B84B84647296660688B6D7BB
      SHA1:2FE414FD38932DCBEADACC13175680F8C0ABD8E7
      SHA-256:37FF94DAEF52A8B76ED3DCE758A446BC79EDE3349F84134BEFAA7225C99D58B3
      SHA-512:FFA514030D42EF8975FA25B9A20E94A0DBBE63EDBF9C4DAA74631A8FE0BA1A6FF4552AEBB8C6D69A058E2D71F7D169C498E5A42F8FC06465F1EA61E821C0A15B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P..!....................!....5K.y.......!
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.500123730064915
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/dsp:SBtkJ1li6gml/8
      MD5:3F209B3AA35603DCBB208A74CAA36C86
      SHA1:249DE057005BE697205333ABA0433C5B04653BBB
      SHA-256:F3965E339C622C96879DEE316DE42F9E9F693DDEB7A52FDCEBBA027171F2C86A
      SHA-512:02411AE5728814057E0CA78D850EEA85B3ACA16DFDBEE97A7C01860DA3B82640EEBE60960938C7F64B05D9E9FE8BAE0B826D242E24B33C40024836F716F17E31
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................5K.y........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):5216
      Entropy (8bit):4.526885334594306
      Encrypted:false
      SSDEEP:96:dxWEZi2CmE2x15Q4WtoyJ36LuKI/rHKkXF9D1+DLPb2G:BV2os8s36qr/jtFRIF
      MD5:05A574C06D6947FA65E06359D1AD5A2A
      SHA1:162B3B88B25645B893B571B2ED33BD959520B1BB
      SHA-256:78E71D23578DAD3FD0076FE41BFC6E8DE35DE5B7F3E71683E378C978B2F366CE
      SHA-512:892301DA11CF5E0EC9FFEB7330DA7BB4AD6D809ED809B3BADAED486AE6F035F788FC82A1BFE43150CE411DC5DCCF587E1B36426FD9388AE042317099A6E54C51
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .C!...................C!....5K.y..C...d...G.a.n.....G...n.....G.....m...K.i.n.....K.u.b.....K...l.....L.....s...M...l.i...N.e.r.....P...r.....T...g.o.....i.t.......r...k.....r...K.....m...n...B...l...s...B...t...n...I.n.d.......J.a.m...n...K.e.n.......K.i.p.r.....K...t...r...K...w...t...K...K.g.o...L.i.b.......M.a.l.t.....M...r...s...N...p...l...N...u.[.....P...l.a.....P...n.y.a...S.i.r.......S...m.o.....S...d...K...S...w...s...T.T.K.g.......r.u.b.....B.r...s...l...B...r.a...n...B...n.[...K...D...m.n...k...G.r...k.y.....G...b.T...K...G...m.b.i.....G...y.a.n.....J...b.u.t.....K...n.a.d.....L.e.s...t.....L...d.v.i.....M...l.d...f...M...l...w.i...M...r.o.k.....M...y.T...t...M...n.a.k.....N...j.[...r...P...n...m.a...P...l...n.d...R...a.n.d.....S...s.[...l...T...y.w...n...T...r.k...y...T...v...l.....Y...m.[...n...Z...m.b.i.......K.d.T...r.....K.g.i.y.......K.g.o.l.......g...p.t.......r.l...n.d.....t.a.l.........s.t.r...k.....g.a.n.d.......k.r.[...n.....l.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):7608
      Entropy (8bit):4.677065664643768
      Encrypted:false
      SSDEEP:96:tF48CTqdS4paQnSto7IPOI8CYvJvOtgKS2xLROx2RHmQP2tn7BG8hCXKQH1hoZcV:orx4p2Mj5GVit1BQDlHNJqpJ80Y
      MD5:34DEE5BB69C136432F75147A649AB0AC
      SHA1:330CE54E21EA1FEFD477CD85EECC25468F192CFD
      SHA-256:EB5730CAAA7EB7DE6AD24E3E610956069960689B2A42769BBE8B027F7918CD98
      SHA-512:C8CD2E670FFD6E74DA436CED188F5C55AC75542CA233F714C251F785DB4CA11D8EA1B6623E0C9E41888B90963E9E85B4D74A21F88D52AFC510702DA4A36874EF
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................_.. ........f...f...$......._...5K.y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
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):3.3908502676203804
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQuHcKt7g8sOtWwT/r9h:SvFv1UwTDX
      MD5:0A1233FBDE8BB786513730F248C00A3F
      SHA1:7232253BF6AA1D12EEC2699394B98C99B04185EA
      SHA-256:45851FFA7B67ECB0A7D7C0BF4EEF7AE7BF66C5747D8833C5FE65966D28AEA026
      SHA-512:6C0F7E0F00F5A49CB8720C9AF67A868145667182B5297ED8F871FFD83D2AF559DF7C2A968F99295E46A8E3831CF60350404AA511747689B3067B518091B9E5D8
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................5K.y....S........H.............P...P.!.`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):6384
      Entropy (8bit):4.7904041426974775
      Encrypted:false
      SSDEEP:96:d42p26D71OkW7RICj+p96V7sH7x6q9AdHqppH8nzbqZMJxjRilZ:dtpLkkDoI7x6BqpJ8iZMxjRwZ
      MD5:EBAB657F132AB733710CB9FCA1CCC4B9
      SHA1:AC1097560B86A22C7471EA87AB52F4A40804E093
      SHA-256:70A4F88D751906FD2649AEAAE435DE4D5F5CA3C6101E023DF2480807ED0E0431
      SHA-512:2174DA9026E5B4BF6590BC3EEE038A8711B8BDA987985109DBD5B8DED878CCDB2C795A18BF2870E15FFF006497D9684137A98F4D8BC2FA4305437BC811900E9B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................-.. .U......4...4...#.....U.-...5K.y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
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):984
      Entropy (8bit):6.664654262645045
      Encrypted:false
      SSDEEP:24:xmrJVJ7OkJBvWa9D2h1i/veBQ+7TTKO542Kc2hdl/QZ:xMmkXWa9D5HeXTb42SqZ
      MD5:2DC65410ADD51F24840BE253B3DE1E6A
      SHA1:555D4E6EB7C777E657DC6FA511950B6A31426BA1
      SHA-256:E8647FD90A97C6C221DEABE0E4E4F833E3B726C9424091695E2419045D7F2B60
      SHA-512:01BEC81C93895A11FDB507BCFE01386D0D590E20827AAD4AB59CE50E25DE3074801996FD2B3AC9D8231AF80049DC5ECAAB8E3AD38AE8FD9B4135706CDC53F60F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..........................5K.y..............................................................................................".+...1.7.:.=.@.C.I.L.O.U.X.[.d.g.j.m.s.v.y.|...............................................................................................!.$.'.*.-.0.3.6.?.B.E.H.K.N.T.W.Z.].`.c.f.i.l.o.r.u.x.{.~............................................................................................... .&.).,./.2.5.8.;.>.A.D.G.J.M.P.Y.\._.b.e.h.k.n.q.t.w.z..............h.J.v.2.!.!..u.wo.".?..."....b@M..3E3...2..-!B!i!G...... ...!$!..k./......`......6./"......{h.#.....~.}.....!..U!2........}.v.}.....!...}.._..#....W"."g.%J..M".I2~.......?~.W...Z..`3.)...Ko?..h..XRQ..2.w.}.`pJ...o.@.`Dw.3.3a"7!.!..u".....hAh;3..'w."l....3...".".@..,...x......_!<J..eo_..I..}.....j..3... q.G..w...".o...".".........."."..~!.A.w.3.h....z@[3q3.@..Z.s!D......"%...w...Ww.@.2.}.`.!q.o..v...o$3....O.'..~.R...?..9..". v`dh... .R... ...........P. .`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):3960
      Entropy (8bit):5.0530028166826595
      Encrypted:false
      SSDEEP:96:lTzcMNUsLjSZe+iZy0Wq/vZyZnFSp0iLsGJ6ctqppH8nzbd/T+P5wa:lvSaG8qpJ88Pia
      MD5:DF0C727EB8EDCD974737DD244F7C6520
      SHA1:72717F9B521311D3F0A0395B4A4189E2F5C691D0
      SHA-256:2CA5055C02A48C3841F0B67148E2256BFC67B8F42133FB3F2373F8787B7D2998
      SHA-512:5A8834F667C27D9C7202C392C9B822109252F4B8CD814D7A288451BB0559A83F873973B48B9E5BE9CFE375AFE35E1C6B8BA4EF719774EAB50EB6F50D094B5C30
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .c..............$.....c.....5K.y..W.e.l.t...T...r.k.e.i...Z.y.p.e.r.n...K.o.m.o.r.e.n.....g.y.p.t.e.n...A.l.g.e.r.i.e.n...B.o.l.i.v.i.e.n...N.o.r.w.e.g.e.n...O.s.t.a.s.i.e.n...S.c.h.w.e.d.e.n...S...d.a.s.i.e.n...S...d.s.u.d.a.n...M.a.l.e.d.i.v.e.n.....t.h.i.o.p.i.e.n...C.o.o.k.i.n.s.e.l.n...F.r.a.n.k.r.e.i.c.h.....s.t.e.r.r.e.i.c.h...D.e.u.t.s.c.h.l.a.n.d...K.o.k.o.s.i.n.s.e.l.n...N.i.e.d.e.r.l.a.n.d.e...P.h.i.l.i.p.p.i.n.e.n.....l.a.n.d.i.n.s.e.l.n...G.r.i.e.c.h.e.n.l.a.n.d...K.a.i.m.a.n.i.n.s.e.l.n...L.a.t.e.i.n.a.m.e.r.i.k.a...M.i.t.t.e.l.a.m.e.r.i.k.a...N.e.u.k.a.l.e.d.o.n.i.e.n...E.l.f.e.n.b.e.i.n.k...s.t.e...F.a.l.k.l.a.n.d.i.n.s.e.l.n...M.a.r.s.h.a.l.l.i.n.s.e.l.n...N.o.r.d.m.a.z.e.d.o.n.i.e.n...P.i.t.c.a.i.r.n.i.n.s.e.l.n...W.e.i.h.n.a.c.h.t.s.i.n.s.e.l.....u...e.r.e.s. .O.z.e.a.n.i.e.n...S.u.b.s.a.h.a.r.a.-.A.f.r.i.k.a...S...d.l.i.c.h.e.s. .A.f.r.i.k.a.....q.u.a.t.o.r.i.a.l.g.u.i.n.e.a...B.r.u.n.e.i. .D.a.r.u.s.s.a.l.a.m...E.u.r.o.p...i.s.c.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):92
      Entropy (8bit):3.2671709230250316
      Encrypted:false
      SSDEEP:3:XCbVSm/tluFkC/qql3dsalqhE:Sv6kZSBlqhE
      MD5:DEF3D8069BB3F45379085CFF1EA1996C
      SHA1:5D3AB1B6D9A8D7F1AA9DB960CE351D48901EE966
      SHA-256:28FA3D1D9F85BBC9F344B1770319754341F34237383A73894800D63C4F3B46D0
      SHA-512:544F0896F423D5B92A4E02A23776F3941F54E6CDE3BBE6453F4580C9E68A61E7B425579A96966B33770D55675E49168A99E6CB8087204EBF0BB4C9E2467B4F4B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..........................5K.y..................P.!.`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):8476
      Entropy (8bit):4.518835379037381
      Encrypted:false
      SSDEEP:192:WhO7Lb3bYnDYxGYND13fatg05W2ai1vzLeG1ZcYaALYHBBEQqpJ8l3y4L:WhKLbCYxbND18g05f9LtKFq844L
      MD5:B32404B41A7BC39D37EA29C78CD0BF57
      SHA1:2D3A4547D3CC57FD7FF76335B8FF44003BF679C5
      SHA-256:77BAF4407E2F8B92AB213C8D905483AC6670AEE91392D7928314523D210B422F
      SHA-512:9FA15CFD5C2E26EA7C050532E85EC2D6BE4640B2AD89E2F0DB4E681FAA642BE78544B57F7788330DBD0084FEC6FED6B2FF05597A7CA0C49E688BC1F651D20649
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................8.. ........?...?...&.......8...5K.y....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1782170728203383
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMwMllJ8lvm1Z:Sv9Rvm1Z
      MD5:7621254D9D701161592F4F0CBBF6F7BF
      SHA1:D41412336A9893E9A9DD439B13A3C65435018DA3
      SHA-256:DB13F9C7B55BCCF734F5C6D3C56DFED65EDA9DC7976E24F0A862F2408A6E529F
      SHA-512:DFE7EACC4058D1862EB6EF8305A388BD27249FE2B91DF08C3102928B066454B322FB55AC7A34DE0E27A87D2112B6A374E674B27B1296240EFE46C5BB135D0A20
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P..!....................!....5K.y........a..!
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1782170728203383
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMwMllJ8lvm1Z:Sv9Rvm1Z
      MD5:7621254D9D701161592F4F0CBBF6F7BF
      SHA1:D41412336A9893E9A9DD439B13A3C65435018DA3
      SHA-256:DB13F9C7B55BCCF734F5C6D3C56DFED65EDA9DC7976E24F0A862F2408A6E529F
      SHA-512:DFE7EACC4058D1862EB6EF8305A388BD27249FE2B91DF08C3102928B066454B322FB55AC7A34DE0E27A87D2112B6A374E674B27B1296240EFE46C5BB135D0A20
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P..!....................!....5K.y........a..!
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1782170728203383
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMwMllJ8lvm1Z:Sv9Rvm1Z
      MD5:7621254D9D701161592F4F0CBBF6F7BF
      SHA1:D41412336A9893E9A9DD439B13A3C65435018DA3
      SHA-256:DB13F9C7B55BCCF734F5C6D3C56DFED65EDA9DC7976E24F0A862F2408A6E529F
      SHA-512:DFE7EACC4058D1862EB6EF8305A388BD27249FE2B91DF08C3102928B066454B322FB55AC7A34DE0E27A87D2112B6A374E674B27B1296240EFE46C5BB135D0A20
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P..!....................!....5K.y........a..!
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1782170728203383
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMwMllJ8lvm1Z:Sv9Rvm1Z
      MD5:7621254D9D701161592F4F0CBBF6F7BF
      SHA1:D41412336A9893E9A9DD439B13A3C65435018DA3
      SHA-256:DB13F9C7B55BCCF734F5C6D3C56DFED65EDA9DC7976E24F0A862F2408A6E529F
      SHA-512:DFE7EACC4058D1862EB6EF8305A388BD27249FE2B91DF08C3102928B066454B322FB55AC7A34DE0E27A87D2112B6A374E674B27B1296240EFE46C5BB135D0A20
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P..!....................!....5K.y........a..!
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):3.2778628487696895
      Encrypted:false
      SSDEEP:3:XCbVSm/tlu1clst0t8tVV1LlUlh+V/91mNJi:SvKclsGt8bHLOl0sNs
      MD5:425F7078B30F5B06665033F62FECC465
      SHA1:11D34F02901FDEA72514A99542F69029AFC4030C
      SHA-256:B4FACD886D586845AB18C1F33F2842BDB4550C002959724A42FE303E5A7EB2A7
      SHA-512:7A8217E2B5B7998732824D70428DDA3C6C4A77BF333B097778909E8C477B626C27130E22580B6D1C7BEC95A78B1455D3803F73015CD296D759CAA37870A0FD56
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................5K.y..2...1...4.8...5.0.............
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1782170728203383
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMwMllJ8lvm1Z:Sv9Rvm1Z
      MD5:7621254D9D701161592F4F0CBBF6F7BF
      SHA1:D41412336A9893E9A9DD439B13A3C65435018DA3
      SHA-256:DB13F9C7B55BCCF734F5C6D3C56DFED65EDA9DC7976E24F0A862F2408A6E529F
      SHA-512:DFE7EACC4058D1862EB6EF8305A388BD27249FE2B91DF08C3102928B066454B322FB55AC7A34DE0E27A87D2112B6A374E674B27B1296240EFE46C5BB135D0A20
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P..!....................!....5K.y........a..!
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1782170728203383
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMwMllJ8lvm1Z:Sv9Rvm1Z
      MD5:7621254D9D701161592F4F0CBBF6F7BF
      SHA1:D41412336A9893E9A9DD439B13A3C65435018DA3
      SHA-256:DB13F9C7B55BCCF734F5C6D3C56DFED65EDA9DC7976E24F0A862F2408A6E529F
      SHA-512:DFE7EACC4058D1862EB6EF8305A388BD27249FE2B91DF08C3102928B066454B322FB55AC7A34DE0E27A87D2112B6A374E674B27B1296240EFE46C5BB135D0A20
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P..!....................!....5K.y........a..!
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1782170728203383
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMwMllJ8lvm1Z:Sv9Rvm1Z
      MD5:7621254D9D701161592F4F0CBBF6F7BF
      SHA1:D41412336A9893E9A9DD439B13A3C65435018DA3
      SHA-256:DB13F9C7B55BCCF734F5C6D3C56DFED65EDA9DC7976E24F0A862F2408A6E529F
      SHA-512:DFE7EACC4058D1862EB6EF8305A388BD27249FE2B91DF08C3102928B066454B322FB55AC7A34DE0E27A87D2112B6A374E674B27B1296240EFE46C5BB135D0A20
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P..!....................!....5K.y........a..!
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1782170728203383
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMwMllJ8lvm1Z:Sv9Rvm1Z
      MD5:7621254D9D701161592F4F0CBBF6F7BF
      SHA1:D41412336A9893E9A9DD439B13A3C65435018DA3
      SHA-256:DB13F9C7B55BCCF734F5C6D3C56DFED65EDA9DC7976E24F0A862F2408A6E529F
      SHA-512:DFE7EACC4058D1862EB6EF8305A388BD27249FE2B91DF08C3102928B066454B322FB55AC7A34DE0E27A87D2112B6A374E674B27B1296240EFE46C5BB135D0A20
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P..!....................!....5K.y........a..!
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1782170728203383
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMwMllJ8lvm1Z:Sv9Rvm1Z
      MD5:7621254D9D701161592F4F0CBBF6F7BF
      SHA1:D41412336A9893E9A9DD439B13A3C65435018DA3
      SHA-256:DB13F9C7B55BCCF734F5C6D3C56DFED65EDA9DC7976E24F0A862F2408A6E529F
      SHA-512:DFE7EACC4058D1862EB6EF8305A388BD27249FE2B91DF08C3102928B066454B322FB55AC7A34DE0E27A87D2112B6A374E674B27B1296240EFE46C5BB135D0A20
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P..!....................!....5K.y........a..!
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1782170728203383
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMwMllJ8lvm1Z:Sv9Rvm1Z
      MD5:7621254D9D701161592F4F0CBBF6F7BF
      SHA1:D41412336A9893E9A9DD439B13A3C65435018DA3
      SHA-256:DB13F9C7B55BCCF734F5C6D3C56DFED65EDA9DC7976E24F0A862F2408A6E529F
      SHA-512:DFE7EACC4058D1862EB6EF8305A388BD27249FE2B91DF08C3102928B066454B322FB55AC7A34DE0E27A87D2112B6A374E674B27B1296240EFE46C5BB135D0A20
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P..!....................!....5K.y........a..!
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1782170728203383
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMwMllJ8lvm1Z:Sv9Rvm1Z
      MD5:7621254D9D701161592F4F0CBBF6F7BF
      SHA1:D41412336A9893E9A9DD439B13A3C65435018DA3
      SHA-256:DB13F9C7B55BCCF734F5C6D3C56DFED65EDA9DC7976E24F0A862F2408A6E529F
      SHA-512:DFE7EACC4058D1862EB6EF8305A388BD27249FE2B91DF08C3102928B066454B322FB55AC7A34DE0E27A87D2112B6A374E674B27B1296240EFE46C5BB135D0A20
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P..!....................!....5K.y........a..!
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1782170728203383
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMwMllJ8lvm1Z:Sv9Rvm1Z
      MD5:7621254D9D701161592F4F0CBBF6F7BF
      SHA1:D41412336A9893E9A9DD439B13A3C65435018DA3
      SHA-256:DB13F9C7B55BCCF734F5C6D3C56DFED65EDA9DC7976E24F0A862F2408A6E529F
      SHA-512:DFE7EACC4058D1862EB6EF8305A388BD27249FE2B91DF08C3102928B066454B322FB55AC7A34DE0E27A87D2112B6A374E674B27B1296240EFE46C5BB135D0A20
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P..!....................!....5K.y........a..!
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1376531665973815
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMbEllljq8lvm1g:Sv9Tvm1g
      MD5:847E775630F25D5D30746D2ABA9615C0
      SHA1:A538E1D8A5ACDBDEC4C3FE3123A46E6311A466DE
      SHA-256:4B49D73F1DACC88C3C58BDC9C73014345F9535AD76AF80B72881CA618E0AB804
      SHA-512:C7A9C62D9EE17004FB9DABAD8B1877D80387692B50447D1CBAF6178CBA89E56FA4272F7292BA9E26BAFA7585C403580093A5E022031F6D0B96E44C7FF4357BCB
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.. .................... ....5K.y........a..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1376531665973815
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMbEllljq8lvm1g:Sv9Tvm1g
      MD5:847E775630F25D5D30746D2ABA9615C0
      SHA1:A538E1D8A5ACDBDEC4C3FE3123A46E6311A466DE
      SHA-256:4B49D73F1DACC88C3C58BDC9C73014345F9535AD76AF80B72881CA618E0AB804
      SHA-512:C7A9C62D9EE17004FB9DABAD8B1877D80387692B50447D1CBAF6178CBA89E56FA4272F7292BA9E26BAFA7585C403580093A5E022031F6D0B96E44C7FF4357BCB
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.. .................... ....5K.y........a..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.178217072820338
      Encrypted:false
      SSDEEP:3:XCbVSm/tlM/llCy8lvm1H:Svhlvm1H
      MD5:558E0FDA40BF93F5445F09E14F2ACC09
      SHA1:FD9E71B80869C8BC7870FD2946D2C3B84EBA5E0C
      SHA-256:CDF68F3DA7C805CC6792BA6A17654EB87E429F01BE96957FB2F468444E334D4C
      SHA-512:46DFC8C70742851B726EF03359880D49371A03F9264BDF4E7B5A0C47DA978EF19C8034DD2D56BFAFCD6329713F8EA40077535BB4BAD4FBE942CF7830FA7BBE6F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.*#...................*#....5K.y........a.)#
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1376531665973815
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMbEllljq8lvm1g:Sv9Tvm1g
      MD5:847E775630F25D5D30746D2ABA9615C0
      SHA1:A538E1D8A5ACDBDEC4C3FE3123A46E6311A466DE
      SHA-256:4B49D73F1DACC88C3C58BDC9C73014345F9535AD76AF80B72881CA618E0AB804
      SHA-512:C7A9C62D9EE17004FB9DABAD8B1877D80387692B50447D1CBAF6178CBA89E56FA4272F7292BA9E26BAFA7585C403580093A5E022031F6D0B96E44C7FF4357BCB
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.. .................... ....5K.y........a..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1376531665973815
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMbEllljq8lvm1g:Sv9Tvm1g
      MD5:847E775630F25D5D30746D2ABA9615C0
      SHA1:A538E1D8A5ACDBDEC4C3FE3123A46E6311A466DE
      SHA-256:4B49D73F1DACC88C3C58BDC9C73014345F9535AD76AF80B72881CA618E0AB804
      SHA-512:C7A9C62D9EE17004FB9DABAD8B1877D80387692B50447D1CBAF6178CBA89E56FA4272F7292BA9E26BAFA7585C403580093A5E022031F6D0B96E44C7FF4357BCB
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.. .................... ....5K.y........a..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):88
      Entropy (8bit):2.7148996570578574
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlKelBjlgljl/k8ALlQpo:SBtkJTl4Kl2o
      MD5:12BE3D5BB9B96E2BE6DA7B2DD273699A
      SHA1:3A4556BD049B2C67A408A789DB6812780D606332
      SHA-256:D8D507E53D278D6B3F9322121CD46D54D9629FF946869C8D4CD941F0F777C2A6
      SHA-512:B7FACCFB049ECF7EA5B9C93274A3B9B2E6AB894EAC0099D72150BD31401356179A2A5E6DCB0650958F567D586F67CCD768FA78C6D40DF3229FDE0498ACB29F55
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................5K.y..e.n._.Z.W.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1376531665973815
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMbEllljq8lvm1g:Sv9Tvm1g
      MD5:847E775630F25D5D30746D2ABA9615C0
      SHA1:A538E1D8A5ACDBDEC4C3FE3123A46E6311A466DE
      SHA-256:4B49D73F1DACC88C3C58BDC9C73014345F9535AD76AF80B72881CA618E0AB804
      SHA-512:C7A9C62D9EE17004FB9DABAD8B1877D80387692B50447D1CBAF6178CBA89E56FA4272F7292BA9E26BAFA7585C403580093A5E022031F6D0B96E44C7FF4357BCB
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.. .................... ....5K.y........a..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1376531665973815
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMbEllljq8lvm1g:Sv9Tvm1g
      MD5:847E775630F25D5D30746D2ABA9615C0
      SHA1:A538E1D8A5ACDBDEC4C3FE3123A46E6311A466DE
      SHA-256:4B49D73F1DACC88C3C58BDC9C73014345F9535AD76AF80B72881CA618E0AB804
      SHA-512:C7A9C62D9EE17004FB9DABAD8B1877D80387692B50447D1CBAF6178CBA89E56FA4272F7292BA9E26BAFA7585C403580093A5E022031F6D0B96E44C7FF4357BCB
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.. .................... ....5K.y........a..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1376531665973815
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMbEllljq8lvm1g:Sv9Tvm1g
      MD5:847E775630F25D5D30746D2ABA9615C0
      SHA1:A538E1D8A5ACDBDEC4C3FE3123A46E6311A466DE
      SHA-256:4B49D73F1DACC88C3C58BDC9C73014345F9535AD76AF80B72881CA618E0AB804
      SHA-512:C7A9C62D9EE17004FB9DABAD8B1877D80387692B50447D1CBAF6178CBA89E56FA4272F7292BA9E26BAFA7585C403580093A5E022031F6D0B96E44C7FF4357BCB
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.. .................... ....5K.y........a..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1376531665973815
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMbEllljq8lvm1g:Sv9Tvm1g
      MD5:847E775630F25D5D30746D2ABA9615C0
      SHA1:A538E1D8A5ACDBDEC4C3FE3123A46E6311A466DE
      SHA-256:4B49D73F1DACC88C3C58BDC9C73014345F9535AD76AF80B72881CA618E0AB804
      SHA-512:C7A9C62D9EE17004FB9DABAD8B1877D80387692B50447D1CBAF6178CBA89E56FA4272F7292BA9E26BAFA7585C403580093A5E022031F6D0B96E44C7FF4357BCB
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.. .................... ....5K.y........a..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1376531665973815
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMbEllljq8lvm1g:Sv9Tvm1g
      MD5:847E775630F25D5D30746D2ABA9615C0
      SHA1:A538E1D8A5ACDBDEC4C3FE3123A46E6311A466DE
      SHA-256:4B49D73F1DACC88C3C58BDC9C73014345F9535AD76AF80B72881CA618E0AB804
      SHA-512:C7A9C62D9EE17004FB9DABAD8B1877D80387692B50447D1CBAF6178CBA89E56FA4272F7292BA9E26BAFA7585C403580093A5E022031F6D0B96E44C7FF4357BCB
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.. .................... ....5K.y........a..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1376531665973815
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMbEllljq8lvm1g:Sv9Tvm1g
      MD5:847E775630F25D5D30746D2ABA9615C0
      SHA1:A538E1D8A5ACDBDEC4C3FE3123A46E6311A466DE
      SHA-256:4B49D73F1DACC88C3C58BDC9C73014345F9535AD76AF80B72881CA618E0AB804
      SHA-512:C7A9C62D9EE17004FB9DABAD8B1877D80387692B50447D1CBAF6178CBA89E56FA4272F7292BA9E26BAFA7585C403580093A5E022031F6D0B96E44C7FF4357BCB
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.. .................... ....5K.y........a..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.1376531665973815
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMbEllljq8lvm1g:Sv9Tvm1g
      MD5:847E775630F25D5D30746D2ABA9615C0
      SHA1:A538E1D8A5ACDBDEC4C3FE3123A46E6311A466DE
      SHA-256:4B49D73F1DACC88C3C58BDC9C73014345F9535AD76AF80B72881CA618E0AB804
      SHA-512:C7A9C62D9EE17004FB9DABAD8B1877D80387692B50447D1CBAF6178CBA89E56FA4272F7292BA9E26BAFA7585C403580093A5E022031F6D0B96E44C7FF4357BCB
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.. .................... ....5K.y........a..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):5384
      Entropy (8bit):4.242133896275624
      Encrypted:false
      SSDEEP:96:+q34wFWjpAlhpy3wVbTUx+5kb5fX93jXQgTge9DsWwiO54pI8:+laUp3gVcxxJXZlwWI8
      MD5:98528308F1FBAEFA8C3B0FB33504D201
      SHA1:FD88A585EA8127FD54455FF6D9200EC326643542
      SHA-256:E5E971CB075C187954AABDD790B9C86B620A9DECA9AB7BC5D95ED401C4B6A789
      SHA-512:5DBAC04412DA84E6E8EB03192257C7A7F87169F60E0CA84EF278FF4A2271249BBC3C9BF7BDFF04B6E0763836AEC137F1229B5F1F80F081BC175A67B7BC0BAE8D
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................6.. .......:...:..........6...5K.y..K.u.b.o...N.i.u.o.....a.d.o...A.r.u.b.o...F.i...o.j...G.a.n.a.o...G.v.a.m.o...I.r.a.k.o...I.r.a.n.o...K.e.n.j.o...K.i.p.r.o...L.a.o.s.o...L.i.b.i.o...M.a.l.i.o...M.a.l.t.o...M.o.n.d.o...N.a.u.r.o...O.m.a.n.o...P.e.r.u.o...S.a.m.o.o...S.i.r.i.o...T.o.n.g.o...U.s.o.n.o.....i.l.i.o...A.n.d.o.r.o...A.n.g.o.l.o...B.e.l.a.m.o...B.e.l.i.z.o...B.e.n.i.n.o...B.u.t.a.n.o...D.a.n.u.j.o...F.e.r.o.o.j...G.a.b.o.n.o...G.a.m.b.i.o...G.u.j.a.n.o...H.a.i.t.i.o...J.e.m.e.n.o...K.a.n.a.d.o...K.a.t.a.r.o...M.a.j.o.t.o...N.i...e.r.o...P.a.n.a.m.o...R.e.u.n.i.o...R.u.a.n.d.o...R.u.s.u.j.o...S.u.d.a.n.o...T.o.g.o.l.o...T.u.v.a.l.o...U.g.a.n.d.o...Z.a.m.b.i.o.....e.%.u.j.o.....i.n.u.j.o...A.l...e.r.i.o...A.n.g.v.i.l.o...B.a.h.a.m.o.j...B.a.r.b.a.d.o...B.a.r.e.j.n.o...B.e.l.g.u.j.o...B.o.c.v.a.n.o...B.o.l.i.v.i.o...B.r.a.z.i.l.o...B.r.u.n.e.j.o...B.u.r.k.i.n.o...B.u.r.u.n.d.o...D.o.m.i.n.g.o...E.r.i.t.r.e.o...G.r.e.k.u.j.o...G.r.e.n.a.d.o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2728
      Entropy (8bit):5.60522054715822
      Encrypted:false
      SSDEEP:48:EWYU030ufLAfsS/f2S0XIXQA8Bhn9hhwQUCfpJNnqpZXXZJ8HHzHH7hiWVZGj30o:Kkd6OgbBhbLfqppH8nzbhiWV4b0Vdf7c
      MD5:C14DCD32E8D42B8370097C12830ECB57
      SHA1:CF0E293A0E96C09326DED5F34BFF1FC93AED6BB4
      SHA-256:5CE6979AF3C70651590A24EC3CEE816A344FCF8600B8D271E181A1C36C37D86F
      SHA-512:7D3EC5A047E5817EC850B8F86CE54F7E00196762A8FC6418122ACF2F2A0F1336490B9D8882029A52FB14439240B6F414DDE844FD855C6641BC13EEDAA85FFC21
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................$...........5K.y..F.i.y.i...J.a.p...n...T...n.e.z...B.a.r...i.n...B.e.l.i.c.e...Y.i.b.u.t.i...A.r.g.e.l.i.a...C.u.r.a.z.a.o...R.u.m.a.n...a...U.c.r.a.n.i.a...C.a.n.a.r.i.a.s...E.s.u.a.t.i.n.i...P.a.k.i.s.t...n...B.a.n.g.l.a.d...s...I.s.l.a.s. .C.o.o.k...S.u.d.a.m...r.i.c.a...I.s.l.a. .B.o.u.v.e.t...I.s.l.a. .d.e. .M.a.n...I.s.l.a.s. .F.e.r.o.e...I.s.l.a.s. ...l.a.n.d...S.a.n.t.a. .E.l.e.n.a...I.s.l.a.s. .C.a.i.m...n...C.e.n.t.r.o.a.m...r.i.c.a...I.s.l.a.s. .S.a.l.o.m...n...L.a.t.i.n.o.a.m...r.i.c.a...I.s.l.a.s. .M.a.l.v.i.n.a.s.....f.r.i.c.a. .c.e.n.t.r.a.l...I.s.l.a. .C.l.i.p.p.e.r.t.o.n...I.s.l.a. .d.e. .N.a.v.i.d.a.d...N.a.c.i.o.n.e.s. .U.n.i.d.a.s...G.u.a.y.a.n.a. .F.r.a.n.c.e.s.a...M.a.c.e.d.o.n.i.a. .(.E.R.Y.M.)...C.o.n.g.o. .(.R.e.p...b.l.i.c.a.)...R.e.g.i...n. .d.e.s.c.o.n.o.c.i.d.a...C.i.u.d.a.d. .d.e.l. .V.a.t.i.c.a.n.o...R.A.E. .d.e. .M.a.c.a.o. .(.C.h.i.n.a.)...S.v.a.l.b.a.r.d. .y. .J.a.n. .M.a.y.e.n...I.s.l.a.s. .T.u.r.c.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):772
      Entropy (8bit):4.071665057159609
      Encrypted:false
      SSDEEP:24:WWzvl0UvlDaaudl04l0UuwlDilDazqOelTX2gzqLm1E9glTil5CeIPGrrs:WSaFEOcaG3Gy1KzCeIPGrrs
      MD5:A2E29CC845CD8635840D0B780BE8C621
      SHA1:8F05A3933C55E391BEA0FA2A03418FDE3A628ADA
      SHA-256:F2A8F7EC03500DA1D48461C5C9654EDB97D59DD8B3B49E8010A117EA4A0BFDA3
      SHA-512:3D2BC9A507ECC5B663B8C38DEAA80750E7E96603E660719FE92976D212D7E6A36640BC0197645864BA378944E51CA3AA6D50BFEB29356DD4A8AD6A2CF0A80498
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .........................5K.y..R... .U.....A.s.i.a. .d.e.l. .E.s.t.e...A.s.i.a. .d.e.l. .O.e.s.t.e...I.s.l.a. .A.s.c.e.n.s.i...n...I.s.l.a.s. .C.a.n.a.r.i.a.s...E.u.r.o.p.a. .d.e.l. .E.s.t.e.....f.r.i.c.a. .d.e.l. .E.s.t.e...A.s.i.a. .s.u.d.o.r.i.e.n.t.a.l...E.u.r.o.p.a. .d.e.l. .O.e.s.t.e.....f.r.i.c.a. .d.e.l. .O.e.s.t.e...I.s.l.a.s. .U.l.t.r.a.m.a.r.i.n.a.s...R.e.p...b.l.i.c.a. .d.e.l. .C.o.n.g.o...r.e.g.i...n. .d.e. .M.i.c.r.o.n.e.s.i.a...I.s.l.a.s. .U.l.t.r.a.m.a.r.i.n.a.s. .d.e. .E.E...U.U.....C.o.n.g.o. .(.R.e.p...b.l.i.c.a. .D.e.m.o.c.r...t.i.c.a. .d.e.l. .C.o.n.g.o.).......&.*.2.B.F.J.N.Z.j.r.v.z.........a...........2.S.n.p.>..m.^..MN..\......4k_....z..fb...$.....A.j=Z.....y........................PK..PN..P)#.`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):128
      Entropy (8bit):4.0106388429862925
      Encrypted:false
      SSDEEP:3:XCbVSm/tlEFU/glo7BgTlRP2OcqVA6e4PoY/ef:Sv8U/go7wlp2O3Xq3f
      MD5:23FF1E45B7F45B8C1CDF06E183359019
      SHA1:34A374D2661E3E7620A680A3EB08AC3015C15645
      SHA-256:70DA312294D03A617A82BA66B202FAF9013C1D75899BC4FABAFA3F584CE84FBA
      SHA-512:F9574D339FC5C258E36C3C6B85CDCF7BB18105547205C7D6A8640126F5DCC23F63B38B0998CE1E7B5311A0C846567C905447CC7FDDC33D71A2448E70D7A8110D
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................5K.y........2.S.n.p.jh.Q......y....................`...P...P. .`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):124
      Entropy (8bit):3.8643215884156596
      Encrypted:false
      SSDEEP:3:XCbVSm/tldS/mmJ7lNzwd0OkGtl36e4Poe9gF:Sv0/mmRw2OJKq5
      MD5:DF8C1B6C2E9D796CC17FDC48CDE3CB5F
      SHA1:6B58526E194EB5461EB52568711CF490FC6CE325
      SHA-256:6423A955DC8A45912DC4CA81AAA6EDE3554C2DAD3EFE200FF97428EC88995DA0
      SHA-512:7C8085034258EBACDA4948E6FCEBCE0F4D9B56DA4FC6377E4CC94B042FC54F9F775D93D6EFBD9877D9E453C9C31876F905E8953298C71C37CF720DEE2FEF9DB2
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................5K.y........2.S.p.jh.Q....y....................`...P...P. .`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):124
      Entropy (8bit):3.8643215884156596
      Encrypted:false
      SSDEEP:3:XCbVSm/tldS/mmJ7lNzwd0OkGtl36e4Poe9gF:Sv0/mmRw2OJKq5
      MD5:DF8C1B6C2E9D796CC17FDC48CDE3CB5F
      SHA1:6B58526E194EB5461EB52568711CF490FC6CE325
      SHA-256:6423A955DC8A45912DC4CA81AAA6EDE3554C2DAD3EFE200FF97428EC88995DA0
      SHA-512:7C8085034258EBACDA4948E6FCEBCE0F4D9B56DA4FC6377E4CC94B042FC54F9F775D93D6EFBD9877D9E453C9C31876F905E8953298C71C37CF720DEE2FEF9DB2
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................5K.y........2.S.p.jh.Q....y....................`...P...P. .`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):5404
      Entropy (8bit):4.578439940354441
      Encrypted:false
      SSDEEP:96:SXjLsIJwCDfQTlHAGxZz8FK1EKdDELXpemPutAdqppH8nzb0hHPjNxGV5JvT:EMIJJoTVlZAFvpeKqpJ8sdPjPGvT
      MD5:AA5B93E87201E9BC7D60A49500C120D5
      SHA1:866C65836AB4B81286A9C9D2977525D22EDED8B7
      SHA-256:61C1D44AD67600EDF24B3616C3DBEDE66FF4C3CC9F297FB911D3C056D684E8EA
      SHA-512:E233D5C0B0EFDCD22DE81F7E042D676A60B0A1F2DB95B21685542673C60343CD52D072294011B0CD9A051741E5A0C74F301CF16DAF0F4CAB8CAB0F6710344472
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................8.. .0......?...?...$.....0.8...5K.y..C.I...T.x.a.d...T.x.i.l.e...T.x.i.n.a...Z.i.p.r.e...G.r.e.z.i.a...M.u.n.d.u.a...S.u.e.d.i.a...S.u.i.t.z.a...T.x.e.k.i.a...A.i.n.g.i.r.a...B.a.h.a.m.a.k...B.e.l.g.i.k.a...E.r.r.u.s.i.a...K.a.r.i.b.e.a...K.r.o.a.z.i.a...E.s.p.a.i.n.i.a...F.r.a.n.t.z.i.a...K.a.n.a.r.i.a.k...K.a.n.b.o.d.i.a...K.o.l.o.n.b.i.a...K.o.m.o.r.e.a.k...M.a.l.d.i.v.a.k...M.a.u.r.i.z.i.o...E.r.r.u.m.a.n.i.a...E.s.l.o.v.a.k.i.a...E.u.r.o.g.u.n.e.a...F.i.l.i.p.i.n.a.k...M.a.z.e.d.o.n.i.a...M.o.z.a.m.b.i.k.e...B.o.l.i. .K.o.s.t.a...F.a.l.k.l.a.n.d.a.k...H.e.g.o. .K.o.r.e.a...H.e.g.o. .S.u.d.a.n...H.e.g.o.a.f.r.i.k.a...I.p.a.r. .K.o.r.e.a...K.o.n.g.o. .(.D.R.)...L.u.x.e.n.b.u.r.g.o...S.a.n. .M.a.r.t.i.n...M.a.n. .u.h.a.r.t.e.a...S.a.n.t.a. .L.u.z.i.a...S.e.y.c.h.e.l.l.e.a.k...H.e.g.o. .A.m.e.r.i.k.a...I.p.a.r. .A.m.e.r.i.k.a...N.a.z.i.o. .B.a.t.u.a.k...A.s.i.a. .e.k.i.a.l.d.e.a...C.o.o.k. .u.h.a.r.t.e.a.k...L.a.t.i.n.o.a.m.e.r.i.k.a...A.s.i.a. .e.r.d.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):5828
      Entropy (8bit):4.714886250548154
      Encrypted:false
      SSDEEP:96:IMcfQynIgD52g/jk9vCKeXSwj1DsRM3r+HkLUqppH8nzb4znli5IX:IAynI652X96+RMKHkLUqpJ8+nI5IX
      MD5:24089A0D9EAA78C1AD8E02AD7ACEE3C7
      SHA1:AFD0C33AE4285C95DE0C248EBA5374F608ABB799
      SHA-256:A36815C3A7108C8E95357A448FD6EEBEC3734933B22D6C496A6716029BFE06FC
      SHA-512:EE148F7B4986F5A08A990055B45B6931F63CA621F5190D2FC287B8DFFDE61E93ACADFA963B98B7DC4D9EDD50B4E7646AC5AF07294B139BB02845FF874E03CDE3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .6..............$.....6.....5K.y..:.F.'...~.1.H...(.F...F...,.1.2.....,.G.'.F...3.H.&./...3...4.D...4...D.....D...(.....E.'.D.*...F.1.H.....F.~.'.D.....'.~.F.....F...'.....H.(.'.....'.(.F.......F.G...(.1.2...D...(.D.........*.1.....G...3.'.E.H."...3.F...'.D...3.H.&...3...3.H./.'.F...D.*.H.F.....E.'.D.2.....E.'...H.*...E.H.1...3...E...2.......F...H.&.G.....H.2.H.H.....H.E.H.1.....1.F.2.......H...'.F...".D.(.'.F.....".F./.H.1.'...".F...H.D.'...'.*...H.~.....'.3.*.H.F.....'...1.D.F./...'...3.D.F./...(.'.G.'.E.'...(.1.H.F.&.....(.D.'.1.H.3...(.H.D...H.....*.'...D.F./...*.H.H.'.D.H...,...(.H.*.....1.H.'.F./.'...1.H.E.'.F.....3.H.E.'.D.....A.F.D.'.F./...D.G.3.*.'.F...D...(.1...'...E.'.D./...H...E.'...'.&.H...E.D.'.F.2.....F...,.1...G...G.'.&...*.....~.'.D.'.&.H...~.1.*.:.'.D.....'.E.(.H.,.....'.F.'./.'.....1.H.'.3.......D.E.(...'.....1.F.'./.'...".F...H...D.'...'.1.H...H.&.G...'.3.1.'.&...D...'.3.D.H.'.......'.3.D.H.H.F.....'.3.~.'.F...'...'.D.,.2.'...1...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):5156
      Entropy (8bit):4.251772609765763
      Encrypted:false
      SSDEEP:96:nAThdY+tbd/q98SkZ7M6XUgLuH9y0DbhiNvP438wRA+mwiisgtjHLgJb0kXF9D5y:nGY+tc98SkZ7DXhKH97hiNvPG80A+IiZ
      MD5:34122262DC803793983D52A11C615FDA
      SHA1:492D2CB109D6C4A7E702BE1D98648EE4BB8BD7CD
      SHA-256:1D0ECD0E39D703CC42CADC71DF42DA24F217264C5F16BA650CF0B256A7A4F466
      SHA-512:9525D2068DB493577999BA3ED3894A434002000DF6420C9B658065410793E1FEA7551BC846FEF2FB869758E1EA5DA469A518B2DB4512022A4A9FA1CEF1BFBF78
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................5K.y..C.a.a.d...B.e.n.e.e...C.i.l.i.i...E.j.i.p.t...E.n.n.d.o...F.i.j.j.i...G.a.b.o.o...G.a.n.a.a...G.u.w.a.m...K.e...a.a...K.u.b.a.a...L.i.b.a.a...M.a.l.t.e...M.a.r.u.k...N.i.u.w.e...P.o.l.o.....S.a.p.o.o...S.i.r.i.i...T.o.g.o.o...B.e.l.j.i.k...B.u.t.a.a.n...E.c.o.p.p.i...E.s.p.a.a.....G.a.m.m.b.i...G.e.r.e.e.s...G.i.y.a.a.n...H.a.y.t.i.i...L.a.w.o.o.s...M.a.y.o.o.t...M.e.k.s.i.k...M.o.r.i.i.s...N.e.p.a.a.l...N.i.j.e.e.r...R.i.i.s.i.i...S.a.m.m.b.i...S.e.y.s.e.l...S.i.i.p.a.r...S.u.d.a.a.n...S.u.w.e.e.d...S.u.w.i.i.s...T.u.r.k.i.i...A.l.a.s.e.r.i...A.l.b.a.n.i.i...A.r.m.e.n.i.i...B.a.h.r.e.y.n...B.e.l.i.i.s.e...B.o.l.i.w.i.i...B.u.r.n.a.a.y...F.e.n.l.a.n.d...G.a.r.n.a.a.d...J.a.m.a.y.k.a...J.e.o.r.g.i.i...J.i.b.u.t.i.i...J.o.r.d.a.n.i...K.a.n.a.d.a.a...K.u.w.e.y.t.i...L.e.t.o.n.i.i...M.a.l.e.s.i.i...N.a.m.i.b.i.i...N.o.r.w.e.e.s...O.n.n.g.i.r.i...O.t.i.r.i.i.s...P.a.n.a.m.a.a...R.e.w.i...o.o...R.u.m.a.n.i.i...S.a.m.o.w.a.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.945547915629603
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDklU8gl8l/d5YMpDP:SBtkJYlU8g8l/TYoP
      MD5:7DF062A814A126F44A2C5EBF127DE11C
      SHA1:6707F6D94B7418959EC6EE7C4EE5EF367F0ABE2E
      SHA-256:C388334A402D74EC1071728367218E1F2E5C1F146DA3B08605FBE53D3D00ABC3
      SHA-512:DEB4D2B65AEA64315B5A5CDE8E72DCAA75A6682D17625589D06396747CF905413BB4DFC13BB5DDCE68AF75A6DDB50E97705E192A28F846E5DE1A4529D787B9BD
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................5K.y..f.f._.L.a.t.n._.G.N...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.9159246284584364
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMAt66E7lol1Bsnn:SvHt66goDq
      MD5:A0838E6D15B5072DC03BAEB7F98ED41A
      SHA1:98AB23737463E55ADA302D75545A9BB32BE19272
      SHA-256:825E5F4187683FE01E0FFF595D7CB7CAB8654C5699F0D8386E6C3625A5E3B19F
      SHA-512:B4F64FA488F5AF2465E5F986C7B505DF49C23166C022E13DBE764047833735551F67C2F3DACDFFF46A30847E8303DF96270471F990AC48353E6A5BAACAFC3D2A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.. .................... ....5K.y.......
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.500123730064915
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/dsp:SBtkJ1li6gml/8
      MD5:3F209B3AA35603DCBB208A74CAA36C86
      SHA1:249DE057005BE697205333ABA0433C5B04653BBB
      SHA-256:F3965E339C622C96879DEE316DE42F9E9F693DDEB7A52FDCEBBA027171F2C86A
      SHA-512:02411AE5728814057E0CA78D850EEA85B3ACA16DFDBEE97A7C01860DA3B82640EEBE60960938C7F64B05D9E9FE8BAE0B826D242E24B33C40024836F716F17E31
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................5K.y........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):176
      Entropy (8bit):3.5291796110164784
      Encrypted:false
      SSDEEP:3:XCbVSm/tldFnsllllFxJlzlFlbiYZfUfC0faLkgBIlFUfC0/H24E83lqQt:Sv3MrJZZVZsfaITlFUf24R38Qt
      MD5:1A3462FEC297B2C16F431412597054F7
      SHA1:5F64484F8A239947F3342543A56DC75B21794B66
      SHA-256:A384B7D7029CDF47B70D23110B710D332E117E6FEA9BE44ED331FB54E0B61105
      SHA-512:153B73F97468E705286D0FF7D9B391A4EC1DBD3972DA1F1502A18ECC2424F4B3E860913D03391CE374DA1E144C631D2474306A4A300EF503B6554642CAD31473
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................ .. .C!.....$...$.........C! ...5K.y....l.e.s. .G...o.r.g.i.e. .d.u. .S.u.d. .e.t. .S.a.n.d.w.i.c.h. .d.u. .S.u.d.........B!D!..........(..P. .`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):9100
      Entropy (8bit):4.109836759452686
      Encrypted:false
      SSDEEP:192:7uZ267GlZYl+oV6Xsi+626PCAUTI3ifXqpJ89CezL:7uZGDYl+lXsL623AU5vq89Ce/
      MD5:282EF635F3BD6E8FBCFCF5D73C7BFD69
      SHA1:6F8B12533ED59E55FB32F5800AFFA4BCE44F3C83
      SHA-256:DDDDB61FDEAA80A7571BE1679CDE4C1E5596A7DAED657D9A583F4BEF6BF2FE01
      SHA-512:894DFA667F6E347BB5A7B278EB00DC124DC03ADF3E666E30B586A3D068E314CD313DA365AD59652DE6BF8C42AB91B47B43B139D926503155E670C6F51A4AFF7D
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .9..............$.....9.....5K.y..R.A...C...b.a...F...d.i...G...n.a...O.m...n...A.r...b.a...B.u.t...n...I.o.r...c...I.o.r...n...M...i.l.i...P.e.a.r.....S.u.d...n...A.n.g...l.a...B.e.i.n.i.n...C.e.i.n.i.a...C.o.i.r...a...E.a.r.t.r.a...I...r.d.a.n...L.i.b...i.r...L...t.h.o.s...M.o.r.o.c.o...N.a.b.h.r.u...N.e.a.p...l...N...g.e.i.r...P.a.l.a.b.h.....i.r.i.n.n...A.n. .R.u.i.s...B.r.a.i.s.i.l...C.a.m.a.r.u.n...C...o.p.r.a.s...H.a.i.d.h.t.i...I.o.s.r.a.e.l...L.e.a.s.o.t.o...M.a.c...t.h.u...M.i...n.m.a.r...S.a.m.o.t.h.a...S.u.r.a.n.a.m...S...i.m.b.i.a...T.u.b.h.a.l.u...A.i.l.d.i.r.i.a...A.l.b...i.n.i.a...A.n. .E.a.m.a.n...A.n. .I.t.i.o.p...A.n. .T.u.i.r.c...A.n. .t.-.S...n...B.a.c.h.r.a.i.n...B.e.a.r.m...d.a...B.r...n.a.i.g.h...C.i.r.i.b.e.a.s...C.u.i.b.h...i.t...D.i.a.m.e.u.g.a...E.a.c.u.a.d.o.r...G.r.e.a.n...d.a...G.u.a.d.a.l.u.p...H.o.n.d...r.a.s...L.e.a.b.a.n.o.n...M.e.a.g.s.a.g.o...N.i.g...i.r.i.a...P.a.g.a.s.t...n...R.o.m...i.n.i.a...R.u.b.h.a.n.d.a...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):6328
      Entropy (8bit):4.404428572830834
      Encrypted:false
      SSDEEP:192:3iSCgOFoYpnCF4F1EwQkfsk8mhcfhuRNBs8e8Rn:3xsFoUnO4F1EwhUkFqfh+NKx81
      MD5:98AD672586E6D840D2E1F903F6838857
      SHA1:5D2DE185390D877CA6738CDEED7DAAC00AA8FAEC
      SHA-256:E7F66CA60655C291257B10EAD74E9F6EF964BCF726A3D57FF82229DBB9D06CFB
      SHA-512:8EF1F94EF329FFB902709D9A48ABA711E30D18877969EAEACE38E3B5B8674D92C0F4859CCD20BBA48C2446C5683B999838DAC76230CB621B06C672B38A1B5C7D
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .0......&...&.........0.....5K.y..W...l.t...A.a.s.i.e...J.e.e.m.e...L.a.a.o.s...P.o.o.l.e...T.o.o.g.o...C.h.i.i.n.a...G.g.a.t.a.r...G.i.n.e.e.a...K.e.e.n.i.a...K.u.w...i.t...L.....b.i.e...M.a.j.o.t.t...S.a.m.o.o.a...S...r.b.i.e...S.....r.i.e...Z.y.p.e.r.e.....g...p.t.e...E.u.r.o.o.p.a...F.i.t.s.c.h.i...G.....r.n.s.i...I.t.a.a.l.i.e...K.o.m.o.o.r.e...L.e.s.o.o.t.o...L.i.t.t.a.u.e...S.c.h.w.i.i.z...T.s.c.h.i.l.e...T...r.g.g.e.i...W.i.e.t.n.a.m...A.l.b.a.a.n.i.e...A.l.g.e.e.r.i.e...A.r.m.e.e.n.i.e...B.a.c.h.r...i.n...B.a.h.a.a.m.a.s...B.e.r.m.u.u.d.a...B.o.l.i.i.v.i.e...B.r.a.s.i.l.i.e...D.s.c.h...r.s.i...E.e.s.t.l.a.n.d...G.e.o.o.r.g.i.e...G.u.a.d...l.u.p...K.r.o.a.a.z.i.e...L.i.b.e.e.r.i.a...M.a.l...i.s.i.a...N.a.m.i.i.b.i.a...N.i.g.e.e.r.i.a...N.o.r.w.e.e.g.e...R.e...n.i.o.o.n...R.u.m.....n.i.e...S.c.h.p.a.n.i.e...S.c.h.w.e.e.d.e...S.l.o.w.a.k...i...S.o.m.a.a.l.i.e...T.o.m.i.n.i.c.a...T.u.n.e.e.s.i.e...T...n.e.m.a.r.k...U.k.r.a.i.i.n.e.....r.i.t.r.e.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):8168
      Entropy (8bit):4.603147322781166
      Encrypted:false
      SSDEEP:192:ynPbwZCbJ4ocfZAA6crroWqz8mDoJDAYgqpJ8GHl/GOsY:yPcZkJzvcnNaeMYgq80B
      MD5:87C78D1DDED3E5D2989F06A7E2A03D3E
      SHA1:66D8D13763AC9AE97B1AF622245799DD3FC68DA1
      SHA-256:39C5A4BFA961A082D2B43D46B8ED1EC5C9B7966BD9023715BEFEB8BBF6F9090D
      SHA-512:B7A8234A5010168B92FA785E4622BC769C1EE6A78AFB23FF37AD7CAF495AFF2B940EAA7B33CBBDD5C6DAD16EBF67BECA71897EA5D775E512AA7B63BFE1B38552
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..!.............$......!....5K.y....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):7156
      Entropy (8bit):4.395054498069301
      Encrypted:false
      SSDEEP:96:9I6aIJRhl/hzSrOK77dWbfK7xevyGjyQrnUjJ0JbTm0INwRqppH8nzb5YPKqLF:O67RhLzsdWMGyGjPrU4QqRqpJ8xYPKqh
      MD5:881EE7330ACCAF45638EA4108DE598A8
      SHA1:7A645D5FE2D1AC5E744FE8DA55C02D462878E34F
      SHA-256:88A3250FEEE3C95AB54275107965BDC80B4665DF37BFEC1C6771C33A26E19397
      SHA-512:775A64ADB24F5B35585FAEC7AD22867CC2F4C3145B05F25E1CFDFD3D191B99A67F9B6D909A0B0927ABFC2045914512C485A8BA3C2866C8D1B18522B41EB7206B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..z.............$......z....5K.y..S.....B.N.A...M...n...G.v.a.m...K...n.a...K...b.a...N...r.....P.a.l.....S...l.e...T...g.......r.a.k.....r.a.n.....m.a.n...A.l.s...r...B.e.l...s...B...t.a.n...H.a...t.....K.e.n...a...K...p.u.r...L...b...a...S.p...n.n...S.v.i.s.s...T...n.i.s...B.a.r.e.i.n...B.e.l.g...a...B.r...n.e.i...G.a.m.b...a...J...l.a.e.y...K...s...v.....K...v.e.i.t...L.e.s...t.....M.a.l.a.v.....M.e.x...k.....M...n.a.k.....R...a.n.d.a...S.a.m.b...a...S.e.r.b...a...T.a...v.a.n...T...k.e.l.....T...v.a.l.......r.l.a.n.d.....s.l.a.n.d.....s.r.a.e.l.....t.a.l...a.....g.a.n.d.a.....r...g.v.....A.l.b.a.n...a...A.r.m.e.n...a...B...l.i.v...a...B...r...n.d.....D.a.n.m...r.k...D.j...b...t.....E.r...t.r.e.a...E.......p...a...G.e.o.r.g...a...I.n.d.l.a.n.d...J.a.m.a...k.a...K.a.m.e.r...n...K.r...a.t...a...L.i.t.h...e.n...L...b.a.n.o.n...L...b.e.r...a...M.a.l.a.s...a...M.a.r.o.k.k.....M.o.l.d...v.a...N.a.m.i.b...a...N.o.r.e.g.u.r...N...g.e.r...a...P.a.r.a.g.v...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):8556
      Entropy (8bit):3.8572651947001155
      Encrypted:false
      SSDEEP:192:K+rST6GPB2Io0rVZVm1k1iQBqo0ySEsQfFRcba:BEbBI9k1ekJRcO
      MD5:A96491F615F7809E5C2F36A46D85AFD2
      SHA1:2ED9AB53CC57CAF5FF72000D8011EE11A06ED273
      SHA-256:8388B553E2EB3AB9F8C786C2B15130DE9D4BBFDC6C547EC16EB4ED3D9055C854
      SHA-512:9C07B0B489D0887102A3D6B06B885433AF9504467B82DA2137C4C188BF42D385733958E8164C4EB1BF845941CF926ECBE9265DAB8CF47C31225D6A553560D4E0
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................O.. ........S...S...........O...5K.y..E.m.e.t.a.b. .C.h.a.d...E.m.e.t.a.b. .C.u.b.a...E.m.e.t.a.b. .F.i.j.i...E.m.e.t.a.b. .G.u.a.m...E.m.e.t.a.b. .I.r.a.n...E.m.e.t.a.b. .I.r.a.q...E.m.e.t.a.b. .L.a.o.s...E.m.e.t.a.b. .M.a.l.i...E.m.e.t.a.b. .N.i.u.e...E.m.e.t.a.b. .O.m.a.n...E.m.e.t.a.b. .P.e.r.u...E.m.e.t.a.b. .T.o.g.o...E.m.e.t.a.b. .A.r.u.b.a...E.m.e.t.a.b. .B.e.n.i.n...E.m.e.t.a.b. .C.h.i.l.e...E.m.e.t.a.b. .C.h.i.n.a...E.m.e.t.a.b. .G.a.b.o.n...E.m.e.t.a.b. .G.h.a.n.a...E.m.e.t.a.b. .H.a.i.t.i...E.m.e.t.a.b. .I.n.d.i.a...E.m.e.t.a.b. .I.t.a.l.y...E.m.e.t.a.b. .J.a.p.a.n...E.m.e.t.a.b. .K.e.n.y.a...E.m.e.t.a.b. .L.i.b.y.a...E.m.e.t.a.b. .M.a.l.t.a...E.m.e.t.a.b. .N.a.u.r.u...E.m.e.t.a.b. .N.e.p.a.l...E.m.e.t.a.b. .P.a.l.a.u...E.m.e.t.a.b. .Q.a.t.a.r...E.m.e.t.a.b. .S.a.m.o.a...E.m.e.t.a.b. .S.p.a.i.n...E.m.e.t.a.b. .S.u.d.a.n...E.m.e.t.a.b. .S.y.r.i.a...E.m.e.t.a.b. .T.o.n.g.a...E.m.e.t.a.b. .Y.e.m.e.n...E.m.e.t.a.b. .n.i.g.e.r...E.m.e.t.a.b. .A.n.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):8676
      Entropy (8bit):4.564190554248838
      Encrypted:false
      SSDEEP:192:E4S8C9i2e0wkc/YqiEtipDZsp1S9l1SnQXHEqpJ89VC:hTmLHwIXs+YNq82
      MD5:9577A1BF43D750F1FB7D50F437D20FC8
      SHA1:D24BE5CF5719FE6D7E9F104464206D9A561DA25D
      SHA-256:9942CE5B879FC51766E09DA90A3EEDB2DE3335AE3EBCE0BBCC446C4F518CCC2A
      SHA-512:62E47D77C181ED1A4310E17C2C7DEE45C0182EFFD01D6003ED8675493A9425814704F1F87B7911643BE36F067A294CE9229AC19005298469E2510184418CD0EF
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................j.. ..!.....q...q...$......!j...5K.y....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):5728
      Entropy (8bit):4.301535633570821
      Encrypted:false
      SSDEEP:96:btTCHQ3cVUtNfxLH5SL71HO52+P1QmrNtVqlS0kXF9D5+qZy9:l6QsKVZSLpHO52+dQ8NtVq8fFRcoy9
      MD5:205E77719702CE43DD69B27461BFC4EE
      SHA1:CD89A275C08944D8B0CB681B9BBCEC3D217F3F76
      SHA-256:2CBB41EE763649A5D79FBA145F01C3001AAAB8ED369AFB50160026728CDDBB34
      SHA-512:121303D0EE758ACD3C522A5F592EBC72AC2432F0CE8F92D656CE784FFE24D0943C9B72F63A51E2A992DC717938EF3762746976694671902D88FFC952E8178B9C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................5K.y..F...i.j.i...G.w.a.n.i...G...a.n.a...G...i.n.e...J...j.i.a...M...a.l.i...N.i...u.e...N...i.j.a...P...e.r.u...T...o.g.o.....m.a.n.i...A.n.d...r.a...A.r...u.b.a...C.h...a.d.i...C.h...i.l.e...C.h...i.n.a...H.a...i.t.i...I.r...a.k.i...J...d.a.n.i...K.y...u.b.a...K...n.a.d.a...K...e.n.y.a...L.a...o.s.i...M.i...a.m.a...M...l.i.t.a...M...s.i.r.i...N.a...u.r.u...P.a.l...a.u...P.a.p...u.a...S.a.m...o.a...S...m.b.i.a...T...o.n.g.a...U.f...i.n.i...U.r...u.s.i...Y...m.e.n.i.....k.w.a.d.o...D.r...e.n.o...A.m.e.r.h.k.a...A.n.g...o.l.a...B.a.h...a.m.a...B.e.l...i.s.e...B.e.n...i.n.i...B.u.k...i.n.i...B.u.t...a.n.i...B...s.i.n.i.a...E.s.t.o.n...a...G.a.b...o.n.i...G.u.y...a.n.a...J.a.m...i.k.a...J.a.p...a.n.i...J.i.b...u.t.i...K.a.t...a.r.i...K.o.m...o.r.o...K...w...i.t.i...L.e.s...o.t.o...M.a.l...a.w.i...M.a.y...o.t.e...M.o.d...i.v.u...M.o.n...a.k.o...M.o.r...i.s.i...M.o.r...o.k.o...N.e.p...a.l.i...P.a.n...a.m.a...P...l.a.n.d.i...R.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):3140
      Entropy (8bit):4.108582351284262
      Encrypted:false
      SSDEEP:96:V9rYqMTeXHSki6ngjSl6hV34a0q9wT350ZNE:VCKyki6nsSl6hVFyTyE
      MD5:336EBE33CFC1401C9C398C07F1BB834F
      SHA1:CCF59EA8A96E913129151FD5917B95AE342F4765
      SHA-256:3BABD6C8C6ADDB43C2606804BCACB523FEE25153B52FB763AD85CBA0F116F2CF
      SHA-512:CBBEC77D89D993FE50927360AA524275C8B8EA5F8F4130F4A5B68250827065BEAE0FD185D34001E0ECA157C9E3B49FF815EF360B8EC3988462145B96D4FD99B7
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..}....................}....5K.y..U.f.i.j.i...U.g.a.n.a...U.g.i.n.e...U.g.w.a.m...U.k.u.b.a...U.t.o.g.o...U.t.u.k.i...U.b.e.l.i.n...U.c.h.a.d.i...U.c.h.e.k.i...U.c.h.i.l.e...U.c.h.i.n.a...U.h.a.i.t.i...U.j.o.j.i.a...U.k.e.n.y.a...U.k.o.n.g.o...U.l.i.b.y.a...U.n.o.r.w.e...U.o.m.a.n.i...U.p.a.p.u.a...U.p.e.r.u.u...U.r.u.n.d.i...U.s.a.m.o.a...U.s.a.u.d.i...U.s.i.r.i.a...U.t.o.n.g.a...W.i.r.a.k.i...U.a.n.d.o.r.a...U.b.u.k.i.n.i...U.g.a.b.o.n.i...U.g.a.m.b.i.a...U.g.u.y.a.n.a...U.j.a.p.a.n.i...U.j.i.b.u.t.i...U.k.a.n.a.d.a...U.k.a.t.a.r.i...U.k.o.d.i.v.a...U.k.o.m.o.r.o...U.l.e.s.o.t.o...U.m.a.l.a.w.i...U.m.i.s.i.r.i...U.n.i.j.e.r.i...U.p.a.n.a.m.a...U.s.u.d.a.n.i...U.t.u.v.a.l.u...U.t.w.a.n.i.a...U.y.e.m.e.n.i...U.z.a.m.b.i.a...A.l.u.j.e.r.i.a...U.a.l.b.a.n.i.a...U.g.r.e.n.a.d.a...U.h.i.n.d.i.n.i...U.i.s.r.a.e.l.i...U.j.a.m.a.i.k.a...U.k.o.r.a.s.i.a...U.k.u.p.r.o.s.i...U.l.a.t.i.v.i.a...U.l.i.b.e.r.i.a...U.n.i.j.e.r.i.a...U.p.o.l.a.n.d.i...U.r.i.t.e.r.e.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):6016
      Entropy (8bit):4.896917580560711
      Encrypted:false
      SSDEEP:96:NozdTTJUWaJDYJpTW/rVJw/LOxaZtRTqfEmT7U77tDQU3gCaB2Bvb+qppH8nzb0X:uTTiW+YJpTW/r8/akPyEdtDDwB2Bvqqb
      MD5:2E3DC1E886CC54C4B6FB4A3EA8DE82AE
      SHA1:2F708EAA76814582D2AFD28C26FC3F4FE11FA609
      SHA-256:F3208BAE5D84BD14436FE3662E2881C182AA18D50BD48F344A5B8F8B34C19F5E
      SHA-512:0648C07E13E42D044BCBFC2DAD40D20AAA6DBFF2459F0552A7A5479B8216CBF0ECF5987F553F6CF54ECEB6B23BAE4826FFB85EC12AA1B658D21C3B8630B9C9F3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................$...........5K.y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
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.8796761086931277
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMf6E7lOtdsO:SvS6ga
      MD5:0BB3E739719A5C203FED526ABDE45867
      SHA1:751D5F5CB5F1680E76B75290014B4750DCE35977
      SHA-256:01386960C1900C1CFBE656D29E88EA35F4BA1D78D7988644D86EC45F34801119
      SHA-512:2CDDCC772B8B6A40FE928F747197D1B29F08F77831EF1528ADB353041B58D272C685ED2115D71D2E9C1977D497E8B63027EBF98A9A881A422AFC74C410156879
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P..'....................'....5K.y.......'
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2908
      Entropy (8bit):5.500383084289559
      Encrypted:false
      SSDEEP:48:zP5tcyaYVibOtE8x+Sgk5ZWnqpZXXZJ8HHzHE7UTqEPmwHyhCnLnliE:zJaYVuOS8mkWqppH8nzOUTqom1CDlP
      MD5:427516BD46D7ABFBE78809E700437215
      SHA1:ACB8CA7C1519B8FD0D3EC3C8A3C177CDA9CFC348
      SHA-256:4FD20050B4E5C96BF2F6F5DAF010201709B8C0C31281CCDACCA5C4DB7D8B1B5E
      SHA-512:D0546D2C41348911E6DB6C3D91A74A16BDB3DCDE11C7377A3E2DDFB894C6E96D0ED61EEF01D8C7F811475CF2857BE7A5A5E279FA67C2BAFBD05EAB53A076A8FE
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .z..............&.....z.....5K.y..A...S...P.B.B...J.e.p.u.n...J.e.r.m.a.n...B.e.l.a.n.d.a...K.e.m.b.o.j.a...2...1...4.9...2...M.a.g.h.r.i.b.i...S.e.p.a.n.y.o.l...Z.o.n. .E.u.r.o...A.s.i.a. .B.a.r.a.t...A.s.i.a. .T.i.m.u.r...T.i.m.o.r. .T.i.m.u.r...A.f.r.i.k.a. .B.a.r.a.t...A.f.r.i.k.a. .T.i.m.u.r...A.f.r.i.k.a. .U.t.a.r.a...A.s.i.a. .S.e.l.a.t.a.n...E.r.o.p.a.h. .B.a.r.a.t...E.r.o.p.a.h. .T.i.m.u.r...E.r.o.p.a.h. .U.t.a.r.a...K.o.t.a. .V.a.t.i.c.a.n...P.u.l.a.u. .K.r.i.s.m.a.s...P.u.l.a.u. .N.o.r.f.o.l.k...U.t.a.r.a. .A.m.e.r.i.k.a...E.r.o.p.a.h. .S.e.l.a.t.a.n...R.e.p.u.b.l.i.k. .C.z.e.c.h...S.e.l.a.t.a.n. .A.f.r.i.k.a...K.e.s.a.t.u.a.n. .E.r.o.p.a.h...G.u.i.a.n.a. .P.e.r.a.n.c.i.s...M.a.c.e.d.o.n.i.a. .U.t.a.r.a...W.i.l.a.y.a.h. .P.a.l.e.s.t.i.n...A.m.e.r.i.k.a. .S.y.a.r.i.k.a.t...C.o.n.g.o. .(.R.e.p.u.b.l.i.k.)...B.e.l.a.n.d.a. .C.a.r.i.b.b.e.a.n...O.c.e.a.n.i.a. .T.e.r.p.e.n.c.i.l...R.e.p.u.b.l.i.k. .D.o.m.i.n.i.c.a...K.e.p.u.l.a.u.a.n. .F.a.l.k.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):7012
      Entropy (8bit):4.454589802438993
      Encrypted:false
      SSDEEP:192:/RdNPtg6lEdl+iuRDwHA2qs8sWtDqpvBzdg:/PNPtg6li+Z0gm7WpcBhg
      MD5:63AF89DDBB1D47406505FF260F8F1236
      SHA1:6778D65EDFD8C375CA961D48A30E4912A1EE7811
      SHA-256:0C333EA48C3334602D88ACC9A2629853EEDD8D167F828834EEC2AA7B3928BE93
      SHA-512:361DCA49295B9B06A59722EAC8F2E0B4E5EB8C1A246B8ED647063A6A128594C56357CCCEC8FB4BBF082A1EA6359DAC9ED20E720FE3754FDA58BB0D3F5C595568
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .z....................z.....5K.y..A.s.j.a...F.i.!.i...D.i.n.j.a.....i.p.r.u...E.w.r.o.p.a...F.r.a.n.z.a...I.|.r.a.e.l...S.p.a.n.j.a...A.f.f.r.i.k.a...i.l.-.M.a.l.i...i...-...i.l.i...i...-...i.n.a...l.-.I.n.d.j.a... .i.b.i.l.t.....O...e.j.a.n.j.a...i.l.-.K.e.n.j.a...i.l.-.L.i.b.j.a...i.n.-.N.i.!.e.r...i.s.-.S.i.r.j.a...i.s.-.S.u.d.a.n...l.-.E.!.i.t.t.u...l.-.I.t.a.l.j.a...I.l.-.B.r.a.|.i.l...M.e.l.a.n.e.s.j.a...P.o.l.i.n.e.s.j.a...i.l.-.B.e.l.!.j.u...i.l.-.G.a.m.b.j.a...i.l.-.G.r.e...j.a...i.l.-.G.u.i.n.e.a...i.l.-.G.u.y.a.n.a...i.l.-.K.u.w.a.j.t...i.l.-.L.a.t.v.j.a...i.l.-.L.i.b.a.n.u...i.l.-.M.a.l.a.w.i...i.l.-.M.a.r.o.k.k...i.l.-. .a.p.p.u.n...i.l.-. .o.r.d.a.n...i.r.-.R.u.s.s.j.a...i.s.-.S.e.r.b.j.a...i.t.-.T.a.j.w.a.n...i.|.-.{.a.m.b.j.a...l.-.A.r.m.e.n.j.a...l.-.E.s.t.o.n.j.a...l.-.E.t.j.o.p.j.a...l.-.I.|.v.e.z.j.a...l.-.U.k.r.a.j.n.a...l.-.U.r.u.g.w.a.j...l.-.i.|.l.a.n.d.a...i.l.-.B.o.l.i.v.j.a...i.l.-.K.r.o.a.z.j.a...i.l.-.L.i.b.e.r.j.a...i.l.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):3296
      Entropy (8bit):4.746544504742137
      Encrypted:false
      SSDEEP:96:C3Tk4asHzql2wjzP5PKTaXaaFp0kXF9D5+4+ehg:3h3pN1fFRcEhg
      MD5:5ED1EFBC861226F9ACD4BB217E747B53
      SHA1:7B7E7EF3D60422B1E19E849369A5265EC11C0303
      SHA-256:A2E4A3BCBD8CF21F361EDD2BC6A109C96BB82ABCDB9304BC3DCE25712E3499A7
      SHA-512:021EAE11C95DBA7958CC2885B6F40B112B42D9692B725C2C7039A55B0F6FA5CBBE68017C21F509C0AC4E1008C9B6AAD9A841E362072A02723C4D7697115CFB78
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................,.. .4......0...0.........4.,...5K.y..C.u.b.a.b...F.i.j.i.b...I.r.a.q.i...M.a.l.i.b...P.e.r.u.b...T.o.g.o.b...A.r.u.b.a.b...B.e.n.i.n.s...C.h.i.l.i.b...C.h.i.n.a.b...C.o.n.g.o.b...G.h.a.n.a.b...I.n.d.i.a.b...I.r.a.n.n.i...K.e.n.y.a.b...L.i.b.y.a.b...N.i.g.e.r.i...R.a.s.i.a.b...S.w.e.d.e.b...S.y.r.i.a.b...A.n.g.o.l.a.b...B.h.u.t.a.n.s...E.g.i.p.t.e.b...G.a.m.b.i.a.b...I.r.l.a.n.d.i...I.t.a.l.i.a.b...J.a.p.a.n.n.i...K.a.n.a.d.a.b...M.a.l.a.w.i.b...M.e.x.i.c.o.b...R.w.a.n.d.a.b...S.p.a.n.i.e.b...S.u.d.a.n.n.i...U.g.a.n.d.a.b...Z.a.m.b.i.a.b...A.l.b.a.n.i.a.b...A.l.g.e.r.i.a.b...A.m.e.r.i.k.a.b...A.n.d.o.r.r.a.b...A.r.m.e.n.i.a.b...A.u.s.t.r.i.a.b...B.o.l.i.v.i.a.b...B.u.r.u.n.d.i.b...C.r.o.a.t.i.a.b...D.e.n.m.a.r.k.i...E.c.u.a.d.o.r.i...E.r.i.t.r.e.a.b...E.s.t.o.n.i.a.b...F.i.n.l.a.n.d.i...G.e.o.r.g.i.a.b...J.a.m.a.i.c.a.b...J.o.r.d.a.n.n.i...L.e.s.o.t.h.o.b...L.i.b.e.r.i.a.b...N.a.m.i.b.i.a.b...N.i.g.e.r.i.e.b...N.o.o.r.w.e.e.b...S.o.m.a.l.i.a.b...T.u.n.i.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2796
      Entropy (8bit):5.5411897860867265
      Encrypted:false
      SSDEEP:48:wPxlPMbmDB4agk24Da70rG/9XrX//92tEA/9zVjWQorNnqpZXXZJ8HHzHH7GFmO2:wplEboBHYwI9T92Ku9qqppH8nzbGVSfL
      MD5:D2C34DACC62207504883361675C82010
      SHA1:0115BDB5D245920954A26E811B0EBFBBC6ECB8AD
      SHA-256:4141C6EDD1A0F36328D15A341F268F86CE58D40F6F71B554D24BB2CBEB9CC6D5
      SHA-512:F97FBBF3B64930785AEDC0729D611B7BC798E78441B20D8BDAE1F1952D44FFB9DE015A7960162E9E9DBC7DA484E5370F02DD4DCB5BD2D00F087ACFF54C552646
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................$...........5K.y..F.N...E.U...H.e.l.l.a.s...S.v.e.i.t.s...T.y.r.k.i.a...v.e.r.d.e.n...F...r...y.e.n.e...K.o.m.o.r.e.n.e...S...r.-.A.s.i.a...T.s.j.e.k.k.i.a.....s.t.-.A.s.i.a...C.o.o.k...y.e.n.e...M.a.l.d.i.v.e.n.e...e.u.r.o.s.o.n.e.n.....s.t.-.T.i.m.o.r.....s.t.e.r.r.i.k.e...K.o.k.o.s...y.e.n.e.....s.t.-.A.f.r.i.k.a...C.a.y.m.a.n...y.e.n.e...F.i.l.i.p.p.i.n.e.n.e...K.a.n.a.r.i...y.e.n.e...S.e.y.c.h.e.l.l.e.n.e...S.a.l.o.m.o.n...y.e.n.e...H.v.i.t.e.r.u.s.s.l.a.n.d...M.a.r.s.h.a.l.l...y.e.n.e...P.i.t.c.a.i.r.n...y.e.n.e...F.a.l.k.l.a.n.d.s...y.e.n.e...M.e.l.l.o.m.-.A.m.e.r.i.k.a...N.o.r.d.-.M.a.k.e.d.o.n.i.a...N.o.r.d.-.M.a.r.i.a.n.e.n.e...S...r.l.i.g.e. .A.f.r.i.k.a...U.S.A.s. .y.t.r.e. ...y.e.r...N.o.r.d.l.i.g.e. .A.m.e.r.i.k.a...A.f.r.i.k.a. .s...r. .f.o.r. .S.a.h.a.r.a...T.u.r.k.s.-. .o.g. .C.a.i.c.o.s...y.e.n.e...D.e. .b.r.i.t.i.s.k.e. .j.o.m.f.r.u...y.e.n.e...D.e.t. .p.a.l.e.s.t.i.n.s.k.e. .o.m.r...d.e.t...H.e.a.r.d.-. .o.g. .M.c.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.500123730064915
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/dsp:SBtkJ1li6gml/8
      MD5:3F209B3AA35603DCBB208A74CAA36C86
      SHA1:249DE057005BE697205333ABA0433C5B04653BBB
      SHA-256:F3965E339C622C96879DEE316DE42F9E9F693DDEB7A52FDCEBBA027171F2C86A
      SHA-512:02411AE5728814057E0CA78D850EEA85B3ACA16DFDBEE97A7C01860DA3B82640EEBE60960938C7F64B05D9E9FE8BAE0B826D242E24B33C40024836F716F17E31
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................5K.y........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):84
      Entropy (8bit):2.692276143673127
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlZelgylslplglYug8RHl9P:SBtkJQltWpglYuHH7P
      MD5:A20A266B4FDEA042A20F265468A6A501
      SHA1:36F9102A3169B1787817FCEA34E8C0A198761657
      SHA-256:D2805C8B1BB6406742A9ECD71F92C9B8302DD930114AA5EEFEF13A66AFC156D2
      SHA-512:4D582ADED5FA133C7F83499DC459A518A01BF6B43F1581BCA109D39429C366D2C342F0FCB89A093F3FC0087831BC0DB267367DE99159F5C5968DF422D9A7D707
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................5K.y..n.b...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):88
      Entropy (8bit):2.7148996570578574
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlKelBjlgljl/k8RLljai:SBtkJTl4dLR
      MD5:CDD1830D8DEC6C5030045EB7264E6618
      SHA1:3F94BE38AE0BCD5FE2C17C061397EA2DC667447B
      SHA-256:CB425C849B362D7BFC6026AEE3B3211B2C772D843FAB067337FB8DA6C46EDEBC
      SHA-512:9FFA9ED115940FB49AC436DC71653F1D7FFD111152E7F9CDBEA6CC2FB7CF37DCA031112905C8223D704BAE154B590CC57A098E57B70705ABDF45603ED729DA05
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................5K.y..n.n._.N.O.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):1748
      Entropy (8bit):5.754796875499855
      Encrypted:false
      SSDEEP:48:8qAG2+dovzWINpmkXWa9D5HekaM9c2sXfeL:97ZdS70kXF9D5+7MGPM
      MD5:90C26955F2554BF6A6287240F9190520
      SHA1:B3277800095C78449D2CB937467C5EB446ABABE9
      SHA-256:4C13F180B8EC2A4A89122AC6AE9F45BF87ABD495235461C7A55093968E617769
      SHA-512:AC84BB969287ACDE176C5FADC2CCE2DCB520E39748801E984F5651A6328C140476ECA025FA630F36573102E964D10BC219CCE85F6E129583143D36F1FE762001
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................5K.y..G.u.n.i...M.a.r.i...N.e.p.o...I.t.a.r.e...S.w.i.s.i...A.n.g.o.r.a...B.e.r.i.z.e...B.u.f.i.n.i...I.k.w.e.d.a...I.r.a.a.k.a...I.r.a.a.n.i...K.o.r.o.m.o...M.a.r.a.w.i...M.a.r.i.t.a...N.a.i.g.y.a...N.o.o.r.w.e...P.o.c.u.g.o...R.r.a.s.h.a...T.u.v.a.r.u...A.n.g.w.i.r.a...G.a.b.o.o.n.i...G.u.r.i.i.s.i...G.y.o.g.i.y.a...K.u.w.e.i.t.i...P.a.l.a.a.w.u...A.r.u.b.a.n.i.a...B.a.r.a.r.u.s.i...G.y.a.m.a.i.k.a...G.y.a.p.a.a.n.i...H.o.o.r.a.n.d.i...I.r.e.r.a.n.d.i...I.s.i.r.a.i.r.i...K.o.r.a.s.i.y.a...M.o.n.g.o.r.i.a...M.o.r.i.d.o.v.a...M.y.a.n.a.m.a.r...O.s.i.t.u.r.i.a...P.i.t.k.a.i.n.i...P.o.o.r.a.n.d.i...T.a.i.r.a.n.d.i...T.o.k.e.r.a.w.u...U.k.u.r.e.i.n.i...P.a.r.e.s.t.i.i.n.a. .n.a. .G.a.z.a...E.b.i.z.i.n.g.a. .b.y.a. .I.n.d.i.a.n. .e.b.y.a. .B.u.n.g.y.e.r.e.z.a...............................................................................................".+...1.7.:.=.@.C.I.L.O.U.X.[.d.g.j.m.s.v.y.|...............................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):8548
      Entropy (8bit):4.518913879329421
      Encrypted:false
      SSDEEP:192:aRnys3rxKvznNGLHmjPfflDRq8An+2myUbDwKSNXy8OizTqpJ8T6R:4N2GSr3ZUebDnUPq8GR
      MD5:DFA60ED2B3D70EC1FD47B6D07E471DEB
      SHA1:4994BBFEFE45552D0FB678DDAE2E3B126504A424
      SHA-256:B607295DC200962B6EE638DC8742FF3C166D147ED37296C3D16D4061D6620085
      SHA-512:9E76BCDB3FEDAA83446124E70040DB69199F566580D6CD00FF28CD1C1A7ECD457B8A8209DE476AC17D78227589F838F8FC614BD8849BC7BA47086A447891E3CA
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................J.. ..!.....Q...Q...&......!J...5K.y..(.?.......0.>.(.....>.(.>.....>.&.M.....?.(.M.....K...K...(.0.q.G...*.G.0.A...+.?...?...-.>.0.$.....>.2.?..._.A...G.....0.A.,.>.......>.2.@.....0.>...M.......>.(.M.....$.>.0.M.....A...$.M.....A.....M.....G...?.......0.M.8.?.....>.*.>.(...(.>.....0...(.>...0.A...(.G.*.>.3...*.>.2.>.....,.?.6.M.q...-.A...>.(.....0.?.8.8.....>...>.......>.2.q.?...0.A.7.?.....2.>...8.M...8.?.0.?.....9... .......9.>...$.?.......?.*.M.......0.A...A.......>.(.>.!.>.....G.(.?._.>.....K.8.K.-.K.....M.q.?.,.>.....>.,.K.(.M.....M.0.@.8.M.....?.2.M.2.@.....0.M...?.......?.,.K...?.....K...M...>...$.>...q.>.(...$.A.-.>.2.A...$.A.0.M...@...*.>.(.>...>...,.G.(.?.(.M...,.G.2.?...M...,.K.2.-.?.......>.2.M...>.....>._.K...G.....K.(.>...K...2.>...-.?.....2.?.,.M._.>...2.G.8.K.%.K...8.0.M.,.?.....8.M.*.G.(.M..._.G...G.(.M.......M...K.2.>.....#.M.!.K.0.>.....2...G.0.?.......2.,.>.(.?.......%.?...*.?.........>.#.M.!.>.....A.0.>...>.......K...K.0.8.M.....>.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):400
      Entropy (8bit):4.482269378093527
      Encrypted:false
      SSDEEP:6:SvulJu0hHroiatjy/Wh4r566IAism/cLD/2h+uyaQfKQVifWlKlh6hLLkvl+n:Y0Foam6ssWoDNfZYOQlMlLuo
      MD5:0C39DD0B94EAC67B28912AE4F258D1BE
      SHA1:0B4AAFE3065506623FC07415EADDDC601C0C0536
      SHA-256:25EEC410A057F71FB7AE277487F69D004E38D90BB2DF523CF32458BF74C2EDC0
      SHA-512:FCE8C5F0E76B0C20F6D12B196F6F72B2CC32CBF9970DF15D6700C7A6AD49063D372C4C7F86240CA61F35C3B0EE4BE15A149D996870C942E23D5E178E13B0CDEF
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................X.. ........\...\...........X...5K.y......(.....7.8.....C.=.5.....=.4.8.../.?.>.=...$.@.0.=.F.....D.@.8.:.......5.@.<.0.=.....2.@.>.?.......:.5.0.=.8...#...@...A.5.....<.5.@.8.:.......@.0.7.8.;.8.....C.K.@.4.7.K.A.B.>.=...!.B.K.@. ...@.8.B.0.=.8.......7.>.=.3... .1...A.B.............6.b.n.....1.s.y...........Y...$.9.N.\. .G.d...@.3.x.l.).....U...............x..P. .`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):7536
      Entropy (8bit):4.616013059031144
      Encrypted:false
      SSDEEP:192:G1NhrTHBIo93MPxOHEvdLenTThdjLAMarNqpJ85tzIrFX:GfhJIcsIcq8UrFX
      MD5:F553898247292782F5C9772A0B96A648
      SHA1:89B4BF3C035D28D78F81DE0F475D6B5A90367F31
      SHA-256:D326D208E514D6C250096C7A76655AF3348D7ED7E083844E3C3CBCA895C52C8B
      SHA-512:3D38A2C05A6CCC3D7F3BCD45EA6EC0D317118C3CCE2794C41D65060ED168B0982960B160F3493F3E803D20A5DD2F312303DE5A2C82621A596D7A337FA7128B7E
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................M.. .(%.....T...T...$.....(%M...5K.y....$.0.....>.!.../...(.......2.@.....0.>.......0.>.(.......>.(.....,.K.(.....A.........>.(.>.....?.2.@.....*.>.(.....0.8.@.....K...K...(.?./.B...*.2.>.....*.G.0.B...-.>.0.$.......>.......>.2.@.....?.8.0...2.>...8...8.*.G.(...9.H.$.@.....0.B.,.>.....?...,.>.....@.(.@.......A.5.H.$.....0.(...@.....M.0.@.8.....H...@.......0...(.@.....>.0.!.(.....L.....>...$.A.0...@...(.>.....0...(.>...0.B...(.>.0.5.G...(.G.*.>.2...*.(.>...>...+.<.?...@...,.G.(.?.(...-.B...>.(.....2.>.5.@.....>.2...>...2.@.,.@.....8.0.,.@.....8.5.@.!.(...8.>...K.....8.@.0.@.....8.B.!.>.(...8.p.8.>.0...9.p...0.@.....p...K.2.>.....p.!.K.0.>.....8...0.@.......%.K.*.@.......0.B...5.G.....H.(.G.!.>.....H...0.B.(.....K.8.K.5.K.....A./.>.(.>.....H...,.@.........>.....>.....>.0...@.......A.5.>.2.B...$.>...5.>.(...*.K.2.H...!...+.<.0.>...8...,.0...B.!.>...,.0.B.(.G.....,.9.>...>.8...,.9.?.0.@.(...,.G.2.@...<.....>./.K...@.....>.2.&.@.5.....K.(.>...K.....K.0.q...K.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):96
      Entropy (8bit):3.229056480515185
      Encrypted:false
      SSDEEP:3:XCbVSm/tluFr2t9vlullal1BsP9mZDlMlAtn:Sv6qtmlEDc9mZDlBtn
      MD5:B96D1C36722A0227462AD011F3C8E493
      SHA1:42B4468CD47F62233636872349C2F3329131D506
      SHA-256:3868207145A4594D1CAFC4DA91E606EBD2094D8DBAC643E76050469622725F50
      SHA-512:322747A90E8C676D8EBD73A1145B3CDFC40C3617BB8E492A1A623677633AD67C589B25D9FAB19D60CCC613A226386B7D3F3CE5F186FA5DB749A9D8BADD2D7613
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .. .................... ....5K.y...................`...P. .`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.500123730064915
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/dsp:SBtkJ1li6gml/8
      MD5:3F209B3AA35603DCBB208A74CAA36C86
      SHA1:249DE057005BE697205333ABA0433C5B04653BBB
      SHA-256:F3965E339C622C96879DEE316DE42F9E9F693DDEB7A52FDCEBBA027171F2C86A
      SHA-512:02411AE5728814057E0CA78D850EEA85B3ACA16DFDBEE97A7C01860DA3B82640EEBE60960938C7F64B05D9E9FE8BAE0B826D242E24B33C40024836F716F17E31
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................5K.y........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.945547915629603
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDklU8gl8l/dP7Mx/1P:SBtkJYlU8g8l/1IZ1P
      MD5:6760A138D30FB15DA4638F9222503DFE
      SHA1:F11F287CF4071D6484E5BA2F5CF82EB91ACDE066
      SHA-256:7F2CBEC17D56520885A79550149BB793A867239CE35657A25AA0EB024B2D6A21
      SHA-512:169BF401F9977966604D77618717C1BCE84F4B6128F268AB3D73875D44A3D32DB8D358CA9D87F971205836EF2FE87406FBB860A12D483CB188BD2EC73F854B33
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................5K.y..p.a._.G.u.r.u._.I.N...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.905547915629603
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDklU8gl8l/dPRJDP:SBtkJYlU8g8l/1RZP
      MD5:EB9D9231B8A00082A5998FB7EEA309B9
      SHA1:3697B4F58D17DB9CF4DD2DF17CA2E820F362C42B
      SHA-256:92B84E3D79FD624F95A116E6C68BE1C014B09C1A0CDBEC30B27A4FD8B58A151F
      SHA-512:51C0255C24875D448BA3876C8078BE733F8C3632CEC09A1B2E263036E7D315FEC87AA24437E136478A727C71929432FCE83BB8C50ED05DE73A303BED87D49B00
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................5K.y..p.a._.A.r.a.b._.P.K...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):4032
      Entropy (8bit):5.032533647396089
      Encrypted:false
      SSDEEP:96:pxtzkdcGaRGeuYnrOq/cdqppH8nzOhzT9stXx:VzkxaRGeuYnrOq/WqpJ8GqXx
      MD5:5B7F485FCFE4220EF1D431BFD09183FA
      SHA1:AE6A6B81DE7B5D4EF8306EB4A6EDEA013EE76044
      SHA-256:FC6CD34DEDF08360BF728D06295D05B80CE0F04D31A9F455F79B3A38BE7E3992
      SHA-512:85E41B2906798812E9B1E90B8CEF1D46D304181A5DFF15D77A63CDF0DEADE6C885A7359CF1DFE5E009F4A8FF31FAAA5AAEDCBB77FB4651D167C75A31F931F8B1
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ...............&..........5K.y..I.r.....O.m.......s.i.a...B.u.t...o...C.h.a.d.e...E.g.i.t.o...G.a.b...o...I...m.e.n...J.a.p...o...S.u.d...o...S.u.....a...G.r...c.i.a...G...m.b.i.a...I.r.a.q.u.e...M...n.a.c.o...Q.u...n.i.a...S.u...c.i.a...S...r.v.i.a...V.i.e.t.n.....Z...m.b.i.a...A.l.b...n.i.a...A.r.g...l.i.a...A.r.m...n.i.a...C.a.m.b.o.j.a...C.r.o...c.i.a...E.s.p.a.n.h.a...E.s.t...n.i.a...G.e...r.g.i.a...H.u.n.g.r.i.a...L.e.t...n.i.a...M.a.l...s.i.a...P.o.l...n.i.a...R.e.u.n.i...o...R.o.m...n.i.a...U.c.r...n.i.a...A.l.e.m.a.n.h.a...A.m...r.i.c.a.s...C.a.m.a.r...e.s...C.o.l...m.b.i.a...E.r.i.t.r.e.i.a...I.s.l...n.d.i.a...J.o.r.d...n.i.a...L.i.t.u...n.i.a...M.a.u.r...c.i.o...T.a.n.z...n.i.a...T.c.h...q.u.i.a...Z.i.m.b...b.u.e...M.e.l.a.n...s.i.a...P.o.l.i.n...s.i.a...S.e.i.c.h.e.l.e.s...P.s.e.u.d.o.b.i.d.i...A.u.s.t.r.a.l...s.i.a...C.a.z.a.q.u.i.s.t...o...G.r.o.e.n.l...n.d.i.a...I.l.h.a. .B.o.u.v.e.t...I.l.h.a. .d.e. .M.a.n...I.l.h.a.s. .A.l.a.n.d...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.137653166597381
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMKlllFq8lvmY2:SvzlvmB
      MD5:606DD5E86352CBA8A2A4F4561837824B
      SHA1:5C0059F5CBDD887FB652FA79AD87AAC0F8865EA8
      SHA-256:3A85BADE8A7A6DB69C28C9388EF247294248DF06F9D9D406198479426B31D70C
      SHA-512:66C908320950530C345997B522E12D7D6603DF931FE32B43644A2DDFA12BE7795C9582C070ADB744FBDE9DF287816FC8584F5F1A2BC2158ABD8BFC9BA4B20E0C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.:"...................:"....5K.y..........9"
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.137653166597381
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMKlllFq8lvmY2:SvzlvmB
      MD5:606DD5E86352CBA8A2A4F4561837824B
      SHA1:5C0059F5CBDD887FB652FA79AD87AAC0F8865EA8
      SHA-256:3A85BADE8A7A6DB69C28C9388EF247294248DF06F9D9D406198479426B31D70C
      SHA-512:66C908320950530C345997B522E12D7D6603DF931FE32B43644A2DDFA12BE7795C9582C070ADB744FBDE9DF287816FC8584F5F1A2BC2158ABD8BFC9BA4B20E0C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.:"...................:"....5K.y..........9"
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.137653166597381
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMKlllFq8lvmY2:SvzlvmB
      MD5:606DD5E86352CBA8A2A4F4561837824B
      SHA1:5C0059F5CBDD887FB652FA79AD87AAC0F8865EA8
      SHA-256:3A85BADE8A7A6DB69C28C9388EF247294248DF06F9D9D406198479426B31D70C
      SHA-512:66C908320950530C345997B522E12D7D6603DF931FE32B43644A2DDFA12BE7795C9582C070ADB744FBDE9DF287816FC8584F5F1A2BC2158ABD8BFC9BA4B20E0C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.:"...................:"....5K.y..........9"
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):1300
      Entropy (8bit):6.067993847402924
      Encrypted:false
      SSDEEP:24:5l9WMwj+lX5sD0Ilan6Mr7nNpmOJx+vJnchZSWZyuLixavv76n0KGtoNUCCL+h8n:RHwWsDJUBr7nVJYvihMWZ+Qv74Gto6CG
      MD5:1A951C187745FBC669A2AAF5FE259D85
      SHA1:471AC0F9E7EAF3A991B9A0EC779B922410252BAC
      SHA-256:4E770FE256A9227FAD9FEE6A655D2CAEB3060D8977A95F2C9C51E17EC46791D8
      SHA-512:6A2B27A953CC446A961F231159FF2C4C9E40CC8CB0B0B58CEF44F34E063B36AD87F0202C7F1188FA271DB8C2D9609805B3191814A0D80D0C27D4C5B0AD09B7CE
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................9.. ........=...=...........9...5K.y..F.i.y.i...T...n.e.z...B.a.r...i.n...Y.i.b.u.t.i...A.r.g.e.l.i.a...B.o.n.a.i.r.e...C.u.r.a.z.a.o...P.a.k.i.s.t...n...M.a.c.a.o. .R.A.E...E.R.Y. .M.a.c.e.d.o.n.i.a...I.s.l.a. .C.h.r.i.s.t.m.a.s...H.o.n.g. .K.o.n.g. .(.R.A.E.)...P.a.l.e.s.t.i.n.a. .K.a.m.a.c.h.i.k.u.q...E.E...U.U... .I.s.l.a.s. .V...r.g.e.n.e.s...S.a.n.t.a. .S.e.d.e. .(.C.i.u.d.a.d. .d.e.l. .V.a.t.i.c.a.n.o.)...I.s.l.a.s. .m.e.n.o.r.e.s. .a.l.e.j.a.d.a.s. .d.e. .l.o.s. .E.E...U.U.............................................................................%.(.+.1.7.:.=.C.I.L.O.U.X.[.d.g.m.s.v.y...............................................................................!.$.'.*.0.3.6.<.?.B.E.H.K.Q.T.Z.`.c.f.i.l.r.u.x.{.~....................................................................................... .#.&.).,.2.8.;.>.A.J.P.S.Y.\._.b.h.n.q.t.w.z.........K!.5.!.!...@.`.".?19#R'.E3...2....i!$...g3E...'..EvA..}.h`../....3.R..,.U.......U$.3...!.!..U!..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):3756
      Entropy (8bit):4.96994431325348
      Encrypted:false
      SSDEEP:48:6RjBgHiZE09u1gAmcN0wBLmXybNTTjW8joLnmBxuJf0cC+zFh7s74trcs:Iwi1+gAyYdTSkE4xuWcC+zFts74D
      MD5:F487A3A428E3C8C4B88A457AFB9F8E90
      SHA1:F3C926B63B0D4F86AE91DCC3BF78FCFF3E0213B7
      SHA-256:65628294C10054DE4B62CD66558DA6C2E06D1E7FEA9556B46D1F60B15BED52E5
      SHA-512:5FA90668B02AA313F5B1E822671F9711D972D7DEA7DD47B7CD943375C47664B61D2C824B8D810142DCB291854494287B08F14997BFF0208C5532AB6D1C6E8E2B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................InstalledLocales.af.agq.ak.ar.ar_AE.ar_LY.ar_SA.asa.ast.az.az_Cyrl.az_Latn.az_Latn_AZ.bas.be.bem.bez.bg.bm.bn.bn_IN.bo.bo_IN.br.brx.bs.bs_Cyrl.bs_Latn.bs_Latn_BA.ca.ccp.ce.ceb.cgg.chr.ckb.cs.cy.da.dav.de_AT.de_CH.dje.dsb.dua.dyo.dz.ebu.ee.el.en.en_150.en_AG.en_AI.en_AT.en_AU.en_BB.en_BE.en_BM.en_BS.en_BW.en_BZ.en_CA.en_CC.en_CH.en_CK.en_CM.en_CX.en_CY.en_DE.en_DG.en_DK.en_DM.en_ER.en_FI.en_FJ.en_FK.en_FM.en_GB.en_GD.en_GG.en_GH.en_GI.en_GM.en_GY.en_HK.en_IE.en_IL.en_IM.en_IN.en_IO.en_JE.en_JM.en_KE.en_KI.en_KN.en_KY.en_LC.en_LR.en_LS.en_MG.en_MO.en_MS.en_MT.en_MU.en_MW.en_MY.en_NA.en_NF.en_NG.en_NL.en_NR.en_NU.en_NZ.en_PG.en_PH.en_PK.en_PN.en_PW.en_RW.en_SB.en_SC.en_SD.en_SE.en_SG.en_SH.en_SI.en_SL.en_SS.en_SX.en_SZ.en_TC.en_TK.en_TO.en_TT.en_TV.en_TZ.en_UG.en_VC.en_VG.en_VU.en_WS.en_ZA.en_ZM.en_ZW.es_419.es_AR.es_BO.es_BR.es_BZ.es_CL.es_CO.es_CR.es_CU.es_DO.es_EC.es_GT.es_HN.es_MX.es_NI.es_PA.es_PE.es_PR.es_PY.es_SV.es_US
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):4736
      Entropy (8bit):4.4125393029177555
      Encrypted:false
      SSDEEP:96:gy83HRYhPvx+alSLGSxnveqQ/V1x0kXF9D5+/jPOC:0hUzEL1xnC//xfFRcrPl
      MD5:AF51C4103682C64F7C0AD875320AB903
      SHA1:05349C5D2D7532F4F6D86384F20E8ACCA71E4C9B
      SHA-256:6B0F9FA0970F32F83C660E0F7FBBA180DF5212FC787FD8936E8D4F6EDD3D09A3
      SHA-512:D6D6BCF4EE9C29BB894C669E43DD02A4F07FD9C4473D4097F31AA4472E9484C55456620DF791DE0C614F0EEB6D69316AB149B0BDBF1B228FCD48ACF5680ABBA6
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .0....................0.....5K.y..G.a.b.o...K.i.b.a...G.u.n.e.y.a...G.u.y.a.n.e...I.r.i.g.w.e...L.a.t.i.v.a...L.i.b.a.n.i...M.a.r.o.k.e...S.u.w.e.d.i...B.e.l.a.u.s.i...I.k.e.r.e.n.e...K.a.m.b.o.j.e...P.a.r.a.g.w.e...P.o.l.o.n.y.e...U.b.u.d.a.g.e...B.u.r.e.z.i.l.i...B.u.r.u.n.e.y.i...E.k.w.a.t.e.r.i...G.e.r.e.n.a.d.a...I.r.i.l.a.n.d.i...M.a.l.e.z.i.y.a...M.i.g.i.z.i.k.e...M.o.l.u.d.a.v.e...M.o.l.u.d.a.v.i...N.i.j.e.r.i.y.a...N.o.r.u.v.e.j.i...O.t.i.r.i.s.h.e...R.u.m.a.n.i.y.a...S.e.h.e.l.e.n.e...S.e.l.u.s.i.y.a...T.u.n.i.z.i.y.a...T.u.r.u.k.i.y.a...U.b.u.g.a.n.d.e...U.b.u.h.i.n.d.i...U.b.u.r.u.n.d.i...V.a.n.u.w.a.t.u...u. .R.w.a.n.d.a...A.l.i.j.e.r.i.y.a...A.r.u.m.e.n.i.y.a...E.l.i.t.e.r.e.y.a...E.t.i.y.o.p.i.y.a...H.u.n.g.a.r.i.y.a...I.s.i.r.a.h.e.l.i...S.i.n.g.a.p.u.r.u...U.b.u.b.i.l.i.g.i...U.b.u.g.e.r.e.k.i...U.b.u.r.u.s.i.y.a...U.b.u.s.h.i.n.w.a...U.b.u.s.u.w.i.s.i...U.b.u.y.a.p.a.n.i...A.r.i.j.a.n.t.i.n.e...A.y.i.s.i.l.a.n.d.i...B.a.h.a.r.e.y.i.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):5692
      Entropy (8bit):4.633986220273737
      Encrypted:false
      SSDEEP:96:IhZw1J9XjpFGCqA/0ITLBZlYiBY74Q0uLI3YAUs8LCDYlYNQWdf5CVOqppH8nzOx:O0J9XjpFbHTLJY8nuNCZDCYNjN9qpJ8o
      MD5:DDA065AB17AA6CE5E7236B6798AD0C12
      SHA1:35AC868B54ECCDC6E20F021E56911050804A2BD0
      SHA-256:190ECB2F5E12D1D5DC1DFD49C358E4CAF6CB89939759E01AF0AC871F6BA3B4C8
      SHA-512:4821C9D6AF71162C665D56DB0BF5D583ADFFB3B18F908A753D81B99B0FC28CA0038B16DA47B1E6E7C64516DD6DD53C579E42567FDF603493544EECC820F2C072
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .p..............&.....p.....5K.y..C.i.a.d...L.u.m.e...C.e.h.i.a...C.i.p.r.u...M.e.x.i.c...F.r.a.n...a...S.u.e.d.i.a...T.u.r.c.i.a...A.m.e.r.i.c.i...C.a.r.a.i.b.e...C.r.o.a...i.a...E.l.v.e...i.a...G.u.i.n.e.e.a...R.o.m...n.i.a...U.n.g.a.r.i.a...B.r.a.z.i.l.i.a...C.o.l.u.m.b.i.a...E.r.i.t.r.e.e.a...F.i.n.l.a.n.d.a...I.o.r.d.a.n.i.a...M.o.z.a.m.b.i.c...S.l.o.v.a.c.i.a...D.a.n.e.m.a.r.c.a...G.u.a.d.e.l.u.p.a...T.h.a.i.l.a.n.d.a...G.r.o.e.n.l.a.n.d.a...I.n.s.u.l.a. .M.a.n...K...r.g...z.s.t.a.n...M.u.n.t.e.n.e.g.r.u...C.a.p.u.l. .V.e.r.d.e...R.e.g.a.t.u.l. .U.n.i.t...S.f...n.t.a. .E.l.e.n.a...S.f...n.t.a. .L.u.c.i.a...A.f.r.i.c.a. .d.e. .S.u.d...A.s.i.a. .C.e.n.t.r.a.l.....C.o.r.e.e.a. .d.e. .S.u.d...I.n.s.u.l.a. .B.o.u.v.e.t...I.n.s.u.l.e.l.e. .C.o.o.k...N.o.u.a. .Z.e.e.l.a.n.d.........r.i.l.e. .d.e. .J.o.s...A.m.e.r.i.c.a. .L.a.t.i.n.....A.m.e.r.i.c.a. .d.e. .S.u.d...A.r.a.b.i.a. .S.a.u.d.i.t.....A.s.i.a. .O.r.i.e.n.t.a.l.....C.o.r.e.e.a. .d.e. .N.o.r.d.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):4748
      Entropy (8bit):5.113677125627538
      Encrypted:false
      SSDEEP:96:cVJYvtVHlZgtCddKxNk1im8mqppH8nzOfkZI4:csv7O5AqpJ8DZI4
      MD5:12ECDE3D81167609E17A31EB9DBFC333
      SHA1:0DAAFAE6F8752E1828DDBD9A1D911DEC33D1AFC6
      SHA-256:4E9EBAC51FAE46E8BA6F24140313C954578ABAC6BF03C4AD0CFE9A53DE038C2D
      SHA-512:87B7A8829A587F682419E060D2C028DB02F2D9FB92A26D83C125656D576B28F6B03AC7BA326DD363FA973A124043D79DAE7039A233B35A3A56B7791A4CB12AD3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .U..............&.....U.....5K.y......-...........!.(........... .....0.3.0.<.K.....0.@.8.1.K.....>.<.>.@.K...".C.@.F.8.O...>.-.2. ...M.=.....8.@.3.8.7.8.O.....0.;.L.4.8.2.K...-.A.2.0.B.8.=.8...2.5.A.L. .<.8.@...5.2.@.>.7.>.=.0...>.-.2. ...C.2.5...$.8.;.8.?.?.8.=.K.....8.4.5.@.;.0.=.4.K.....6.=.0.O. ...7.8.O.....6.=.K.9. .!.C.4.0.=.....0.:.0.>. .(.!... .)...>.-.2. ...>.@.D.>.;.:...?.A.5.2.4.>.-.B.i.d.i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
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):472
      Entropy (8bit):4.254770992027674
      Encrypted:false
      SSDEEP:12:44/fR9vL5shJuMOD2rr50BlhZi/BmNmaBh:l/fR9vLsX5D2me
      MD5:84DFD43C8EF9EB3171AE7400E9DC72B8
      SHA1:D772CB903FBA0062E3CCA46B43AFFEF0DB1B360F
      SHA-256:03B3E40268B8ABA753C057ADDB4A7A16DA0D7162D511FDCD7B164C871210C0D4
      SHA-512:2D53C67A844A1E0D89E38A6A3D998038AABF017ECB352EF367560E4B1C63F433E23A25093A4BF4913CCAEA0C88B6B75B55F310A202704CF25A550ED187F5A6DE
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................j.. ..@.....n...n..........@j...5K.y....-.2. ...C.2.5.....-.2.0. ...C.:.0.....-.2. ...>.@.D.>.;.:.....-.2. . .>.6.4.5.A.B.2.0.....-.2. ...>.7.=.5.A.5.=.8.O.....-.2. ...;.8.?.?.5.@.B.>.=.....-.2.0. .%.5.@.4. .8. ...0.:.4.>.=.0.;.L.4.....1.J.5.4.8.=.5.=.=.K.5. ...@.0.1.A.:.8.5. .-.<.8.@.0.B.K...*...0.;.K.5. .".8.E.>.>.:.5.0.=.A.:.8.5. ...B.4.0.;.5.=.=.K.5. ...A.B.@.>.2.0. .!.(.................(...~.2.S.!AVA.@.@0A.A?A.A.@tA...........P9".`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):520
      Entropy (8bit):4.704074939659196
      Encrypted:false
      SSDEEP:12:D/ctTMh5ByztJoOlI/fkDMJ5MsUE1koxMvaFVlWcf:D/TPgox/l50E1kYMCvlWcf
      MD5:2A14AE336F7C498FFE146F79DEF0016E
      SHA1:DB3EB814E9C96CCAC20439A59EB258D44BF2FC9D
      SHA-256:D864C39B4C66E38E7E2123C66FA4AC550D9AEC5B6F488ECE60207842C78D8CA0
      SHA-512:A17BB659E88EE96EB4861A538D95056BB72DE1C4342259FB7ABFB181182394306A57394F82847A0085B4E81F908E45BDD40BBA05F88B60C3472797911CE810EF
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................u.. ..U.....z...z..........Uu...5K.y....%.(.....C.C.1.0...'.8.8.;.8...!.C.4.0.0.=.....0.=.0.0.4.0.....8.8.1.8.9.M.....0.?.K.@.K.:.0.....8.M.:.A.8.:.M.....M.=. .0.@.K.K.....0.=. .4.>.9.4.C.....@.0.A.A.K.K.9.0.....L.0.<.0.0.9.:.0...%.>.B.C.3.C. .-.<.8.M.@.8.:.M...!.>...C.@.C.C. .-.<.8.M.@.8.:.M.....<.5.@.8.:.0. .%.>.;.1.>...C.:.B.0.0.E. .(.B.0.0.B.B.0.@.0.......................L.d.y.........$.*.-.l.........Y..U.U.U.Uv..U.U...U..}$.U...U...U.....U.U...U.U6..V..Y..U.............P...P. .`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):984
      Entropy (8bit):6.664654262645045
      Encrypted:false
      SSDEEP:24:xmrJVJ7OkJBvWa9D2h1i/veBQ+7TTKO542Kc2hdl/QZ:xMmkXWa9D5HeXTb42SqZ
      MD5:2DC65410ADD51F24840BE253B3DE1E6A
      SHA1:555D4E6EB7C777E657DC6FA511950B6A31426BA1
      SHA-256:E8647FD90A97C6C221DEABE0E4E4F833E3B726C9424091695E2419045D7F2B60
      SHA-512:01BEC81C93895A11FDB507BCFE01386D0D590E20827AAD4AB59CE50E25DE3074801996FD2B3AC9D8231AF80049DC5ECAAB8E3AD38AE8FD9B4135706CDC53F60F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..........................5K.y..............................................................................................".+...1.7.:.=.@.C.I.L.O.U.X.[.d.g.j.m.s.v.y.|...............................................................................................!.$.'.*.-.0.3.6.?.B.E.H.K.N.T.W.Z.].`.c.f.i.l.o.r.u.x.{.~............................................................................................... .&.).,./.2.5.8.;.>.A.D.G.J.M.P.Y.\._.b.e.h.k.n.q.t.w.z..............h.J.v.2.!.!..u.wo.".?..."....b@M..3E3...2..-!B!i!G...... ...!$!..k./......`......6./"......{h.#.....~.}.....!..U!2........}.v.}.....!...}.._..#....W"."g.%J..M".I2~.......?~.W...Z..`3.)...Ko?..h..XRQ..2.w.}.`pJ...o.@.`Dw.3.3a"7!.!..u".....hAh;3..'w."l....3...".".@..,...x......_!<J..eo_..I..}.....j..3... q.G..w...".o...".".........."."..~!.A.w.3.h....z@[3q3.@..Z.s!D......"%...w...Ww.@.2.}.`.!q.o..v...o$3....O.'..~.R...?..9..". v`dh... .R... ...........P. .`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):6596
      Entropy (8bit):4.582969781761563
      Encrypted:false
      SSDEEP:192:7fiPyXjQz2RAZ9P/Vn+qmm5wbeiuXVqpJ80+PB1:7ljQz26bP9L35xrFq89B1
      MD5:0CE30C563F2EF94D505E1F752FFCDFF8
      SHA1:CC3FB3C19F63161FD93E1F4EFB239AD27227187B
      SHA-256:FF89D7A68F20D9190F01409987A044644CDA423F5CEC3A5E06415C7A9D7DD659
      SHA-512:55CB9660F862BED36E9CD18108B9F0F43F97E7CAFB609F9D4A03D64B1482D24E3485672A53C9661E76062B4566A76055C5F4DE80B81993863E2D36DBAE8CC588
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................b.. ..}.....i...i...&......}b...5K.y..4.'.E...A.,.J...J.E.F.....'.......D.J...'.}.D.J...(.J.F.F...*.1...J...,.1.3.J.../.F.J.'...D.(.J.'...F.H.H.J...G.J.}.J...~.J.1.H.....H.J.*.....(.H.F...'.3.~.J.F...'.F...J.'...'.J.1.'.F...(.J.D.J.2...*.H.'.D.H...,.1.E.F.J...,.E.J...'...3.1.(.J.'...3.E.H.&.'...9.1.H.(.'...E.'.D.}.'...E.J.'.*.J...E...'.&.H...F.'.1.H.J...F.J.~.'.D...J.H.'.J.3...J.H.F.'.F...}.H.F...'...~.D.'.&.H...~.F.'.E.'.....H.}.'.F.....J...J.'.....'.F...H.....J.F.J.'.....J.H.(.'.....G.'.F.'...".4.}.1.J.'...(.1.'.2.J.D...(.1.H.F...J...(.G.'.E.'.3...(.J.D.,.J.E...(...D.'.1.3...,.'.1.,.J.'...1.H.'.F...'...2.J.E.(.J.'...3.'.&.~.1.3...3.H.&.J...F...4.J. .4.D.2...A.D.~.'.&.F...D.'.*.H.J.'...D.J.3.H...H...D...H.F.J.'...E.'.D.'.H.J...E.'.D./.J.~...E.H.1.H...H...E.H.1.J.4.3...E.H.F.'...H...F.'.&.J.,.1...G.F...H.1.3...H.J.*.F.'.E...J.H...1.J.F...J.H...F...'...~.H.D.J.F.......&.F.'...'.....1.(.'.*.J.....H.3.H.H.H.....J.E.1.H.F.....1.J.F...'.....H.1.F.3.J.....J.E.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2040
      Entropy (8bit):5.5574526262727675
      Encrypted:false
      SSDEEP:48:TlBFHqF4BJ+1GY5PT5K7mkXWa9D5Heq9vC8:TlBFFJc1kXF9D5+kvC8
      MD5:357354C43E9AD4E7C379B2D645F8D2E1
      SHA1:BF16478ED6FD6BCB1B2D25D6A7E98CA90FAF843D
      SHA-256:4ED998147051D8CCA697A887E9781136BEF990899C4FAD009875AC3FD3D6C67C
      SHA-512:02A9217D79FC1B392818E4D3802463978A91C02AE649F6650F22D1D4479B9048513D0138FBEC87276E7599F0A133E6CC932B2D110DAA92AD1FCFC55C02EF8B3E
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..........................5K.y..I.r.....O.m.....B.u.t...o...C.h.a.d.e...E.g.i.t.o...G.a.b...o...I...m.e.n...J.a.p...o...S.u.d...o...S.u.....a...G.r...c.i.a...G...m.b.i.a...I.r.a.q.u.e...M...n.a.c.o...Q.u...n.i.a...S.u...c.i.a...V.i.e.t.n.....Z...m.b.i.a...A.l.b...n.i.a...A.r.g...l.i.a...A.r.m...n.i.a...C.a.m.b.o.j.a...C.r.o...c.i.a...E.s.p.a.n.h.a...E.s.t...n.i.a...G.e...r.g.i.a...H.o.l.a.n.d.a...H.u.n.g.r.i.a...L.e.t...n.i.a...M.a.l...s.i.a...M.i.a.n.m.a.r...P.o.l...n.i.a...R.e.u.n.i...o...R.o.m...n.i.a...U.c.r...n.i.a...A.l.e.m.a.n.h.a...C.o.l...m.b.i.a...E.r.i.t.r...i.a...I.s.l...n.d.i.a...J.o.r.d...n.i.a...L.i.t.u...n.i.a...M.a.u.r...c.i.o...Z.i.m.b...b.u.e...C.i.n.g.a.p.u.r.a...M.a.c.e.d...n.i.a...C.a.s.a.q.u.i.s.t...o...G.r.o...n.l.a.n.d.i.a...G.u.i.n... .B.i.s.s.a.u...I.l.h.a.s. .C.a.i.m.a.n...C.o.r...i.a. .d.o. .S.u.l...C.o.r...i.a. .d.o. .N.o.r.t.e...B...s.n.i.a.-.H.e.r.z.e.g.o.v.i.n.a...I.l.h.a.s. .T.u.r.k.s. .e. .C.a.i.c.o.s...S...o. .C.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):6352
      Entropy (8bit):4.4951873853187125
      Encrypted:false
      SSDEEP:192:a2mNnLb6/ifMjup2by/koDRDJyvRJqpJ8gmOL2q9yc:gNnLb6/SMjJ+rVIRJq8gmxq9yc
      MD5:3999867480C307F863F863BC0B991EA2
      SHA1:D1D3F671714F6C4EA8B0062635F14FFD01086651
      SHA-256:570AE9E16ED52A366253757650860ECCA1C5B0C2D33BEF9F3E89D53DEF3DCD72
      SHA-512:B19F5676B92E7879CFFCEA37202934B29EFE00C62D7AE61D7317D9B725FB55C97669854402591699E52677384FC99C1B103070CFF8932331A314475EFA9AB3BE
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................%.. ........,...,...&.......%...5K.y..M.B...A.z.i...O.K.B...S.H.B.A...B.o.t.a...G.a.n.....I.n.d.i...K.i.l.i...K.i.n.....K.u.b.....R.u.s.i.....e.k.i...A.r.u.b.....F.i.x.h.i...G.r.e.q.i...M.a.l.t.....Q.i.p.r.o...S.e.r.b.i...S.u.e.d.i...T.u.r.q.i...A.f.r.i.k.....A.n.g.o.l.....A.u.s.t.r.i...B.e.l.i.z.....E.g.j.i.p.t...E.t.i.o.p.i...E.v.r.o.p.....F.r.a.n.c.....J.a.p.o.n.i...K.o.s.o.v.....K.r.o.a.c.i...L.i.b.e.r.i...M.a.j.o.t.....N.i.g.e.r.i...O.q.e.a.n.i...P.o.l.o.n.i...R.u.a.n.d.....S.p.a.n.j.....U.g.a.n.d.....Z.v.i.c...r...A.l.g.j.e.r.i...A.m.e.r.i.k.....A.n.d.o.r.r.....A.n.g.u.i.l.....B.a.h.r.e.j.n...B.e.r.m.u.d.e...G.e.r.n.s.e.j...G.r.a.n.a.d.....G.u.a.j.a.n.....H.o.l.a.n.d.....I.r.l.a.n.d.....I.s.l.a.n.d.....J.o.r.d.a.n.i...K.a.r.a.i.b.e...K.i.r.g.i.z.i...K.o.l.u.m.b.i...L.i.t.u.a.n.i...M.a.l.a.j.z.i...M.e.k.s.i.k.....M.o.l.d.a.v.i...U.k.r.a.i.n.....X.h.e.r.s.e.j...X.h.i.b.u.t.i...A.u.s.t.r.a.l.i...B.e.l.g.j.i.k.....B.o.t.s.v.a.n.....B.u.l.l.g.a.r.i...D.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):140
      Entropy (8bit):4.434946620953675
      Encrypted:false
      SSDEEP:3:XCbVSm/tl7T2l/LlVtlDB91kQyWn2b9ydEsSOT/59In:Svul/z1Do9ydZTR+n
      MD5:45AA8BDBC6F5576977C83315D2BF720F
      SHA1:09987D3C1E0C7A886B36AA514C63255C6F18BE33
      SHA-256:D3630A23CEF696E3ED9C0BAE4AB59CAC0FAC9643722AAE1EF73BC2575C8DCA47
      SHA-512:5DBA4852D1F7BC03C42D9BC508531AA2A19409261FC1BCD03DC27D750132A7F73EBAD6B8B7130CB28C1A458778A3FD94D20D79CA9B78F59697A212A7D41E5280
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .0....................0.....5K.y......".......Q.....S.e./..:6a.OWx..>..A;.U...E..Z.............P...P. .`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.95862347711418
      Encrypted:false
      SSDEEP:3:XCbVSm/tlM+l/ut6E7lGlVsw:SvZl/ut6gGlp
      MD5:8AA325294C2FD5DEEC01CA244B93AA58
      SHA1:011734465C1C1150472A55B1ACDFEF43C7B06B33
      SHA-256:15C66467F6C3C3A65CADF4350F3237733FC5F7FD4107E45F967929C2CFB01B49
      SHA-512:D3ECBDADA97C0504726E191964B4AA041F257E794B9C7B40AE589DED5016125C48599CC30A2152FE3B401B0525C9FB190354D6E9F840DF97800CA333EA927F84
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P..6....................6....5K.y.......6
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.9159246284584364
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMwt6E7l9tQksAQn:Svbt6gfo
      MD5:5C56677A0822B6F922124F4E4AE5A625
      SHA1:D1A78F3F6F949CA8C8593DFD24A8C248642BBF38
      SHA-256:7D0E61F3CA3DAE5BB75AAF6318BDE4F128DA9662FE1D75FC245F5D4B5E4188CE
      SHA-512:0090C31C35AF1B6718F4DB3FE7AA2E6F06240B7895DF417FF9500E08C66A9F9D98095378558131C2D96EA129FDC7DF30BE876F4B18B887872B0ADDFA9C3A59A8
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P..5....................5....5K.y.......5
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):4088
      Entropy (8bit):4.9424596896562925
      Encrypted:false
      SSDEEP:48:M59Bgw27HPqAKMUw09nChvvMDqTxx462sN6nyWglONjPRtk5dR2BlNnqpZXXZJ8E:twqHPqFutxHS5x1qppH8nzbtfuvv
      MD5:19A9BE91745F74598CE1F90F209D6FBC
      SHA1:630727BB3E032E4A3C8AE95B6FDE963BDEA5E350
      SHA-256:C8DAFBFEAB89E53C9521B8FFD5ACCF85477A22048CE1251138332D5A9EAC0D69
      SHA-512:DC50610B3A03E628C918B10746C329E340B9D94D184D57F655236F685EEFA0A7AF1C8029ED34D4E7B351FB347330FD9A6F8133373A099CB78FC267F1C9CE375D
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .[..............$.....[.....5K.y..E.Z...S.a.u.d.i.a...U.c.h.i.n.a...C.h.e.c.h.i.a...A.n.t.a.k.t.i.k.i...A.z.e.r.b.a.i.j.a.n.i...K.o.n.g.o. .(.D.R.C.)...A.s.i.a. .y.a. .K.a.t.i...S.u.d.a.n. .K.u.s.i.n.i...U.m.o.j.a. .w.a. .U.l.a.y.a...A.m.e.r.i.k.a. .K.u.s.i.n.i...A.s.i.a. .y.a. .K.u.s.i.n.i...K.i.s.i.w.a. .c.h.a. .M.a.n...M.j.i. .w.a. .V.a.t.i.c.a.n...O.c.e.a.n.i.a. .y.a. .N.j.e...A.m.e.r.i.k.a. .y.a. .K.a.t.i...U.l.a.y.a. .y.a. .K.u.s.i.n.i...U.m.o.j.a. .w.a. .M.a.t.a.i.f.a...A.f.r.i.k.a. .y.a. .K.u.s.i.n.i...C.e.u.t.a. .n.a. .M.e.l.i.l.l.a...G.u.i.n.e.a. .y.a. .I.k.w.e.t.a...J.a.m.h.u.r.i. .y.a. .K.o.n.g.o...S.a.h.a.r.a. .M.a.g.h.a.r.i.b.i...V.i.s.i.w.a. .v.y.a. .A.l.a.n.d...V.i.s.i.w.a. .v.y.a. .F.a.r.o.e...W.a.l.l.i.s. .n.a. .F.u.t.u.n.a...A.m.e.r.i.k.a. .K.a.s.k.a.z.i.n.i...A.s.i.a. .y.a. .M.a.g.h.a.r.i.b.i...A.s.i.a. .y.a. .M.a.s.h.a.r.i.k.i...K.i.s.i.w.a. .c.h.a. .B.o.u.v.e.t...V.i.s.i.w.a. .v.y.a. .C.a.y.m.a.n...V.i.s.i.w.a. .v.y.a. .K.a.n.a.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):3.00791013918967
      Encrypted:false
      SSDEEP:3:XCbVTtkJtldelFal9lYuBFQlj/Ohc7H1:SBtkJUlY4KwEyH1
      MD5:5B0B7B55B3DDAC3A9199B9DBB8F0A86F
      SHA1:DB9B7612D73CCB089B83F9D8A6D2124201173911
      SHA-256:7BEA1755CCCB0764FD7EFE6453176624CEE438B0F2C2DC5FC5806F96FFB8C0B3
      SHA-512:2307C00F4F155694E7868E8670B75072428BE29D906ADCA2F526C31ACBC25D72EAD08C903ECACB64070CA34F7889AE46FD6E516BEBD16B4EE9A9F4CCB0810BC7
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................5K.y..b.u.d.d.h.i.s.t..................P
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.9223749573488704
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMJ06E7lRlldsdn:Sv/6gy
      MD5:BA8F4166B092D8AD816001D2BCBBB85E
      SHA1:621D56098BCB62B4DCFD93B7AEBA908D370CA4EF
      SHA-256:54853C8D23B15997DE0DC56918289149F5DD7588B198CEEDB1B615AE0AE7A234
      SHA-512:C5B4FBC148BB5BB2DC5012BBD4BEC68E5720B1E53F3B09B56E040432EA4E623384A608262B17EDD7D68F9A6502058270AF2EE4072578C7931F2053FB39C2863C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.sb...................sb....5K.y......rb
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):92
      Entropy (8bit):2.8199785675133215
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlF112lYlillq85f91DP:SBtkJclIilLf9tP
      MD5:A3693BCEFC128E317A8A84A488BDFB57
      SHA1:8E39330E6424CADCF3307DF868CC200D0817FD5A
      SHA-256:E12BBD6A876437281EBD1D21E1BB7185BF8B74B2A2DF71F33E81D35EA9ACB4FA
      SHA-512:03AB84FFC913A6259FB292DD52DD54603349D9606FA84FB759C69246FA37FDDB8A4E956D9ECC8FFB483596809A5B919961ABD82202F73AE57FFD27D2CA956018
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................5K.y..f.i.l._.P.H...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):8200
      Entropy (8bit):4.188608669078113
      Encrypted:false
      SSDEEP:192:yLM/lG6UmhU82ziUBhPG4QocO1NE8ajCqEH3qpJ8/NVL:y6QU129gOPXajCLXq8FVL
      MD5:E32CC09902CA3333C74C6E9EBA80CC9E
      SHA1:F4E671C3FCB1ED8FA37842869A71074BC62C4375
      SHA-256:C2E226113288A9CBF7E91826E59AC580E245DCB43470D7E25A31CF54BD65965E
      SHA-512:D7CC8C3A17FF0AFDCA57564F477A0B2837A95B19FB30CE286A098FC099A8385AEBFB09F0B7A2505FF5C0C3833878DB9793BF7E9AE05B55969A86F10842F4A125
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .;..............#.....;.....5K.y..L.a.u...F.i.s.i...K.a.n.a...K.a.t.....M...l.i...N.i.u.....P.e.l.k...S...t.i...T.o.k.o...K.e.n.i.....K.i.u.p.a...K.u.a.m.u...L.+.p.i.a...N.i.s.i.a...N.o.a.u.....S...k.i.a...S...p.i.a...S.+.l.i.a...T.o.a.k.e.......s.i.a...H.M.l.a.n.i...I.e.m.e.n.i...K.a.l.i.s.i...K.a.p.o.n.i...K.u.e.i.t.i...K.u.i.a.n.a...K...n.a.t.a...K.M.s.o.v.o...M...m.a.n.i...P.a.h.a.m.a...P.a.n.a.m.....P.e.l.i.s.e...P.e.n.i.n.i...P.o.l.a.n.i...P...m.u.t.a...P.k.t.a.n.i...S.e.l.u.s.+...S.e.M.s.i.a...S.i.p.u.t.i...S.k.t.e.n.i...T.k.v.a.l.u.....A.l.u.p.a.....*.t.a.l.i...H.a...a.m.o.a...K.a.m.i.p.i.a...K.u.e.n.i.s.+...K.u.l.a.s.a.o...L.o.m...n.i.a...L.u.a.n.i.t.....M.a.l...s.i.a...N.a.m.i.p.i.a...P.a.l.e.i.n.i...P.o.l.+.v.i.a...P.u.l.u.n.e.i...S.a.m.a.i.k.a...S.e.m.i.p.i.a...S.i.a.m.a.n.e...S.i.a.p.a.n.i...S.i.p.e.i.n.i...S.o.a.t.a.n.e...S.u...t.e.n.i...S.M.m.a.l.i.a...T.a.i.l.a.n.i...T.a.i.u.a.n.i...T.u.n.+.s.i.a.....E.u.l.o.p.e.....I.l.a.a.k.i.....I.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):5712
      Entropy (8bit):4.653528254810595
      Encrypted:false
      SSDEEP:96:11lbKGCrJj3azVrvUiLOH4fxSiqh/rQSoetMMLSyxc8ND6//eg50DqppH8nzbfQh:11irJTaN5LOsxSiI/rQSoeaMLSOc8NGN
      MD5:A22C8797E62A97E39371826659F8B222
      SHA1:CDC095E9C0DA848D20E1852850C5DDC1A8B5DA34
      SHA-256:076A2751183CB9ECCB360F3248F40A42AD32B3D1138EBC7230F192A64D4273F9
      SHA-512:524EDB17C284FAA049862F2F556ACD20615E9F282CDF2393130CBF731F5FDF14C34AFB776B59DDC1CE034E0082DC1EF4D9315F89512D1A09CB1E2B59C47D6787
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................$...........5K.y..B.K...B.M...A.B.D...F.a.s.....i.n...K...b.a...0.r.a.n...^.i.l.i...D...n.y.a...M.1.s.1.r...R.u.s.y.a...T.u.n.u.s...U.m.m.a.n.....e.k.y.a.....r.d...n...0.s.v.e.....C.i.b.u.t.i...K.o.s.o.v.a...K.u.v.e.y.t...K.1.b.r.1.s...L...b.n.a.n...N.o.r.v.e.....S.u.r.i.y.e...0.s.r.a.i.l...0.t.a.l.y.a...B.a.h.r.e.y.n...B.e.l...i.k.a...B.o.l.i.v.y.a...C.e.z.a.y.i.r...E.s.t.o.n.y.a...J.a.p.o.n.y.a...K.a.r.a.d.a.....L.e.t.o.n.y.a...N.i.j.e.r.y.a...P.o.l.o.n.y.a...R.o.m.a.n.y.a...T.a.y.l.a.n.d...T...r.k.i.y.e...U.k.r.a.y.n.a...0.r.l.a.n.d.a...0.s.p.a.n.y.a...0.s.v.i...r.e...0.z.l.a.n.d.a...A.r.j.a.n.t.i.n...B.r.e.z.i.l.y.a...E.t.i.y.o.p.y.a...F.i.l.i.s.t.i.n...H.o.l.l.a.n.d.a...K.a.m.b.o...y.a...K.o.m.o.r.l.a.r...L.i.t.v.a.n.y.a...P.o.r.t.e.k.i.z...S.l.o.v.a.k.y.a...S.l.o.v.e.n.y.a...T.a.n.z.a.n.y.a...B.a.t.1. .A.s.y.a...A.v.u.s.t.u.r.y.a...B.a.h.a.m.a.l.a.r...D.o...u. .A.s.y.a...E.n.d.o.n.e.z.y.a...G...r.c.i.s.t.a.n...M.a.l.d.i.v.l.e.r.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):4912
      Entropy (8bit):4.4248206727410295
      Encrypted:false
      SSDEEP:96:eIe8ZPFcykYhd4+gk0kStLGl/E782qiNhXXf0m208EmkU0kXF9D5+lm+6LrPj:O+PFcyksdMk0kStLA/n2qiNhXXf0xmx+
      MD5:6032FAE8B1E0526E2D7EF9DEF5E7DCA0
      SHA1:FE8CD9B123898A4B74B4A5480C1B5DADFEF04D43
      SHA-256:6BE93B4EA4F2090C99699A60248936B38C6041A146D4BAD25FA856EA9352596A
      SHA-512:35B6BD0B7231A788BE7FB51D45B0A79BCB79CDEFB2A725C7F5B1B277948E748C053B672C2E0DB67E8D3A9152EBEABD57200A17FD8111A138069140C603B3E295
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................5K.y..H.i.n.d...L.a.w.s...M.i.c.r...N.i.w.i...P.i.r.u...T.c.a.d.....a.n.a...b.c.i.n...B.i.l.i.z...B.u.m.a.n...C.c.i.l.i...H.a.y.t.i...K.i.n.y.a...M.a.l.m.a...M.a.y.u.m...M.u.r.i.s...N.a.w.r.u...Q.a.m.a.r...Q.u.m.u.r...R.u.s.y.a...S.a.m.w.a...S.u.r.y.a...T.u.k.l.u...T.u.n.e.s...U.r...u.n...Y.u.n.a.n.....i.r.a.q.....i.n.y.a...l.u.n.g.a...l.m.u.g.u...A.n.g.u.l.a...B.r.u.n.a.y...B.[.a.z.i.l...D.z.a.y.e.r...F.[.a.n.s.a...I.m.a.l.y.a...L.i.s.u.m.u...M.a.l.d.i.v...M.e.[.[.u.k...M.i.k.s.i.k...M.u.n.a.k.u...N.i.p.p.a.l...N.n.i.j.e.r...Q.u.b.r.u.s...S.b.a.n.y.a...S.s.i.c.i.l...S.s.u.d.a.n...S.w.i.s.r.a...T.u.r.k.y.a...U.c.a.n.d.a...V.i.m.n.a.m.....u.m.m.a.n.....i.b.u.t.i...b.c.u.m.a.l...l.a.y.w.a.n...l.u.v.a.l.u...A.l.b.a.n.y.a...A.n...u.r.r.a...A.r.m.i.n.y.a...B.a.%.r.a.y.n...B.e.l.j.i.k.a...B.i.r.m.u.d.a...B.u.l.i.v.y.a...G.r.i.n.a.d.a...H.u.l.a.n...a...I.k.w.a...u.r...I.r.i.t.r.y.a...I.r.l.a.n...a...I.s.l.a.n...a...I.s.r.a.e.i.l.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):4916
      Entropy (8bit):5.022526314614901
      Encrypted:false
      SSDEEP:96:pEnEdx+Rl2NYo9y4W/86jkBddmCO2XOqpPH8nWYAG91Mj2Prv:pEKx+RE9xtldMCEqpv8rJPL
      MD5:1731FF68868390BBEDF798EC2A13215A
      SHA1:52B37FD031B2B76A98AADCA8E20A9626BBD30AA0
      SHA-256:17B782ED0B9C5B1C318F1F7399BD97DBB4C5468156613406F528AB8C72AAF034
      SHA-512:ECC9CFF8005D9D059DF9018A3CACFFBE56E96BACA20D6ACEB160CDA27C94FE37A166131388D7A75B90822C392B2F2FB0115627D576541CDB1172D64B97F4ADE8
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .U..............!.....U.....5K.y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
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.8246240823663435
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlgelU8gl8l/dp+zl3MlyVEap:SBtkJZlU8g8l/D+ClsEap
      MD5:41D7A1C58CD8A0A1A989415463905F45
      SHA1:8913AD4B76125ED938B06CC7A34C53F06360FA5A
      SHA-256:2FA4F61D1AA33F632A99991D0784FE341F9FCB4469103B0A5277C797050AF2C5
      SHA-512:0F3E7EB3CA11B32D5AD8A29E24BCBF4CBA7D8443A31CAC1C50C9BD994D5E54D2A5A0E1E6B067579F5F2631EF9348044CDBCE08AFB0F92B60C46FE15933121492
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................5K.y..v.a.i._.V.a.i.i._.L.R.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):5152
      Entropy (8bit):4.476373714928377
      Encrypted:false
      SSDEEP:96:mlEhvV/y1dxNRgs9rY9nmIauhrO057HiMhPmq46eEKGnVb4KXiE6M40f5wsBRpk2:mkUdbacrMrr1qenVUMbH40f6JFRGRWWp
      MD5:85F8AD6E7E0F7AECDED5C2D6B77FC9FF
      SHA1:A38276921E0D5D5A3B1DC9BDB334EE71E1EE739D
      SHA-256:31B0F5518E3A11BB007A174DDDD9110F3AEF72C20E721AF3B343CEADA5B26010
      SHA-512:1492DC59D0A84B2B405AE21510962A79141B08990ADAA85FBF36F59458DB973CCD8D95BF59369AB75E9E6C36F42ED359344F55AAFFEA56B117E73950D4584303
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .Lo...................Lo....5K.y..P.o.o...F...j.i...N.e.p.a...N.i.w.e...N.o.r.u...P.a.l.o...P.[.r.u...B.h.[.n.i...C.h...d.i...C.h...l.i...F.[.K.s.i...H...i.t.i...H.[.l.[.K...J.a.m...)...J.a.p.a.K...K...n.y.a...K...n.g.o...N.a.).j.a...N.T.T.w.e...P...l.[.K...S.u.d.[.K...S...y.a.K...T.T.n.g.a.....t.a.l.i...A.K.d...r.a...A.K.g...l.a...A.K.g...l.a...B.h.a.r.[.K...B.h.e.l.i.z...B.h.u.t.a.K...C.h.....n.a...F.i.K.l.[.K...G.a.b.h.T.K...G.u.w.a.m.i...J.T.T.d.a.K...K.a.t.a.h.a...K...n...d.a...L.a.h.a.b.u...L.i.s...t.o...M.a.v.o.t.e...M...s...l.a...M.T.n.a.k.o...M.T.r.o.k.o...M.[.s...k.o...P.a.n.y.[.)...S.e.s.h.[.[...T.a.i.w.a.K...T.u.v...l.u...W.a.l...s.i...Y.e.m.[.n.i.....n.d.i.y.a...A.g.i.r.i.y.a...A.m...n.i.y.a...B.h.[.m.u.d.a...F...l.e.p.i.K...H.T.n.d.u.r.a...J.i.b.h.u.t.i...J.T.T.j.i.y.a...K.a.m.e.r.u.K...K.i.y.u.b.h.a...L.e.b.h.a.n.T...L.e.b.h.i.y.a...L.u.s.i.m.b.T...M.T.r.e.s.h.T...N.i.d.T.l.[.K...P.a.r.a.g.T.e...P.i.t.i.k.[.K...P.o.t.o.k...i...R.a.w.u.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):4712
      Entropy (8bit):5.124600475152206
      Encrypted:false
      SSDEEP:96:rl+Vu38cUfpZrr1FjxlsqppH8nzOjm7EHE:rl+VVH/IqpJ8ES
      MD5:E9AEB0AE15539E723009F72D594197CE
      SHA1:BAAA2B5F5271B8448E34D25783F538AFCBD68098
      SHA-256:10BFF4B83DC15A8CD820352E5DBC48659F2B56C4FEF36128FEC70BD6D09B7E39
      SHA-512:5D962958CD7D68B460393BDC797FD3FE9E06EC2053FCBFF747731CBD3260DB0BEB22B6150AA7F0121E0E1A3E8B2762A1150EC14F8E746BCFE25436044D664998
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................&...........5K.y..B.......o...L...o...N.g.a...S...p.......c...N.a. .U.y...T...y. .......n. .......A.i. .C...p...B.a. .L.a.n...B...c. .M.....B...c. ...u...C.h...u. .....G.r.u.z.i.a...H.y. .L...p...M.a.-.r...c...N.a.m. .M.....N.a.m. ...u...T...y. ...u.......n.g. .....B...c. .P.h.i...L.i.-.b...n.g...M...n.g. .C.....N.a.m. .C...c...N.a.m. .P.h.i...T.h...y. .S.)...T.r.u.n.g. .....T...y. .P.h.i.......n.g. ...u.......o. .M.a.n...C.a.-.r.i.-.b.....H...n. .Q.u...c...N.h...t. .B...n...P.h...n. .L.a.n...T.h...i. .L.a.n...T.h... .g.i...i...T.r.u.n.g. .M.....V.i...t. .N.a.m.....a.n. .M...c.h.......i. .L.o.a.n.......n.g. .P.h.i...C.a.m.p.u.c.h.i.a...H...n.g. .K...n.g...N.a.m. .S.u.d.a.n...T.h...y. ...i...n.......n.g. .N.a.m. .....B... .....o. .N.h.a...T.h... .N.h.). .K.....T.r.i...u. .T.i...n...T...y. .S.a.h.a.r.a.......n.g. .T.i.m.o.r.......o. .B.o.u.v.e.t...B... .B.i...n. .N.g.....T...y. .B.a.n. .N.h.a.......o. .N.o.r.f.o.l.k..... .R...p. .X...-.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):984
      Entropy (8bit):6.664654262645045
      Encrypted:false
      SSDEEP:24:xmrJVJ7OkJBvWa9D2h1i/veBQ+7TTKO542Kc2hdl/QZ:xMmkXWa9D5HeXTb42SqZ
      MD5:2DC65410ADD51F24840BE253B3DE1E6A
      SHA1:555D4E6EB7C777E657DC6FA511950B6A31426BA1
      SHA-256:E8647FD90A97C6C221DEABE0E4E4F833E3B726C9424091695E2419045D7F2B60
      SHA-512:01BEC81C93895A11FDB507BCFE01386D0D590E20827AAD4AB59CE50E25DE3074801996FD2B3AC9D8231AF80049DC5ECAAB8E3AD38AE8FD9B4135706CDC53F60F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..........................5K.y..............................................................................................".+...1.7.:.=.@.C.I.L.O.U.X.[.d.g.j.m.s.v.y.|...............................................................................................!.$.'.*.-.0.3.6.?.B.E.H.K.N.T.W.Z.].`.c.f.i.l.o.r.u.x.{.~............................................................................................... .&.).,./.2.5.8.;.>.A.D.G.J.M.P.Y.\._.b.e.h.k.n.q.t.w.z..............h.J.v.2.!.!..u.wo.".?..."....b@M..3E3...2..-!B!i!G...... ...!$!..k./......`......6./"......{h.#.....~.}.....!..U!2........}.v.}.....!...}.._..#....W"."g.%J..M".I2~.......?~.W...Z..`3.)...Ko?..h..XRQ..2.w.}.`pJ...o.@.`Dw.3.3a"7!.!..u".....hAh;3..'w."l....3...".".@..,...x......_!<J..eo_..I..}.....j..3... q.G..w...".o...".".........."."..~!.A.w.3.h....z@[3q3.@..Z.s!D......"%...w...Ww.@.2.}.`.!q.o..v...o$3....O.'..~.R...?..9..". v`dh... .R... ...........P. .`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2644
      Entropy (8bit):5.091703059176713
      Encrypted:false
      SSDEEP:48:CiwA19vs11DmsHoCKVDqoFbQKx9eX0mkXWa9D5HefedKDD5G0FwKDXE:h99vOhH1K5bQ08kXF9D5+fbA0FRXE
      MD5:00AA27ED0CE3BDFCE88D6CF6E8CEED99
      SHA1:1E585D284392D7571D764C70EC0A9B49047B5ABE
      SHA-256:9D047105EA91AD8C57E97667B577F47D5C2AD0AFE33A25C63483D6D3B4AFBA5B
      SHA-512:1084D8FDE1911579DDEB2F53CC19ADA97FCDA2B6A646B8E353AF6C12A56BC1E333B14DE53300C833EB956E383E5A79E03E26F7524A7BE97275A915B889327417
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .0....................0.....5K.y..L.a.s.a...N.i.j.e...N.o.w.e...C.a.a.d.i...T.t.a.k.e...C.a.y.i.n.a...G.y.o.g.y.a...L.e.s.o.s.o...S.e.s.e.r.e...T.i.m.o.w.a...Y.i.t.a.l.e...B.u.d.a.a.k.i...B.u.t.a.a.n.i...B.u.y.i.n.d.i...E.s.y.o.p.y.a...J.j.i.b.u.t.i...L.a.t.i.v.y.a...S.u.d.a.a.n.i...T.u.n.i.s.y.a...Y.i.r.a.a.k.a...Y.i.r.a.a.n.i...A.l.i.g.e.r.y.a...B.a.a.r.e.e.n.i...B.e.r.e.m.u.d.a...B.u.r.u.n.a.y.i...E.m.i.r.e.e.t.i...K.a.m.b.o.d.y.a...K.o.l.o.m.b.y.a...M.o.l.o.d.o.v.a...P.o.t.o.r.i.k.o...S.i.p.u.r.i.y.a...V.e.n.z.w.e.r.a...Y.o.r.o.d.a.n.i...S.a.w.u.d.a.r.e.b.y.a...E.b.i.z.i.n.g.a. .b.y.a. .C.a.g.o...E.b.i.z.i.n.g.a. .b.y.a. .K.k.u.k.i...G.a.y.a.n.a. .y.a.k.u. .e.k.w.e.t.a...A.n.t.i.g.w.a. .n.i. .B.a.r.a.b.u.d.a...E.b.i.z.i.n.g.a. .b.y.a. .K.o.m.o.r.o...L.i.p.a.b.u.l.i.k.a. .y.a. .C.e.e.k.a...K.o.r.e.y.a. .e.y.a. .m.u.m.a.m.b.u.k.a...P.a.l.e.s.i.t.a.y.i.n.i. .n.i. .G.a.z.a...T.u.r.i.n.d.a.a.d.i. .n.i. .T.o.b.a.g.o...E.b.i.z.i.n.g.a. .b.y.a. .M.a.l.i.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.852172957387978
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlgelU8gl8l/dU1l6lazlI/ko:SBtkJZlU8g8l/Wl6leGko
      MD5:F028732250A08A36422C2C0F130C7D02
      SHA1:089E81793292485075C360CB7206B35ABE44A19D
      SHA-256:B9CE9F21DC60A7CC91FA31EACFE76C21FA35E53565FC70674E78F58E8E44211C
      SHA-512:E1CE98EAD1257CB2A83FA1452AAE96A5C1A7BF4D4242C0C73FF84C405EADF18F98A6CE49ED4ACE9020AABF543F1F02005DA2AFA0E015287D8A320D1C863B25D8
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................5K.y..y.u.e._.H.a.n.s._.C.N.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.500123730064915
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/dsp:SBtkJ1li6gml/8
      MD5:3F209B3AA35603DCBB208A74CAA36C86
      SHA1:249DE057005BE697205333ABA0433C5B04653BBB
      SHA-256:F3965E339C622C96879DEE316DE42F9E9F693DDEB7A52FDCEBBA027171F2C86A
      SHA-512:02411AE5728814057E0CA78D850EEA85B3ACA16DFDBEE97A7C01860DA3B82640EEBE60960938C7F64B05D9E9FE8BAE0B826D242E24B33C40024836F716F17E31
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................5K.y........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):3880
      Entropy (8bit):6.5522206645256516
      Encrypted:false
      SSDEEP:96:iT+OFxAMsgbJveCkC+Bi0qppH8nzO/5WMlKqH:iT+ufbJvcCgi0qpJ8yWMf
      MD5:DFBC65905ADE0CB29F2B59189AC3BECF
      SHA1:9E53E80F93A050F81B4C3D1179BF543061851317
      SHA-256:36CB99D4EDAB58B15D74D716882F50C1602B72B84B30C34811DF4F104D31E6BA
      SHA-512:15380E93E7D4B0A51E3FC945B778989E798C159ABC136689D8203ECD9F31510AD60C236D88C8631312E8E718CC90B7189BFEAE97E304CE650FE2FCA928596929
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..2.............&......2....5K.y.....V....V...N9N...N.N...N'k...N^...-N.N..-N.V..-N^...9N....MN._.._N....N2m...O.g..sQ.\...Q.\...R.~...R....S'k...S^...WS'k..WS^...pS.^...S.]...S~n...W.S...Y.T...].g...].....^J....^.R..._.V..*c.Z..wcKQ...e.....eNm..zf)R...g....'k2m..'k.v..dl.R...l.V...lpQ...l.V..wm0W...o...Yt....^txQ..^t.X...y.....~.e...~.W....8u.....c....pQ..w.pQ.....S....'k....^......[....WS..?..f....V...q\..T..T.V...NWS.N..WS.9N.."}l.....N.^vl..-N..2m..LNKQpQ..LNr^....LN.b-W..*O0W:S../O)RyQ..[O._....Q.k.N..)R.k.N..WS.g2m..aSTX.\..bS.e....bS.h!X...S)R.N...T.^.c...U.......V.tbS..#W..\..^X...\..eY0W)R...[-W.b...[S..\..<\.e.\..<\.l.\...].Tl....].bl....^......^.\...^.b"}...a'Y)R..XbKQ.R..id.~.T...e..pQ..9h...\..<hu.pQ...h...Q..'kCQ:S...k)R.e...l...\..1r.\pQ..YrpN.R..Yu<\jl..~vUa'Y...yidW....z<\.e....<\.N....WS...."}Xb..._.[..^..k.N..?....]..l.i`.\..l..b.~..l..~yr..l.3..N..}v.OW..e..WS.^.2m..l.eg...N...N..<\.N...O.R)R.N..KQW.0W.N..)R.k.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):3400
      Entropy (8bit):5.791705989472858
      Encrypted:false
      SSDEEP:96:hzh55C8gXlYi8+qZGDanf+ilCAx6wEmzKYW3F:nr/ianWi4+sAKYW3F
      MD5:2E5F67F78288205A57C9D007678F91E4
      SHA1:58F076D147C9401C74E48CFDC222D0857C0D3D22
      SHA-256:7F7B201F51FE1228F46B4CDEBC228F838C4B3D746D64C37C43FB76CACE3A9273
      SHA-512:BCEB142E37C9EEB752D233CF8EFA7E403BB0547F30C30230EBEBE1C2D04ECE512E07185C5D8F7D63071E921B6982641449EBF4B5A76B7411E885EF6C7FC034A3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................:.. .%......J...J.../.....%.........v.e...o.z...g.i.e...g.l.i...o.n.n...u.r.a...m.a.t.g...f.a.n.....m.a.i.s...a.v.u.s.t...s.e.t.t.....s.o.n.d.a...e.p.o.c.a...a.v.r.i.g.l...f.a.v.r.e.r...s.c.h.a.n.....z.e.r.c.l.....d.a.m.a.u.n...s... .C.r.....f.a.n.a.d.u.r...g.i.e.v.g.i.a...m.e.s.e.m.n.a...o.c.t.o.b.e.r...s.c.h.a.n.e.r...a.v... .C.r.....e.n.g.l.a.i.s...s.e.c.u.n.d.a...s.t.e.r.s.a.s...d.u.m.e.n.g.i.a...v.e.n.d.e.r.d.i...g.l.i.n.d.e.s.d.i...s.e.t.t.e.m.b.e.r...z.e.r.c.l.a.d.u.r...p.u.s.c.h.m.a.u.n...d.i. .d.a. .l.. e.m.n.a...z.o.n.a. .d.. u.r.a.r.i...a.v.a.n.t. .C.r.i.s.t.u.s...m.e.s.a.d.a.d. .d.a.l. .d.i...s.u.e.n.t.e.r. .C.r.i.s.t.u.s...E.E.E.E.,. .'.i.l.s.'. .d. .'.d.a.'. .M.M.M.M. .y...E.E.E.E.,. .'.i.l.s.'. .d. .'.d.a.'. .M.M.M.M. .y. .G...?.[... ... ... ... ... ... ... ... ... ... ... ... ... .-. ... ... .+. ... ... .O. ... ... ... .M. .S. ... .m. ... ... .k. ...]...A.[.A. ... .B. .C. .D. .E. ... ... .F. .G. .H. .I. ... .J. .K. .L. .M. .N. .O. ... .
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2060
      Entropy (8bit):4.934466690789509
      Encrypted:false
      SSDEEP:48:m+SqFfc7SnplEwD3Pt/SNOofqP5pQKVNdQKoQKAQVPgGGhiRP+g/3hutuVdzK:z5u7MpewD39/iqRuKaKdK1VP9x+g/3wD
      MD5:9E079C4A48B157D36285090C71188F8F
      SHA1:14A8149C73B70011BA44D7AAFBB7483170D0B052
      SHA-256:02068A32035EEC4FE65408983B67961657254819FFE879EBA9F5E6CC6FBE2377
      SHA-512:2F68DA198A90A408CD29ECB503D909E782F3C4B8C0611B09991E244782F9A482D22FF5D0F98B0E146DF18069EEFE3D1811721239DA59A3FC1397C412E45CA5E1
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .m....................m.........I.1...I.2...I.3...I.4...c.u.....G.a.s.....G.i.c.....K.a.m.....K.a.n.....M.a.t.....M.u.t.....N.y...Y...N.y.a.....N.z.e.....U.g.u.....U.k.u.....U.k.w.....W.e.r.....g.n.d.....g.n.u.....g.t.u.....k.a.b.....k.a.n.....m.b.e.....Z...M.U.....Z...M.W.....I.g.i.h.e...I.s.a.h.a...M.b...Y.....N.z.e.r.o...U.m.u.s.i...R.u.s.a.m.a...U.k.w.e.z.i...U.m.w.a.k.a...M...s./.N...s...R.u.h.e.s.h.i...U.m.u.n.o.t.a...G.i.t.u.g.u.t.u...I.s.e.g.o.n.d.a...K.i.g.a.r.a.m.a...M.u.k.a.k.a.r.o...M.u.n.y.o.n.y.o...N.y.a.k.a.n.g.a...R.u.h.u.h.u.m.a...U.y.u. .m.u.s.i...N.d.a.m.u.k.i.z.a...N.t.w.a.r.a.n.t.e...K.u. .w.a. .k.a.n.e...K.u. .w.. i.n.d.w.i...N.y.a.n.d.a.g.a.r.o...K.u. .w.a. .m.b.e.r.e...E.j.o. .(.h.a.h.e.z.e.)...E.j.o. .(.h.a.z.o.z.a.)...K.u. .w.a. .g.a.t.a.n.u...K.u. .w.a. .g.a.t.a.t.u...K.u. .w.a. .k.a.b.i.r.i...I.n.d.w.i.,. .I.y.i.n.g.a...M.b.e.r.e. .y.a. .Y.e.z.u...N.y.u.m.a. .y.a. .Y.e.z.u...I.m.i.n.s.i. .y.. i.y.i.n.g.a...K.u. .w.a. .g.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):1012
      Entropy (8bit):4.635795293435391
      Encrypted:false
      SSDEEP:24:kOTC7wOLMZ4i5PVW/gvV2ffaA/aAAXP7hUqp9Zf+jnW:kp7tLo4i5PVW/gvV2ffn/nIaW
      MD5:D4145C815EFC76FA1CC41C861616F59D
      SHA1:3D2FF1AE6BAD328F91AA92FD8FC82766DB3890A9
      SHA-256:9AA0975F68F60A25E7082D0034B9B35285BA94B252D13DCF2FD819D754B79E95
      SHA-512:1B0A36DBABD7BE6C247F40C34F65FBA0CDFC9CD8AE92191F69A6E896F88E7B0296781CC03F471598160A5EDD4696A487DEC7363DA9E3BC745EC5325EFDEFD351
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ...............................J.o...S.....V.i...D.u.m...J.o.i...M.i.e...S...m...V.i.n...s.e.a.r.....s.e.a.r.a...n.o.a.p.t.e.......e...n.....T.r.i.m... .1...T.r.i.m... .2...T.r.i.m... .3...T.r.i.m... .4...n.o.a.p.t.e.a...t.r.i.m... .1...t.r.i.m... .2...t.r.i.m... .3...t.r.i.m... .4...d.i.m.i.n.e.a.......d.u.p...-.a.m.i.a.z.....T.r.i.m.e.s.t.r.u.l. .1...T.r.i.m.e.s.t.r.u.l. .2...T.r.i.m.e.s.t.r.u.l. .3...T.r.i.m.e.s.t.r.u.l. .4...t.r.i.m.e.s.t.r.u.l. .1...t.r.i.m.e.s.t.r.u.l. .2...t.r.i.m.e.s.t.r.u.l. .3...t.r.i.m.e.s.t.r.u.l. .4.......`5......./...mT.TG...>......TmT.T.......`5......./...mT.TG...>......TmT.T.............../.Z...P..._............./..=..d&(._...........Z..P......./.._.........0.8.@.H................... ...f.s.............!...................!.........&.............. ... ...........P;..P........H..PQ..P........... ... ..'.V...........Y...^...........c...h.............. ... ......".S...... ... ... ... ..`.... ..o.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):1916
      Entropy (8bit):5.056398847671726
      Encrypted:false
      SSDEEP:48:0ZdehNrA7Lr5mr81Va61/eBGeDrayBTSGUH+BV0Ui2K0:0ZdA27Zy61/9iayBTJUeB7i50
      MD5:93947EAB0BFCDF0693987E9681499882
      SHA1:FAE6A29211ECE1B3C79D9877D2676AE0A97B5C57
      SHA-256:21E38B84AAC991D2CA14467962F5E861AE5DCCAF1CBEF4D251D0BE8525C7888A
      SHA-512:1428F3F517A100CCCA1AD60B02A04239CA5C88EE8BDE6849B9E0D68B8D0EBA717A72EACC3F8C8CAE838A84EE5B94407B8E159CA4DAD4F7CCBE3ACB1D6F0F75C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .................................A.K...P.K...M.a.g...M.o.k...M.p.g...M.s.h...M.s.p...M.u.h...M.u.j...M.u.l...M.u.n...M.u.p...M.u.s...M.w.i...M.y.e...I.m.e.h.e...M.o.k.h.u...M.u.n.y.i...M.w.e.s.i...L.u.s.i.k.u...M.w.a.k.h.a...I.l.i.j.u.m.a...I.l.i.s.a.l.a...M.u.h.a.a.n.o...M.u.j.i.m.b.i...M.u.l.u.n.g.u...M.w.i.t.o.p.e...I.s.e.k.u.n.d.e...M.u.n.y.e.n.s.e...M.u.p.u.g.u.t.o...M.u.s.h.e.n.d.e...L.w.a.m.i.l.a.w.u...P.a.s.h.a.m.i.h.e...A.l.a.h.a.m.i.s.i...I.n.e.n.g.. u.n.i...M.u.s.h.i.p.e.p.o...P.a.m.u.l.a.a.w.u...[.q. .r. .x. .z.]...M.u.p.a.l.a.n.g.u.l.w.a...U.l.u.h.a.a.v.i. .l.w.a...M.u.s.o.n.g.a.n.d.e.m.b.w.e...M.u.s.h.e.n.d.e. .M.a.g.a.l.i...A.s.h.a.n.a.l.i. .u.K.i.l.i.s.i.t.o...U.l.u.h.a.a.v.i. .l.w.a. .l.i.s.a.a...U.l.u.s.i.k.u. .l.w.a. .L.i.j.u.m.a...P.a.m.w.a.n.d.i. .y.a. .K.i.l.i.s.t.o...U.l.u.h.a.a.v.i. .l.w.a. .l.u.s.i.k.u...-.[.A. .B. .C. .D. .E. .F. .G. .H. .I. .J. .K. .L. .M. .N. .O. .P. .S. .T. .U. .V. .W. .Y.]...-.[.a. .b. .c. .d. .e. .f. .
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2112
      Entropy (8bit):5.138122058230904
      Encrypted:false
      SSDEEP:48:Rrrmz7Nh9fnIeLgwQbuMCk4blFvHizLWr53dVa+:Az7D9fIe0wXlFvdrj4+
      MD5:8BF7D34AFA0DA29A5569C59AFB4D79ED
      SHA1:D49FE367C24FB92F3218664416D79202EF456A91
      SHA-256:86924720A1FE45BD00C69D3039977D574CCBA4B41514A353C7A251FD0DA04CFF
      SHA-512:0DC95D73E8D04C145FD7DA02B664005E65476ECB92A526ED683A743B0B96B583234C2925FD45FDC767F5CC7F824FDA469117A0048395328C965CF6BA649934D8
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................................L.K...N.D...L.....B.k.1...B.k.2...B.k.3...B.k.4...B.k.5...B...l...F.u.l...F...n...K.a.k...K.n.K...K...k...L.e.n...L...p...L...y...M.b.....M.v.u...N.a.b...N.g.b...N.g.u...N.g.....N.p.K...N.y.e...N.z.e...B...r.....L...s.....B...k.u.a...F...n.d.o...M.v.u.k.a...N.a. .l.....B...l...w.....D.i.m...s.i...K...k...r.....L.e.n.g.u.a...L...p...s.....M.b...n.g.....N.g.u.b...e...N.y.e.n.y.e...K.a.k.a.u.k.a...L...y.e.n.g.a...N.g.b.o.n.g.a...[.c. .q. .x.]...K...k.e.r...k.e...K...o.t...n.g.o...N.g.b.e.r.e.r.e...B.i.k.u.a.-...k.o...B...k.u.a.-.o.k.....B...k.u.a.-.p.t.....B...k.u.a.-...s.e...F.u.l.u.n.d...g.i...N.a.b...n.d...r.u...B...k.u.a.-.u.s.......Z.u.k.a.n.g.b.o.n.g.a...F...n.g.b.i.s..... .o.t.....F...n.g.b.i.s..... ...k.o...F...n.g.b.i.s..... ...s.e...N.d.u.r... .n.g.b.o.n.g.a...N.z...n.a. .n.g.b.o.n.g.a...F...n.g.b.i.s..... .u.s.......K...z.o. .n.a. .K.r...s.t.u...N.a. .p.e.k... .t... .K.r...s.t.u.../.[.A. .B. .D. .E. .F. .G. .
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):1552
      Entropy (8bit):5.562679160282238
      Encrypted:false
      SSDEEP:24:ta9q+l9FijMLmnaxXdvf6yojy11W25i6U2dMuVs0YJ+o1Es5vGBZmO3Juz26BV5a:ta9TlN1tvgwzigMEsMoEsoBPcPV5oV
      MD5:369E29AED455406489C35EDD0EC292C0
      SHA1:D235E1593F5ED711F521EB51F39A50D56B55B587
      SHA-256:490B22DE9747E24E8484CE8365EF12D8ACFFEE0541074FEBA5A058180FF69633
      SHA-512:B18525336F9A39215984395523DD904391584E3F3EA3B16414C9590EF0FA1AB95EC80F191968DA73644736079C488616F81DDC88E3603E0BAD7AC192BD3B9D64
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................o.. .5......|...|.........5.$........1-..7-..=-..V-..0-Y-I-..N-0-b-..0-b-O-..V-S-[-..0-=-U-..0-=-a-..0-Y-0-..1-U-0-..7-0-D-..7-<-D-..7-S-J-..=-\-S-..I-1-T-..I-O-O-..N-0-U-..O-S-a-..[-S-\-..b-S-M-..b-S-O-..0-Y-I-N-..0-=- .1...0-=- .2...0-=- .3...0-=- .4...0-Y-I-9-..0-Y-Y-0-..N-0-U-Z-..V-S-[-\-..0-=-U-0-Y-..0-=-a-0-Y-..0-Y-=-=-0-..0-b-O-0-Y-..0-b-b-S-T-..1-U-0-b-U-..=-\-S-1-T-..I-1-T-I-T-..I-9-M-M-I-..N-0-b-b-S-..\-0-Y-S-\-..b-S-O-b-S-..\-I-<-0-a-\-..0-Y-0-N-0-Y-..0-Y-I-O-0-Y-..I-O-O-0-b-T-..Y-I-N-a-0-Y-..\-0-Y-I-O-\-..b-S-M-b-S-c-..0-Y-3-3-o-0-Y-..0-Y-I-9-b-0-Y-..\-0-Y-T-0-3-\-..\-S-Y-7-I-7-\-..7-S-J-0-O-1-I-T-..O-S-a-0-O-1-I-T-..[-S-\-0-O-1-I-T-.......C......NN....k..)...4mhEy.C............................W.!.0.............'./..4K,c.\.C..4.4.4....].N.'..P/..N..................k..)...4.MW*.).4......................0............\.....\.\.\.\.\...\..................W.!.0.............'./..4K,c.\.C..4.4.4....].N.'..P/..N......V.F.>.N.R...............8...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.8246240823663435
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlgelU8gl8l/66NPDelOpWn:SBtkJZlU8g8l/3YleW
      MD5:BF9476BA2EE2652492A3C93F90DBD11F
      SHA1:3A739DF1E67CA5ED347E751208765B2ED7226358
      SHA-256:5FED9386CED762843B518BC2C859E899C4B1616D7B6A1B29F86CEF89B7D2A74E
      SHA-512:B37937F77CEA2378AB23CD3435DFFF96C7C271E8EBD4C0ADE3272BAAC1D52B0119E26FCCF762354587D3F00E2FABD51D6D5A4C2D785BAFF00D6A4A5B7744F4F8
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.................................s.h.i._.T.f.n.g._.M.A.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):20592
      Entropy (8bit):5.567056141429851
      Encrypted:false
      SSDEEP:384:0/V5/luxv6JBmatRuaM+rrqcccoDT5UfUP72zMt2UOVjgC:yD/Eh6JB++rrnMFOKC
      MD5:839D5BDEEAAED1C24E312907C4F4F3C7
      SHA1:9E9568CB145D194A27B06B9C5BFD6F63FBD6BDD2
      SHA-256:F130D2930495255A2A439EA770F259DA24E8E7F0CE0763B46833F988A23385C4
      SHA-512:A6D4A0A5D8C90DBA16B0F264ABB02512986886BCB089641658D8F1B9E0B2E28C573045129BC6799B424C2D4ECF55B82C7A9B36DC4BD351B40AE9ABA6CFC9C652
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................V................d.e.i...t...r...j...l...j...n...m...j...a.a.....m.u.~...r...n.o...p.a.u.a...i.j.a.r...m...g.h.....b...n.....z.a.r...d.n.e.s...`.a.k.a...r.a.d.....a.a.u.....j...l.a...j...n.a...m...j.a...n.a.p.....v. .n.....~.e.n.a...h.i.d.a.r.....a...d.h...a.e.v.a.t...v...e.r.a...h.a.n...a...m.a.r.c.a...m.a.r.e.c...r...z.n.e...s.r.d.c.e...t.e.r.a.z.......s.l.a...a.p.o.r.t...a...p.k.y...g.i.n.b.o.t...k...r.t.i.k...m.i.y.a.z.a...m.o.r.d...d...p.a.g.u.m.e.....a.i.t.r.a...p.o.p.o.l.....p.o.l.n.o.c...d.e.H. .r.....d.o.p.o.l.....l.e.t.o.p.....n.e.d.e.>.a...r.a.d.~.a.b...s.t.r.e.d.a...v. .n.o.c.i...a.a.u.v...l...a.p.r...l.a...b.u.d.o.v.a...f.o.r.m...t...h.o.d.i.n.a...j.a.n.u...r...k.l...v.e.s...m.i.e.s.t.o...m.i.n...t.a...n.a.p.o.l.....p...r.o.v.....t.e.l.e.s.o...v.l.a.j.k.y...z.v.i.e.r.a.....l.o.v.e.k...o. .{.0.}. .h...o. .{.0.}. .s...b.a.. o.u.n.a...c.h.e.a.v.a.n...c.h.o.r.d...d...d.~.j...a.t.h...p.h...l.g.u.n...t.i.k.e.m.e.t...v.a.i.a...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):4992
      Entropy (8bit):5.3077770645051645
      Encrypted:false
      SSDEEP:96:d3j4DdFqHMQryhp7DpRtHutN/bUl9JFZ0HLCdIsjIvNsNKkmG:d3+f717HKN/bUnJF3dI0SoLB
      MD5:9915786772AE79B55A58EDA6004DBF83
      SHA1:122F2C481E87852FB0AF2D87B81A5BB5FD6016C1
      SHA-256:30AB12B4710F7AB7B7FFB3D0D4389B953078F2A6BCDB1758C5C8DFFEE8BC90DF
      SHA-512:6E1C7EFA33D81D9861D0D6F4990493D0E9A50AB88E9342F2FAA3CC891F75A5159A2FECA54D938AEB8F6691994C0764D565E8CBA3DEE777759047375E112D332A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................)................l.....p.a...v.u...v.....i.p.....k.o.s...l...v...p.a.s...t.u.o...v.u.o...v...s...L...y...k.e.s.i...u...i.v...m.K.r.....m.........o.K.r.....o.........k.u.o.v.....p.o.r.g.e...v.y.e.s.i.....o.h.......L...y. .G...m...s.s.....c.u...K.u.i...j.u.o.v.l.....n.j.u.h.......s.k.a.m.m.....s.y.e.i.n.i...r.o.o.v.v...d...e.p.i.l.o.h.o...k.o.s.k.o.h.o...k.o.s.k.o.k.k.o...l...v.u.r.d.u.v...l...v.u.r.d...h...m.e.t.r.i.s...a...1... .n.i...l.j.....2... .n.i...l.j.....3... .n.i...l.j.....4... .n.i...l.j.....k.e.s.i.m.....n.u...E.,. .M.M.M. .d.....a.m.e.r.i.k.l...a...b.r.i.t.t.i.l...a...m.a.j.e.b.a.r.g.....p.a.s.e.p.e.i.v.i...t.u.o.r...s.t.u.v...t.u.o.r...s.t...h...v.u.o.s.s.a.r.g.....k.u.o.v...m.....n.u...p.o.r.g.e.m.....n.u...v.y.e.s.i.m.....n.u.....o.h.....m.....n.u...c.c.c. .M.M.M. .d.....d... .. .d...M...y...m.a.j.e.b.a.a.r.g.....p.a.s.e.p.e.e.i.v.i...v.u.o.s.s.a.a.r.g.....0.0.0. .b.i.l.j.o.v.n...0.0.0. .m.i.l.j.o.v.n...0.0.0. .t.u.h.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):132
      Entropy (8bit):3.92328511820183
      Encrypted:false
      SSDEEP:3:XCbVSm/tl0qUmlvlllK6gOZMH292ni2Pc3nslulflFpLbN:SvEqtPCJOyW92ni2Pc3nVTFX
      MD5:05AAE6AD646FC609E972F1AC310EB11F
      SHA1:FDD4C78C7A9EF570E3F328A37FA38B73BD518065
      SHA-256:02D8BE65FF5BD34FA9DF351C4F32F958C16EE1BA4D082B99AAF20795BAC10E4F
      SHA-512:F0A24C8E0256284F6B3C5C6BC065A801BCD2132E40168A5229DFE30C8CBDAA440E2E449D6080110EFA1FF283EEF05289D967FF074E29B00572E9271243FF372B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .l....................l............k..)...4.|.yn.8.......................`.... ..o.w......`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMnut6E7l//YEnG:SvVt6gXrG
      MD5:03B4C2777B2AB020F0301B1F57B4486C
      SHA1:1A8FE984F91940E6A8B86F9433BC64CE5D875B87
      SHA-256:2001732718D567EDDB29306E39FE186BE95CD30BEA89A14A5CFFDA73C6E95539
      SHA-512:D7FF5C4032BB90E9123B3054783DED9ABAC3B1413DA8E01F80BFCF0A07169CE7992B89454C839B3F5D1D4633B5ADE2AB093A68E9FF09AA825E9303C371929859
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.H+...................H+.............G+
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):524
      Entropy (8bit):5.2552622387790615
      Encrypted:false
      SSDEEP:12:3zAT6qiv6LdAuAzTE7WYsXWWYsTyyWqSIvxA1h2t2TqW64a:jAT86LdBVWY7WYaLi1hULWu
      MD5:D989D18C09E8FE8402CE1B8421486ACE
      SHA1:CCA30A2644CFB352E452AB76DC6FEB47B3873403
      SHA-256:381B5C5ABE5FC34C609ACD7A5BD124E8A975D18BCA58306C3873D8540C50ED91
      SHA-512:1D8775D32594E928702723363BA4BBABE76C0AA9B74010F8CE246E4F50DC7006121506E3C2340B43B4C299FBF857CF42D90C9623401DC1E07964D96EBC755061
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................w.. ........{...{...........A............$.5.5....A6....A6.......J.............J.........j..;.....,...^..j..;.....,...^............/.z.<.5.g................./.z.<.5.g.7..........A6.......l&.........A6...3`9`..!.e.......e.`........`a...!.e.......e.`........`a........P..5.A.. ...........P...P............"...........I.. K.. ........*..P7..P........D..PI..PN..P........Q.. U.. ....S.......V.......c...........`.. b.. ..j.v.......".H.........E.. M.. Z.. ^.. d.. ....`...C.. h.. ..o.w......`s..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMnut6E7l//YEnG:SvVt6gXrG
      MD5:03B4C2777B2AB020F0301B1F57B4486C
      SHA1:1A8FE984F91940E6A8B86F9433BC64CE5D875B87
      SHA-256:2001732718D567EDDB29306E39FE186BE95CD30BEA89A14A5CFFDA73C6E95539
      SHA-512:D7FF5C4032BB90E9123B3054783DED9ABAC3B1413DA8E01F80BFCF0A07169CE7992B89454C839B3F5D1D4633B5ADE2AB093A68E9FF09AA825E9303C371929859
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.H+...................H+.............G+
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):588
      Entropy (8bit):5.505236769719622
      Encrypted:false
      SSDEEP:12:sQWyu11b9J39VX39SA1dALRs/m++e/lxW4t2Pa1:sHy6hD9F9SYGtqSa1
      MD5:BC70D18A9840F784A59545073343CBA0
      SHA1:784143D29C0136CD09E75371EF8D06664844BD32
      SHA-256:C444F5069E2186A1BE726A493B3D207A8AC62FA1FC1EFA6A6DD1DF56C87B6836
      SHA-512:9C3905D4F9BC773DF5AB2E3002DDFF019374DB39941CC35BED431A0DC285465D1B4F1A3EBFF77B131011B9777E9B840C58563E90C56CFED7EDEEFCC57B2DF2B8
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................M........s.r.....u.t.........$.5.5...t?....t?........J...........J.........cBrG...M.MyT..b. .5|].u..n.g..cBrG...M.MyT..b. .5|].u..n.g............/...0...%.<.l............./...0...%...l.......t?........l&........t?.....^.^....z.L....z46..Y.{C..........z.L....z46..Y.{C.............P..5.M.. ...........P...P........"...*...........2...:...........U.. Y.. ........B..PO..P........\..Pa..Pf..P........a.. e.. ....k.......n.......{...........p.. r.. ..j.v.......".H.........Q.. ].. j.. n.. t.. ....`...O.. x.. ..o.w......`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.870450165586334
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDklU8gl8l/66XglLMA+973:SBtkJYlU8g8l/3wJAt
      MD5:DE637ACC0444DFF5B10B24757FD5D01A
      SHA1:66D26A6934A109E7A74C26A9E5EB2877F0898DB5
      SHA-256:3BDE340A4FA05DDC957B603CEE413A59B4A3A4955D981CDA2AC34D4FA4DE8A6E
      SHA-512:88765889E5297825F3D0F7576E838D95F4AE9651D079AB3719A36D234FC91D6F18A84FB92522D18EA059A3CFF7672BF746D7352A81DA94A42C8308175DC8DDD1
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.................................s.r._.L.a.t.n._.M.E...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):20648
      Entropy (8bit):5.629431761876921
      Encrypted:false
      SSDEEP:384:vf//o2NVm1fy4j6S/KCbbfCg6vu6GcxPJRGMP6lBL+2yrwa/k+ad6N28cu3bsrJl:/bNVm1fy4j6S/KCbbfCg6vu6GcxPJRGR
      MD5:8A569834D57201D193F06C17936B9999
      SHA1:A45223738B57704B080100A407810465FF780274
      SHA-256:B09BA04CDF3E300380846E48882D78AD9B070E85B4D5879A1FDB753240136D0B
      SHA-512:78CB8942F0D8AA7255620B574DBA8ECC7238BB597E50A92DB95220D506B64B454CFA636427203F05819CB771AECFD84E765CD519E4982657B642C6F60B7A8BD5
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........"..."...V.......5........................................................................................................................................................................................1.......2.......3.......4.......5.......6.......7.......8.......9.......................................................0.......................................................................................0...........................................................................................................................................................................................................................................................................................................................................1.0.......1.1.......1.2.........................................................................t.a.m.l........................................................................................... .1......... .2.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):116
      Entropy (8bit):3.6003005537073154
      Encrypted:false
      SSDEEP:3:XCbVSm/tlEF1qbl7MPqM3kglFsvMKbWcf:Sv81qSSMncMK
      MD5:CF910C94198F1D415E241CB7644A9830
      SHA1:5BBCD10A7F464A5E5ECC47F94DE71EB3A4844D3D
      SHA-256:CB701F199A91520E73B21A7674402446A7E6A5F462D30ED088F40365BCB1A4DA
      SHA-512:331B0451F7DD00BCD4A861738216B0AF7D0E45B101039A9FB2368669B5E5A74D987C6E97BD2C9513A5C54FB8E57953D5BD1D89ADE1638E5B583AF87C0E66778E
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..B....................B.............7...Y4.B.........P....... ....o...... ...`
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):19020
      Entropy (8bit):5.652113221179184
      Encrypted:false
      SSDEEP:192:5JgVYyOgOeq60sK9d2T9PHIKx+mnMvWxrkm9r//4033N9ZVJqWnnn8jOa9YYtJzN:f3yOgO1sKHsLxH9TA033jMYYtJzfbKm
      MD5:030F7037F860C1347398686C0AE1D2A6
      SHA1:88280661BC0BE66A3F7F3D50A713D2F52F89D884
      SHA-256:F89258A352C8CCA1B78027B969DFC693C9229D5FD899276281BA0FB510A931C4
      SHA-512:A1329A0E048CF6555F183B29D2228E7E50F50CD3D2207A6CD1972923D55447DCCEBD92B38CBAF26F35C3AEC0B552548FCE30471850045F64FD33F898B81AA3F2
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................r.. ................V.....................................G.....5...!.G...6.............A.....(.....B...+.?...,.A...........>...5.>...6.A...8.K...8.>...8.K.....6.(.?.....&.?...,.A.'...(.5.....0.......8.......8.+...............&./.....8.F.(.F.......0.M.....&.0.M.....,.(.M...../.0.M.....A.0.A.....A.2.H.....B.(.M.....?.0.M.....L...M...$.K.,.>...(.H.8.G...*...(.>...,.>.,.>.....>.........0.,.?.....0...?.....0.5.G.../.A.......0.G.*.A.........3.....A.9.....0... .I...7.,.>.....8.F.......t.e.l.u.........F.....$.0.....-.5.(.......9.?.3.../.A...F...0...,.M...8.+.0.M...9.>...0.M.....7.>.".......*.F.*.M.....2.A.2.M.....?.9...M...$...A...M.....F.9.0.M...6.A...M.0...9...M.2.F...9.F.&.0.M.....0.0.,.?.....0.0...?.....0.0.5.G.....J.(.M.(..... .(.F.2...(.?.(.M.(.......M...K.....*.M.0.?.....(.5.0.?...!.?.8.F.....$.M.0.H.....$.M.0.H.1...$.M.0.H.2...$.M.0.H.3...$.M.0.H.4...+.?.,.M.0...0... .I.I...0.....>....... ...........M.0.@.6.......$.0.........C.$.?.......K...?.....>...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):1832
      Entropy (8bit):5.124424743232553
      Encrypted:false
      SSDEEP:48:kji72PUoUuEt+VW4GD9yjrqmJlPNjMVrjMFWC4Zbe8NKm6EorV:Wi72P4Dz9yjrqqPFMmB8NLwrV
      MD5:83BE3546B7B6922953E90D9726486719
      SHA1:758394823919004EB8AC4DF221A3714FA6891323
      SHA-256:3E3D6A9E34AFECEFF81EF394A00791B1331378CBC2F510C1A63235F374EFBBE7
      SHA-512:7FEA8D4613E56CBB2CF395D46DC55AA85D9E6F9DDC2C7937EDE5B75C7FFEA7665E0CA4ED85967E2B970A5D400AF9F93B35C6A76A77FE5430D82A5164AF2630D7
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................j........A.a.r...B.a.r...D.u.n...J.o.l...K.w.a...L.a.b...M.o.d...M.o.i...M.u.k...P.e.d...P.o.o...R.a.r...S.o.k...T.i.b...U.n.g...U.n.i...E.k.a.n...E.l.a.p...E.n.z.i...E.s.a.a...J.a.a.n...L.o.l.o...O.m.u.k...O.p.o.o...E.w.i.k.i...O.j.o.l.a...O.r.a.r.a...T.A./.E.B...E.b.o.n.g.i...A.p.a.r.a.n...O.l.a.b.o.r...O.m.a.r.u.k...O.p.e.d.e.l...O.t.i.b.a.r...N.a.k.a.a.r.e...N.a.k.a.u.n.i...O.k.w.a.m.g.. ..[.f. .q. .z.]...I.s.e.k.o.n.d.e...N.a.k.a.k.a.n.y...O.d.u.n.g.. e.l...T.a.p.a.r.a.c.h.u...N.a.k.a.e.j.u.m.a...A.k.w.o.t.a. .a.b.e...N.a.k.a.s.a.b.i.t.i...N.a.k.a.u.n.g.. o.n...A.k.w.o.t.a. .A.a.n.e...A.k.w.o.t.a. .a.u.n.i...N.a.k.a.e.b.a.r.a.s.a...O.s.o.k.o.s.o.k.o.m.a...A.k.w.o.t.a. .A.u.n.g.. o.n...O.m.o.d.o.k.. k.i.n.g.. o.l.../.[.A. .B. .C. .D. .E. .G. .H. .I. .J. .K. .L. .M. .N. .O. .P. .R. .S. .T. .U. .V. .W. .X. .Y.].../.[.a. .b. .c. .d. .e. .g. .h. .i. .j. .k. .l. .m. .n. .o. .p. .r. .s. .t. .u. .v. .w. .x. .y.]...........)..k.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):2.935700764148065
      Encrypted:false
      SSDEEP:3:XCbVTtkJtldelFal9lzs9dwj/awPkaV:SBtkJUlYgQBkc
      MD5:BD3F2E18B27EFB04FD9CBEE94DEA3189
      SHA1:36710D9106EF3A860AEA28C12D206EEF478050FF
      SHA-256:10B7EF58A9B44409AD9138088424A0501C2A37F7B8C5444DF04772901B05EC3D
      SHA-512:F2D14C41E5B64064C2A36BB03E49B433B0E85DF7BA0A4DD7D7A39BEEA54330A77F4ADDF72038F57B93AB78181B71AC9BEE214AC8E1AA858B557282795508B865
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .................................b.u.d.d.h.i.s.t.....t.......w....P
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):20052
      Entropy (8bit):5.040657283644707
      Encrypted:false
      SSDEEP:384:wE3xOg0ZgZ4x5TBmZOP+/kFK58jf/iQcsUmpq86yYBZkosAn3/OPt4tk:wE3xvQgm5TBZPtFK58j3iQclmg9yYBCj
      MD5:2812397EB44D2339F89F597975AD7EDB
      SHA1:8CC44BB6C7B0EC4036015E39E56A4A157CC21063
      SHA-256:6647C6B9901E8A621B8A1A0E7CACB20B30A1200D84C8F5028B2FDC56C9996F6D
      SHA-512:B71DB9CD26C1BDF6EB0484E7A0D62CA10CF673E4D8C99FF4EDEC4B5D8360BA33707FA2264854EF1E4C1D3AFA0E4064EEAB9004A720E458D31E91D2E978978088
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................bcpTypeAlias.tz.aqams.cnckg.cnhrb.cnkhg.usnavajo.typeAlias.timezone.Africa:Asmara.Africa:Timbuktu.America:Argentina:Buenos_Aires.America:Argentina:Catamarca.America:Argentina:ComodRivadavia.America:Argentina:Cordoba.America:Argentina:Jujuy.America:Argentina:Mendoza.America:Atikokan.America:Atka.America:Ensenada.America:Fort_Wayne.America:Indiana:Indianapolis.America:Kentucky:Louisville.America:Knox_IN.America:Porto_Acre.America:Rosario.America:Shiprock.America:Virgin.Antarctica:South_Pole.Asia:Ashkhabad.Asia:Chongqing.Asia:Chungking.Asia:Dacca.Asia:Harbin.Asia:Ho_Chi_Minh.Asia:Istanbul.Asia:Kashgar.Asia:Kathmandu.Asia:Kolkata.Asia:Macao.Asia:Tel_Aviv.Asia:Thimbu.Asia:Ujung_Pandang.Asia:Ulan_Bator.Asia:Yangon.Atlantic:Faroe.Atlantic:Jan_Mayen.Australia:ACT.Australia:Canberra.Australia:LHI.Australia:NSW.Australia:North.Australia:Queensland.Australia:South.Australia:Tasmania.Australia:Victoria.Australia:West.Australia:Yancowi
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):14848
      Entropy (8bit):5.437589029987393
      Encrypted:false
      SSDEEP:192:F8S4sPb63nKWkUqqpe5+lfzgdPY0J2Yj+zhz9Pjlg+UkfO8+rCvb/JOafvvMw0tS:h4sPuFC6r9kTJ2Yj+zyNkAuz/rwDw
      MD5:5EF76781775A06F24A210157FB54FD2A
      SHA1:380EF9F25581CF1E5E151217A5BA062E0D38C11C
      SHA-256:6FF666BBAAB5ADCAE0603940B20257F469E9A99D0251BF27943C9EB0282C1A09
      SHA-512:7B1695DB6C60881450804310111FF2E94D36DBA5F72D6129DAB839A3631B6534EE15044836ED2D1CED5EDFB7F2F841A7AA63C51C3606124D1D0990BFEE086EEB
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................^.. ........x...x...V....................4.....1.....2.....3...........A.n...D.b...P.b...S.b.....b.....b...^.b...m.a.....A.B.^...M.a.....A.n.n...A.w.g...D.e.k...D.u._...F.e.w...N.o.....P.e.n...S.i._...a.n.n...a.w.g...d.u._...f.e.w...n.o.....p.e.n...s.i._.....a.r.....a.n.....e.k.....a.r.....a.n...^.e.n..._.e.n...I...u.l...I...u.n...h.e.p.....i...u.l...i...u.n...s.a.g.........r.....A.n.n.a...B...e.....b...e.....d.....n...g.....H...h.o.w.a..._.a.h.s...G.../.G.S...g.o.....H..._.u. .d.b..._.u. .p.b..._.u. .s.b..._.u. ...b..._.u. ...b..._.u. ._.b...B.r.a...l...b.a._.g.a...d.y.n.g.y...d...r.l.i...e.r.k.e.k...e.r.t.i.r...g...s.o.H...g...w.r.e...h...z.i.r...z.e.n.a.n.......r.e.k...^.e.n.b.e..._.u. .a.n..._.u. .a.....g.o...s.o.H..._.u. ...y.l...A.w.g.u.s.t...B...e.....H...F.e.w.r.a.l...N.o...a.b.r...b...e.....H...b.a...d.a.k...f.e.w.r.a.l...h.a...w.a.n...k.a.n.d.z.i...n.o...a.b.r...o.b...e.k.t...s.a.n.l.a.r...s.e.k.u.n.t.....a.n.w.a.r.....a.n.w.a.r..._.u. .a.n...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):84
      Entropy (8bit):2.5687727460466143
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlw10lgylslplglzstPRAen:SBtkJQ0ltWpglI1
      MD5:DCCA8D89C11300C1AD5DC8B9DBF2E0EA
      SHA1:6D3661C44EE2A839AC14594D496A159153098F93
      SHA-256:B99B6B16340A21C13EA42CCAC8A1CBFD6A8704CB403EB3DAD80DD1909832DDA6
      SHA-512:5EEC5AB96057FB76CF86974AF05D3CE63088D4ACB998B237B7D499E8EAAA1E12CE296302D04F0D67788D8FEF5F10863BBEF4806F29D9A4A2987E3344279D5E80
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.................................f.i.l.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):16304
      Entropy (8bit):5.59428953383426
      Encrypted:false
      SSDEEP:192:gJ/vHvyv/3UwC/Hh/x77j4nFFyNJr3qUyqJjy0ghX/gvGlynwwXvsHjyNcC946/F:g6XUw0/siwUyqJW0agvBnwwG+mw
      MD5:D898E7A4C45E2305CFF411791C5CABBB
      SHA1:58600E3EE23ED5DAD881881A85B6590D1C8316CF
      SHA-256:EF7950C979256FC6A537F82523C85AC0A29A72B42C809A5FAC3DC9192855DDF1
      SHA-512:703C8FD32DF60B6BC8B74AD29D043E37606CDEEF23C0631906D28188F267EFEF6C800909F90794379F8F3A9D0ED3EC948FD8694448BA555CD2D2D508229C8CFB
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................V....................^.........C.t...C.u...P.a...P.e...P.t.....1.....2.....3.....4.....a.........M.S...M.......s...0.....T...t...d...n.....a.....A.r.a...A...u...C.m.t...C.u.m...E.k.i...E.y.l...H.a.z...K.a.s...N.i.s...O.c.a...P.a.z...P.e.r...P.z.t...S.a.l...T.e.m...d.k.....h.f.....s.a.....s.n.......a.r...^.u.b...t.u._...g.e.c.e.......l.e...B.u.n.e...B...b.e...E.b.i.p...N.e.s.....T...b.e...0.y.a.r...C.u.m.a...E.k.i.m...O.c.a.k...S.a.l.1.....y.r.....A.z.e.r...e._.l.i...k.a.l.p...s.p.o.r...a.k._.a.m...s.a.b.a.h......./...S...b.u.g...n...I.m._.i.r...M.1.s.r.....R.e.c.e.p...S.a.f.e.r...T.i._.r.i...^.a.b.a.n...^.e.v.a.t...H.i.c.r.i...b.u. .a.y...y.a.r.1.n...E.y.l...l...H.i.d.a.r...K.a.s.1.m...M.a.y.1.s...P.a.z.a.r...d.i.l.i.m...^.u.b.a.t...b.e.d.e.n...b.i.t.k.i...b.i...i.m...d.i...e.r...e.r.k.e.k...k.a.d.1.n...n.e.s.n.e...r.a.k.a.m..._.i.m.d.i...0.0.0...M.n...0.0.0...M.r...0.0.0...T.n...b.u. .y.1.l...H.e._.v.a.n...K.e.y.h.e.k...V.e.a.d.a.r.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):320
      Entropy (8bit):3.9067583285500707
      Encrypted:false
      SSDEEP:6:SBtkJOtoKRBKXC+mpRIzARhHf0jRhH7PaFYl6laz1E3GmglSUjrNDUN8Al:WZtnnMtmp/D0jnP1klaz1iGWr80
      MD5:B567B384A3F3EAA1CE37047152D3B7B3
      SHA1:6BE9731C3791AA0B1B8F4C2AD306AABF7C6C0DE4
      SHA-256:7CD2B3630AF371A8BC5ADBA3269E48F4BE1FF9566AD000B04D5E9229D0C6761E
      SHA-512:46E68087935D0EBC5DBE0D2B1EA0DF3BB8E58D57827DDA6640EC1E27BA7AEF05B6523885E6D94354B3FF008FD0EEE132305E41630AF7B4F35CFA6F7C10E949BE
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................L..P........H...H...........H...TransliteratorNamePattern.%Translit%Hex.%Translit%UnicodeName.%Translit%UnicodeChar...H.e.x. .E.s.c.a.p.e...U.n.i.c.o.d.e. .N.a.m.e...U.n.i.c.o.d.e. .C.h.a.r.a.c.t.e.r...{.0.,.c.h.o.i.c.e.,.0.#.|.1.#.{.1.}.|.2.#.{.1.}. .t.o. .{.2.}.}.....:.^.H. .......+...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):7836
      Entropy (8bit):5.638847482730833
      Encrypted:false
      SSDEEP:96:SNc9y7wRGv2s3tLrZsRrm1rEDwmIy4+657stvMgCq+bKD11mwyppGcgH4wb0bGAo:2y4V57stEhq911mw2GcTkv
      MD5:3D4CEC32C7E2A3E04885FDB27986578B
      SHA1:A684187A82895BFC7EB0934F40C2FEF6D025FA68
      SHA-256:7AEFB450AD768C6AC410BAD64FF28BBC8448E66E6CA08688F48D9770672180D9
      SHA-512:FFAA2CFE560D4B034AA9AA7B7DB3B8009ADFF72863F83A0CA73918A125EA85F6DEB176F37D5D385068A8618DAE5FD292E7436452F18D9BCDDA619EAC91BC7320
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................)................~...,...../.....3.....4.....~.......'.......(.......C...B.H.J...M.o.1...M.o.2...M.o.3...M.o.4...M.o.5...M.o.6...M.o.7...M.o.8...M.o.9...&.'.*...&.I.*...C...F...d./.. M...&...*.....*.H.......C.'.D.'...&.I.J...D...&.I.J...F...1...,...(...3...~...1...E.I.F...H...y.-.d.-.M...(.......F...E.I.F...*...E...*.I.1...J.I.D.'.F.....H.4.B.'...0.0.0.E.I.....&.'.~.1...D...A.....1.'.D...J.'.F...'.1...4...&.(.'.F...4.......'.D...(... .&.'.J...(... .J.I.D...M.o.n.t.h.1...M.o.n.t.h.2...M.o.n.t.h.3...M.o.n.t.h.4...M.o.n.t.h.5...M.o.n.t.h.6...M.o.n.t.h.7...M.o.n.t.h.8...M.o.n.t.h.9...[.. . .&.]...*.H.4.B.'.F...3...C...F.*...E.'.J.E...F.....'.4.B.'.F...0.0.0. .E.I.....&.'...:...3.*.../...C.'.(.I.1...F.H.J.'.(.I.1...(... .,...E.....1.-.~...3.I.D...2.-.~...3.I.D...3.-.~...3.I.D...4.-.~...3.I.D...1.'.E.I.2.'.F.....I.,.1.I.J.....M.o.n.t.h.1.0...M.o.n.t.h.1.1...M.o.n.t.h.1.2...y. .M.M.M. .G...y. .d.-.M.M.M...&...,./.I...'...*...F.......F...{.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.500123730064915
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/FMlln:SBtkJ1li6gml/K/n
      MD5:C34486D88A5544F3392A4FB031ECA28C
      SHA1:287AE38B9011FD9BF97FAC414B405F1748B748FB
      SHA-256:F7835F43B81AF073E115DCDBDD71E6D274C476853FFE6BEFCFF4A6DD26E02CC6
      SHA-512:DD334E26082CD5F5B9CF2DD581930DB2DCFC8AE136FEA02B0A7E8376BAA2C0582236086C7D973A84C14EB3F873C6F540E70FE65917D757C6FA630E56CD780C35
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):88
      Entropy (8bit):2.7376269297851303
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlKelBjlgljl/Fi6l2lkWa:SBtkJTl4m6s+Wa
      MD5:8ED16C31FC6340DF909D01B9C16F4F94
      SHA1:8EC9A4CAC56FFFF46F6206D83AC9A47EBB74D19A
      SHA-256:99DBE615C6B418ABAC0EBFA6446AFEA74887CA6D7E980D5D37951E136812B615
      SHA-512:74DBEE84D173A931310EE3883581436C4A7D8F722FF3F88E6FCDEEFA56D36DE0C3BB5D5C6FC933655687911084FA4962568CAAE84F8466B72102AFB8191BE637
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci..a.r._.S.A.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):2.9794524468707886
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXE/flflcUTNZlgY/:SvV/cMEY/
      MD5:6A9273AF56E5D1F6F2D24203334DDF9B
      SHA1:BD7CA1CB1BA90B6036803043B8E351E6EC499DA5
      SHA-256:F1D94FCB430E36370FA030C9D9892214DCB624289BC5282D432BF2A49378A08C
      SHA-512:066CC289321C632CA0657AAC15F9F0E121C506B3EBD752E19277A5087417430E3C40525E0B410B930EF3A238328906AA64BF2A53B0FEBB26724918333C500508
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.h....................h.....91ci..........g.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.8041805894387437
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXE/66E7lyMC/n:SvV/66gdC/
      MD5:6134F4CD4D6C15CE86537D2613927036
      SHA1:59D53B482F70551D8DEA499A310E7DA230219A18
      SHA-256:68F743AEC976A4117DCA15A76760CAC2F8580CEDFA64B9C7D523A8F7BC0FE081
      SHA-512:AAB3C6A451737433D25E38D86D21F865D944541D8C3A1EA23D937AFB33C3A06C56A436AFA997D42343AAE8395607819A1A79F0FCB60A8017EE4C6E4C9A140172
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.h....................h.....91ci......g.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.8041805894387437
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXE/66E7lyMC/n:SvV/66gdC/
      MD5:6134F4CD4D6C15CE86537D2613927036
      SHA1:59D53B482F70551D8DEA499A310E7DA230219A18
      SHA-256:68F743AEC976A4117DCA15A76760CAC2F8580CEDFA64B9C7D523A8F7BC0FE081
      SHA-512:AAB3C6A451737433D25E38D86D21F865D944541D8C3A1EA23D937AFB33C3A06C56A436AFA997D42343AAE8395607819A1A79F0FCB60A8017EE4C6E4C9A140172
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.h....................h.....91ci......g.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):14140
      Entropy (8bit):5.520887247421295
      Encrypted:false
      SSDEEP:192:h5JxPZT5Q1Lcd052yMu/o3k5EBjW2QZ3bevHZODEaJi7CvG8empbN:zHQg07/cNW1ieiGvG8empp
      MD5:5BFE2FF4E8FEE4AE11BCD015066B4A6D
      SHA1:B3D468624152331D1C6E57FA506C89F39507C351
      SHA-256:CFC47816762D32DBE6345585028F0B790C9E1748081A960C8D3AB8FF7EC42081
      SHA-512:90E3BA5C492DBAECA33DB751A5B8A3021853899D0C27B93060EC9A74BD74A42803239BDCF2DCEAD0B93AC775AA9F9736823070425187A57BEDA8B1CF3487C549
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .'....................'.....91ci..p.t.s...{.0.}.....{.0.}.....{.0.}.....{.0.}.......{.0.}. .....{.0.}. .....{.0.}. .....{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .......{.0.}./...:...{.0.}./.........../.........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}./.........{.0.}./.........{.0.}./.........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}./.....:...{.0.}./.....:......... ................./...:...{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}.............{.0.}.............{.0.}./...........{.0.}./...........{.0.}./...........{.0.}.............{.0.}. .............{.0.}...............{.0.}. .............{.0.}. .............{.0.}. .............{.0.}./.............{.0.}. .............{.0.}. .............{.0.}. .........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):500
      Entropy (8bit):4.672488325058875
      Encrypted:false
      SSDEEP:6:Sv3lksbgWdojosRoCogGoVDCDkssiUuKDlhAT6mqksH1wLs1OyuJg2my/V/6rgM7:O6WdUTRp3GwcsiURlhATiHEJzF6rrkOD
      MD5:D6324925789E0EE9349F5CDF86279622
      SHA1:A9A577817F891CC938F15D87942DDEE765ECBB0E
      SHA-256:A0594501481E4DB487BEED95F9CEE85A1B8CA421638831D350827CC4FA3E6010
      SHA-512:30DBF4B6FD99FFD5D0E0C7B72A531A5B2C15FE653D20109825CEC3C55446B9487E7B34AF1CFCB1B2843ABF140E179F9B7A1C807EC335D13C6F2FD11787E97EE0
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................n.. ..<.....u...u..........<T...91ci..{.0.}. .4.0.=...{.0.}. .A.0.B...{.0.}. .<.5.A...{.0.}. .=.5.4...{.0.}. .4.0.=.0...{.0.}. .A.0.B.0.....x...:."<.<.<..x...:.+<.<.<..x...:.-)......x...:..+......x...:..<.3.3..x...:.A16161..x...:..0.).)..x...:."<.<.<..x...:.+<.<.<..x...:.k.k.k...x...:..<.<.<..x...:.........x...:..<.<.<..x...:...........[...c.w.d...c.3..P:..PA..PH..PO..PV..P]..P..J.T.. ..[...c.w.d...c.d..Pk..Pr..Py..P...P...P...P..J.a.. ........m......`...`_.. l..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):3.368272640304357
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQvlU8WNlUUT+l2iAllfPl6vn:SvIC8wNCl2iA/lan
      MD5:4DF34AF3EA33B8989DDA28796A2F88A5
      SHA1:7D688E8CB94E79D75E9AB3AC6A0F11B0A2BEB468
      SHA-256:955F10221EA49D76E8996338EFB1834F7A0F8B825111159C90FE74C3104DF464
      SHA-512:1E6354D1C1533421306045B12C2A284F99F4336E0078EBAF2AE7BB2A80BE7B3AE0876DAB4656C4DA10252C25CC4C7273E305CE93C3457CF6082F49FE3A66D903
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .H!...................H!....91ci..........!.............G!.`...P
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):11476
      Entropy (8bit):5.433357975981125
      Encrypted:false
      SSDEEP:192:ODJyuxj1Lik/WIarEU2CEFs7z/GHCe4fE6CeIS:Oz8k/WIarEUMuPGqs6Cel
      MD5:8D16BF2551834657F60AE1CD1B789F9D
      SHA1:3543C08108FD00F28D81360BA53F87014CAAC25C
      SHA-256:FDA6E27F5BADBEA433D99DD75427372AE13A4EFA750EBCC4C97A651A49385705
      SHA-512:C025F7C6F5F172AB6401FC583F3759C1E5367C23C128652FCD63CBA5279E97DEB25DC070BB3E7EBF40468226A31004A114AEF4CCC8AB4AAFAEDFB2441C77F5B3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................%.. ........-...-...............91ci..{.0.}.....{.0.}...m...{.0.}. .a.e...{.0.}. ./.t...{.0.}. .f.o.d...{.0.}. .k.t.....{.0.}. .u.g.e...{.0.}./.d.a.g...{.0.}./.u.g.e...b.u.e.m.i.n.....b.u.e.s.e.k.....{.0.}. .s.y.d...{.0.}. .t.d.....{.0.}. ...s.t...{.0.}. .k.n.o.b...{.0.}. .#. .H.g...{.0.}. .d.a.g.e...{.0.}. .u.g.e.r...{.0.}. .p.k.t.....{.0.}. .p.c.t.....{.0.}. .t.s.k.....{.0.}. .c.u.p.s...{.0.}. .m.d.r.....{.0.}. .t.d.r.....{.0.}. .v.e.s.t...{.0.}. .s...m.i.l...{.0.}. .s.p.s.k.....{.0.}. .k.m./.t.....{.0.}. .t...n.d.e...{.0.}. .t.e.s.k.e...{.0.}.s.v... .m.i.l...{.0.}. .t...n.d.e.r...{.0.}. .p.r... .k.g...{.0.}. .t.e.s.k.e.e.r...{.0.}. .o.m. ...r.e.t...{.0.}. .p.r... .d.a.g...{.0.}. .p.r... .f.o.d...{.0.}. .p.r... .u.g.e...{.0.}. .p.r... .{.1.}...{.0.}. .e.n.g... .g.a.l...{.0.}. .a.c.r.e.-.f.o.d...{.0.}. .k.u.b.i.k.f.o.d...{.0.}. .e.n.g... .m.p.g...m.i.l./.e.n.g... .g.a.l...{.0.}. .b.u.e.m.i.n.u.t...{.0.}. .p.r... .g.r.a.m...{.0.}. .p.r... .m.i.n.....{.0.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.8041805894387437
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXE/66E7lyMC/n:SvV/66gdC/
      MD5:6134F4CD4D6C15CE86537D2613927036
      SHA1:59D53B482F70551D8DEA499A310E7DA230219A18
      SHA-256:68F743AEC976A4117DCA15A76760CAC2F8580CEDFA64B9C7D523A8F7BC0FE081
      SHA-512:AAB3C6A451737433D25E38D86D21F865D944541D8C3A1EA23D937AFB33C3A06C56A436AFA997D42343AAE8395607819A1A79F0FCB60A8017EE4C6E4C9A140172
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.h....................h.....91ci......g.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.8041805894387437
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXE/66E7lyMC/n:SvV/66gdC/
      MD5:6134F4CD4D6C15CE86537D2613927036
      SHA1:59D53B482F70551D8DEA499A310E7DA230219A18
      SHA-256:68F743AEC976A4117DCA15A76760CAC2F8580CEDFA64B9C7D523A8F7BC0FE081
      SHA-512:AAB3C6A451737433D25E38D86D21F865D944541D8C3A1EA23D937AFB33C3A06C56A436AFA997D42343AAE8395607819A1A79F0FCB60A8017EE4C6E4C9A140172
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.h....................h.....91ci......g.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.8041805894387437
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXE/66E7lyMC/n:SvV/66gdC/
      MD5:6134F4CD4D6C15CE86537D2613927036
      SHA1:59D53B482F70551D8DEA499A310E7DA230219A18
      SHA-256:68F743AEC976A4117DCA15A76760CAC2F8580CEDFA64B9C7D523A8F7BC0FE081
      SHA-512:AAB3C6A451737433D25E38D86D21F865D944541D8C3A1EA23D937AFB33C3A06C56A436AFA997D42343AAE8395607819A1A79F0FCB60A8017EE4C6E4C9A140172
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.h....................h.....91ci......g.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):892
      Entropy (8bit):4.395168612626523
      Encrypted:false
      SSDEEP:12:bmmBuZCucVk1wmnOLU6LTWuZgh96Ved1Xq+8yTdYF96RkuTIrP42fs859JK:Q3cVfmOLUiWfu4dlVbdYyRZANsk9JK
      MD5:21017141ED814E503ABBF8B2642B00BF
      SHA1:7EFC40C7E8924AC172FC32C1DA610BCC71373BAD
      SHA-256:859FC600BFFC411242836CCD551701AB20BD6D28F4C6C1115F844EAE0501943C
      SHA-512:BB800BA94FBF0630F558359263F48233F3F8E6DF26420AE81F40170CF00A911B9ABE5D3B1DAB067FE370B0B9E9729B8149D69B9B40520C2219895A74A4020F38
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .h....................h.....91ci....e.....e.w.o...s. .{.0.}...K.k.e.k.e.....e. .{.0.}...g.a...o...o...k.T.s.i.V.a...c.l.e.t.i.w.o...K.k.e.k.e.w.o...g.a...o...o.w.o...k.T.s.i.V.a.w.o...K.k.e.k.e. .{.0.}...c.l.e.t.i. .{.0.}...a.V.a.b.a...o...o...k.T.s.i.V.a. .{.0.}...g.a...o...o. .{.0.}...s.e.k.e.n.d. .{.0.}...a.V.a.b.a...o...o.w.o...a.V.a.b.a...o...o. .{.0.}...s.e.k.e.n.d. .{.0.}. .w.o.....5...:.........5...:.........5...:.........5...:...........:.......5...:.........5...:.l.}.}...5...:.w.......5...:.........5...:.........5...:...........:.q.q...5...:.........5...:.i.}.}...5...:.........5...:.........5...:.........5...:...........:.......5...:.........5...:.l.}.}...[...c.w.d...c....P...P...P...P...P...P...P..J.... ..[...c.w.d...c....P...P...P...P...P...P...P..J.... ..[...c.w.d...c....P...P...P&..P-..P2..P9..P..J.... ......a.m...g..`... ... ...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):4364
      Entropy (8bit):4.681068579360723
      Encrypted:false
      SSDEEP:96:JoR+9+o9dTZy9SRJEKygkQ+cxD/6uJP2u1:JoR+F9kSHEK+w6yn1
      MD5:DC459400AE7D0038180CFE79BBFEE537
      SHA1:339920C03428C68F64536287CCCD2976224BBD57
      SHA-256:80A224F0790279544693604B8862861EA1E33CAF7F799B50409A8B5F58917927
      SHA-512:F879219CFC66023C5EB78448AFFBCF7449FD3F854014E42D05C4396DDF6762DE0E6A79E5EECFF496302D748800B04629FACE0EEA581C7742768D36A9CD410A81
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................4.. ........;...;...........x...91ci..{.0.}.p.h...{.0.}.p.s...U.S. .g.a.l.....m.e.t.r.e.s...m.e.t.r.e.s.....{.0.}. .h.r.s...{.0.}.m.g./.d.l...{.0.}.g.a.l.U.S...{.0.}.m.p.g.U.S...{.0.}. .m.i.n.s...{.0.}. .s.e.c.s...l.i.t.r.e.s./.k.m...{.0.}./.g.a.l.U.S...m.e.t.r.e.s./.s.e.c...m.e.t.r.e.s./.s.e.c.....m.i.l.e.s./.g.a.l. .U.S...{.0.}. .U.S. .g.a.l.l.o.n...{.0.}. .p.i.c.o.m.e.t.r.e...{.0.}. .U.S. .g.a.l.l.o.n.s...{.0.}. .k.i.l.o.m.e.t.r.e.s...{.0.}. .m.i.c.r.o.m.e.t.r.e...{.0.}. .n.a.n.o.m.e.t.r.e.s...{.0.}. .p.i.c.o.m.e.t.r.e.s...m.i.l.l.i.m.o.l./.l.i.t.r.e...{.0.}. .d.e.c.i.m.e.t.r.e.s...{.0.}. .m.i.l.l.i.m.e.t.r.e...{.0.}. .c.e.n.t.i.m.e.t.r.e.s...{.0.}. .m.i.l.l.i.m.e.t.r.e.s...{.0.}. .c.u.b.i.c. .m.e.t.r.e...{.0.}. .c.u.b.i.c. .m.e.t.r.e.s...{.0.}. .s.q.u.a.r.e. .m.e.t.r.e...{.0.}. .s.q.u.a.r.e. .m.e.t.r.e.s...{.0.}. .p.e.r. .U.S. .g.a.l.l.o.n...{.0.}. .p.e.r. .k.i.l.o.m.e.t.r.e...{.0.}. .p.e.r. .c.e.n.t.i.m.e.t.r.e...{.0.}. .c.u.b.i.c. .k.i.l.o.m.e.t.r.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMmlfbTNZlFn:SvNt
      MD5:4D8B9ED918A6A21826CF6ACDA10D7B8B
      SHA1:DEC9BB0C1333322C691B9318A9FAD5E0987319E7
      SHA-256:E26840BBAC4F0ED8E3601F62ABB775FCC16BF38B70785540025D1818F7057881
      SHA-512:7AE98D692352C530AE50AB24C00C7F0AEB6C2F74C6B77EBBBDDF4BDD04B21E48816BF3F2698EE2B014D703F56F9E14958E28F298CD56027492C3A300FC4B619F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci............
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMmlfbTNZlFn:SvNt
      MD5:4D8B9ED918A6A21826CF6ACDA10D7B8B
      SHA1:DEC9BB0C1333322C691B9318A9FAD5E0987319E7
      SHA-256:E26840BBAC4F0ED8E3601F62ABB775FCC16BF38B70785540025D1818F7057881
      SHA-512:7AE98D692352C530AE50AB24C00C7F0AEB6C2F74C6B77EBBBDDF4BDD04B21E48816BF3F2698EE2B014D703F56F9E14958E28F298CD56027492C3A300FC4B619F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci............
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMmlfbTNZlFn:SvNt
      MD5:4D8B9ED918A6A21826CF6ACDA10D7B8B
      SHA1:DEC9BB0C1333322C691B9318A9FAD5E0987319E7
      SHA-256:E26840BBAC4F0ED8E3601F62ABB775FCC16BF38B70785540025D1818F7057881
      SHA-512:7AE98D692352C530AE50AB24C00C7F0AEB6C2F74C6B77EBBBDDF4BDD04B21E48816BF3F2698EE2B014D703F56F9E14958E28F298CD56027492C3A300FC4B619F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci............
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMmlfbTNZlFn:SvNt
      MD5:4D8B9ED918A6A21826CF6ACDA10D7B8B
      SHA1:DEC9BB0C1333322C691B9318A9FAD5E0987319E7
      SHA-256:E26840BBAC4F0ED8E3601F62ABB775FCC16BF38B70785540025D1818F7057881
      SHA-512:7AE98D692352C530AE50AB24C00C7F0AEB6C2F74C6B77EBBBDDF4BDD04B21E48816BF3F2698EE2B014D703F56F9E14958E28F298CD56027492C3A300FC4B619F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci............
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):228
      Entropy (8bit):4.044690676324035
      Encrypted:false
      SSDEEP:6:Sv8pdFjZJSk+ounn+llGp2ldMkalvV5axen:RtJSfoun+lliwMdV5r
      MD5:8EA764E277BE89178D6745E843E3F4A2
      SHA1:209B98123D8A78B7C8FDF215FC34902A7BAD55BC
      SHA-256:8972F48F140626B2A32943A3EF97524255B61ADA88DA3CA541E0755ACC23EC35
      SHA-512:5B5EB388FAD554D19B2E79DB5D0D1341A2C81FF38771AB6AF360264EFC11C96C468D18387EFAB3C59A354B2256480B8266E168B0A25A0DC8436D58ABFB0089D9
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................*.. ..T.....1...1..........T....91ci....5...:..C.C.C..5...:..T.T.T..5..C..5..T..:.....:.......X.`......P...P....... ..X.`......P...P.......P..!....P....8.j.... !.. #.. ........m......`C..`... %..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMmlfbTNZlFn:SvNt
      MD5:4D8B9ED918A6A21826CF6ACDA10D7B8B
      SHA1:DEC9BB0C1333322C691B9318A9FAD5E0987319E7
      SHA-256:E26840BBAC4F0ED8E3601F62ABB775FCC16BF38B70785540025D1818F7057881
      SHA-512:7AE98D692352C530AE50AB24C00C7F0AEB6C2F74C6B77EBBBDDF4BDD04B21E48816BF3F2698EE2B014D703F56F9E14958E28F298CD56027492C3A300FC4B619F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci............
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMmlfbTNZlFn:SvNt
      MD5:4D8B9ED918A6A21826CF6ACDA10D7B8B
      SHA1:DEC9BB0C1333322C691B9318A9FAD5E0987319E7
      SHA-256:E26840BBAC4F0ED8E3601F62ABB775FCC16BF38B70785540025D1818F7057881
      SHA-512:7AE98D692352C530AE50AB24C00C7F0AEB6C2F74C6B77EBBBDDF4BDD04B21E48816BF3F2698EE2B014D703F56F9E14958E28F298CD56027492C3A300FC4B619F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci............
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlM4MllSTNZlFj+n:SvRlI
      MD5:31CB7B76C7956E45E041026558CFA226
      SHA1:71216A3E97EBC506AB659D07B0FB60EC678A8F23
      SHA-256:BC3D03EA300FBD81784FD96045E026CF8E03D0941EA2A64DFC7A062A7B9391E1
      SHA-512:826E86F72D4B2D13ABE368EC598C3121C1822CB87BD3D1060E8194D5DA7E74E5A7F4784DEAD49E1F02FEF9BD36B01FD1202D72B1D2F8532F85791A20C243C07E
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.D....................D.....91ci..........C.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):172
      Entropy (8bit):3.8643130246325517
      Encrypted:false
      SSDEEP:3:XCbVSm/tlR9laCJ7lol/FBOlYClgxRtlRXk0bxC91Wh9/Fn3qfblX/F:SvL8CAhOlYpZLg9Ycld
      MD5:9849FEE7A1ADA725213BF5491CCCC73C
      SHA1:355418F1BA48CABE0DA73B73C5AEBF5D1DBF8014
      SHA-256:409A055AB32E826AE7FB50047BCE02447F6F83A46A26AF1CE924F14A2501E7E5
      SHA-512:FBD318B46F33736B364B9DC08EB7D171DCBC53311AE4CE74A95038CF84A8D9A1074E3ABCB2860F8E0F1DFF05F25EA94975BE25FCCE61DAD5EAD6B6859FC23744
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .<......#...#.........<.....91ci..2...1...4.9...1.4.......:.........:.;.;..........P....... .......P....... ......a.m......`=..`... ...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMmlfbTNZlFn:SvNt
      MD5:4D8B9ED918A6A21826CF6ACDA10D7B8B
      SHA1:DEC9BB0C1333322C691B9318A9FAD5E0987319E7
      SHA-256:E26840BBAC4F0ED8E3601F62ABB775FCC16BF38B70785540025D1818F7057881
      SHA-512:7AE98D692352C530AE50AB24C00C7F0AEB6C2F74C6B77EBBBDDF4BDD04B21E48816BF3F2698EE2B014D703F56F9E14958E28F298CD56027492C3A300FC4B619F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci............
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMmlfbTNZlFn:SvNt
      MD5:4D8B9ED918A6A21826CF6ACDA10D7B8B
      SHA1:DEC9BB0C1333322C691B9318A9FAD5E0987319E7
      SHA-256:E26840BBAC4F0ED8E3601F62ABB775FCC16BF38B70785540025D1818F7057881
      SHA-512:7AE98D692352C530AE50AB24C00C7F0AEB6C2F74C6B77EBBBDDF4BDD04B21E48816BF3F2698EE2B014D703F56F9E14958E28F298CD56027492C3A300FC4B619F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci............
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMmlfbTNZlFn:SvNt
      MD5:4D8B9ED918A6A21826CF6ACDA10D7B8B
      SHA1:DEC9BB0C1333322C691B9318A9FAD5E0987319E7
      SHA-256:E26840BBAC4F0ED8E3601F62ABB775FCC16BF38B70785540025D1818F7057881
      SHA-512:7AE98D692352C530AE50AB24C00C7F0AEB6C2F74C6B77EBBBDDF4BDD04B21E48816BF3F2698EE2B014D703F56F9E14958E28F298CD56027492C3A300FC4B619F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci............
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMmlfbTNZlFn:SvNt
      MD5:4D8B9ED918A6A21826CF6ACDA10D7B8B
      SHA1:DEC9BB0C1333322C691B9318A9FAD5E0987319E7
      SHA-256:E26840BBAC4F0ED8E3601F62ABB775FCC16BF38B70785540025D1818F7057881
      SHA-512:7AE98D692352C530AE50AB24C00C7F0AEB6C2F74C6B77EBBBDDF4BDD04B21E48816BF3F2698EE2B014D703F56F9E14958E28F298CD56027492C3A300FC4B619F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci............
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMmlfbTNZlFn:SvNt
      MD5:4D8B9ED918A6A21826CF6ACDA10D7B8B
      SHA1:DEC9BB0C1333322C691B9318A9FAD5E0987319E7
      SHA-256:E26840BBAC4F0ED8E3601F62ABB775FCC16BF38B70785540025D1818F7057881
      SHA-512:7AE98D692352C530AE50AB24C00C7F0AEB6C2F74C6B77EBBBDDF4BDD04B21E48816BF3F2698EE2B014D703F56F9E14958E28F298CD56027492C3A300FC4B619F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci............
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMmlfbTNZlFn:SvNt
      MD5:4D8B9ED918A6A21826CF6ACDA10D7B8B
      SHA1:DEC9BB0C1333322C691B9318A9FAD5E0987319E7
      SHA-256:E26840BBAC4F0ED8E3601F62ABB775FCC16BF38B70785540025D1818F7057881
      SHA-512:7AE98D692352C530AE50AB24C00C7F0AEB6C2F74C6B77EBBBDDF4BDD04B21E48816BF3F2698EE2B014D703F56F9E14958E28F298CD56027492C3A300FC4B619F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci............
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMmlfbTNZlFn:SvNt
      MD5:4D8B9ED918A6A21826CF6ACDA10D7B8B
      SHA1:DEC9BB0C1333322C691B9318A9FAD5E0987319E7
      SHA-256:E26840BBAC4F0ED8E3601F62ABB775FCC16BF38B70785540025D1818F7057881
      SHA-512:7AE98D692352C530AE50AB24C00C7F0AEB6C2F74C6B77EBBBDDF4BDD04B21E48816BF3F2698EE2B014D703F56F9E14958E28F298CD56027492C3A300FC4B619F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci............
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):88
      Entropy (8bit):2.7148996570578574
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlKelBjlgljl/Fu2Okl8:SBtkJTl46xka
      MD5:B2A17B52F311F0F8BD19EEC1D270AA5D
      SHA1:5597D0EB202F218C9B027A9F27B8C6187D996508
      SHA-256:B60B69A397846AED406CCE1662AE4D08F41B5D1F1191D402CA1DD562822CC0E0
      SHA-512:4A1ECA4483406AF775AD1C05C4C249378A499E0BFB09BA3D56FE4A685D9AA4681006B1EBA0CC614382F864A0D776B1A6ACF8F441424B21CE135DB41CCBB7318D
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci..e.n._.V.U.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMg9lZNTNZlFb:SvbZh
      MD5:5C178E2FA9F7BFAFD04671973597DA85
      SHA1:77BEEB262833524FF0CB993F282ABEFC05B49323
      SHA-256:DFECD526162A19ED0E877A733782593D1CF496E5D1435248C06BDF5386F36BBD
      SHA-512:D4FAD5F465B41FA87DF52FB0BAE6A5C4CDD48C3C43BE1DAAE1DE9B55B962F217CB666F47F7980599CAAF0101AAD46895F2A3F07E872A1B44146EBC64CFF860B9
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.|....................|.....91ci..........{.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):136
      Entropy (8bit):3.6674873990389525
      Encrypted:false
      SSDEEP:3:XCbVSm/tlb7XlBlTYL8uO1kMPUUcj/DgqNkZlEah/F:SvN39a7Pg3EahN
      MD5:C624339EDAAF7564C53616BB31B0F7C5
      SHA1:4207CC218B0682BF267FB1B2F1C2977F5BA5DA75
      SHA-256:96A731D1EFA3FEABD62B024FB17E5C52CE6E67468893AD7B56320D43D0EB0C98
      SHA-512:0CD605C7CC408CA9DBBE400875C9273A14855D9A92D0DC6961D88BC6461B5835396192DBD58176BE508DF9AFDF8449F4FAB209B857EE4A7559392ADFB68FA4AE
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..'....................'....91ci......:.P.P.....:..'.'....).1......P...P....... ......a....`{..`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.040932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMg9lZNTNZl+e:SvbZae
      MD5:A3CD4CFB2A1BA42247C9686225807918
      SHA1:4DB66651D6DE29451CEB1B9ED9E188D6D6EADEA0
      SHA-256:C8CA7FA12F4F74D2B7C10823015519765426403B9535B57A08D7BAF694AE7521
      SHA-512:EB7F4C10D3B593FC6B4D436291E5E990001C5BC74B1DA545C69898CCEB5D126F9CD9A589945672E3D0380392F949B62256FF954BCE19DC19502CD8BC5EA8611C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.|....................|.....91ci..........{.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMg9lZNTNZlFb:SvbZh
      MD5:5C178E2FA9F7BFAFD04671973597DA85
      SHA1:77BEEB262833524FF0CB993F282ABEFC05B49323
      SHA-256:DFECD526162A19ED0E877A733782593D1CF496E5D1435248C06BDF5386F36BBD
      SHA-512:D4FAD5F465B41FA87DF52FB0BAE6A5C4CDD48C3C43BE1DAAE1DE9B55B962F217CB666F47F7980599CAAF0101AAD46895F2A3F07E872A1B44146EBC64CFF860B9
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.|....................|.....91ci..........{.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMg9lZNTNZlFb:SvbZh
      MD5:5C178E2FA9F7BFAFD04671973597DA85
      SHA1:77BEEB262833524FF0CB993F282ABEFC05B49323
      SHA-256:DFECD526162A19ED0E877A733782593D1CF496E5D1435248C06BDF5386F36BBD
      SHA-512:D4FAD5F465B41FA87DF52FB0BAE6A5C4CDD48C3C43BE1DAAE1DE9B55B962F217CB666F47F7980599CAAF0101AAD46895F2A3F07E872A1B44146EBC64CFF860B9
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.|....................|.....91ci..........{.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMg9lZNTNZlFb:SvbZh
      MD5:5C178E2FA9F7BFAFD04671973597DA85
      SHA1:77BEEB262833524FF0CB993F282ABEFC05B49323
      SHA-256:DFECD526162A19ED0E877A733782593D1CF496E5D1435248C06BDF5386F36BBD
      SHA-512:D4FAD5F465B41FA87DF52FB0BAE6A5C4CDD48C3C43BE1DAAE1DE9B55B962F217CB666F47F7980599CAAF0101AAD46895F2A3F07E872A1B44146EBC64CFF860B9
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.|....................|.....91ci..........{.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMg9lZNTNZlFb:SvbZh
      MD5:5C178E2FA9F7BFAFD04671973597DA85
      SHA1:77BEEB262833524FF0CB993F282ABEFC05B49323
      SHA-256:DFECD526162A19ED0E877A733782593D1CF496E5D1435248C06BDF5386F36BBD
      SHA-512:D4FAD5F465B41FA87DF52FB0BAE6A5C4CDD48C3C43BE1DAAE1DE9B55B962F217CB666F47F7980599CAAF0101AAD46895F2A3F07E872A1B44146EBC64CFF860B9
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.|....................|.....91ci..........{.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMg9lZNTNZl7d:SvbZF
      MD5:9E46895540FD75BA1C21CC8BCA9446B4
      SHA1:09C5D01771B26A3F003757FD9788D13C0F10AE26
      SHA-256:56B0002469F572CFD0CB8C8BECEA7A1005EA8F7ED1D3DD308E0C4AD28A88F0C6
      SHA-512:B7B792042ABA5729EB852ECDA456087F05E459641F62C1BC6E951F3BD72A81B8C6D55A995FC07BFFD2CE342CF87618010A4AD63271CA4518950C9B93B9B6DF85
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.|....................|.....91ci..........{.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):576
      Entropy (8bit):4.578386550300064
      Encrypted:false
      SSDEEP:12:JyicxElUBM9IlAax+U+i/2mMneG0PAnqIYmak+n399Z+E:JFcxVBM9IlLYUnanZ0fhxVH
      MD5:58C20A26E67A5E433C49DC9A273F4E50
      SHA1:2A895CCAE49F44C9257B127F33304C987057E3DE
      SHA-256:6890E7C42409C74B2E65DC51D4D28AED0C6C70F5A11A7221D7432E0935180D59
      SHA-512:4604EA7EBC8705CD422E748079DC735534F0F244E2F6E789B2121DDBB008F73E3CBC14C62B7CF926DC03485259B288FF938AD472016A8B6D18232A737E644434
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ......................N...91ci..a.c.r.e. .p.i.e...{.0.}. .a.l. .a...o...{.0.}. .a.l. .d...a...{.0.}. .a.l. .m.e.s...{.0.}. .p.o.r. .p.i.e. .c...b.i.c.o......................5...:..xT3.>..5...:..x8o.x....:....'....:..(<3..5...:..d{..+..5...:..d.R.d....:...........5.......:.......5.@3..5..B..5..q..5.....[.w.c.>..PA..PD..P............G..PN..PU..PZ..P........_..Pf..P..F.m..P....r..P..J.....K.j.N.. S.. Z.. ^.. `.. ....u..P..J.j.. ....x..P....}..P..v....P..U....P..q....P......:.K.j.n.. p.. r.. t.. v.. ........a.m....`{..`b.. l.. x..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMKl/pxlBlllcENZl7r:Svll/aMj
      MD5:F616941B9E4A6D0FFA96433EFC906C6D
      SHA1:622E12F3D922AE8887FD13DAAE6C1302358F019E
      SHA-256:E4FC1C6EAC3A76A7EFBC3C4B106882377EE5B0BA51B2D99E5817C4F01501EC0D
      SHA-512:E10DF0439CD189B1DA769E3F21CF676456B42189A54B01957371A2A8087CC65E369AC1F1983566FC884A85812DFD14201E1B5ACD886D5300B57B6E8FC05995AE
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci............
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):116
      Entropy (8bit):3.5029288909356517
      Encrypted:false
      SSDEEP:3:XCbVSm/tld1NlTYZkOgsl8pNkZlEHG2DNn:SvBPOgsl8pN6Em2B
      MD5:4DC5B0A5A3AE19CF4902147939532DC8
      SHA1:D55CD66155C72609071E12A017F7FB0089B1312A
      SHA-256:9EEA81C3EFD3E97E23E6E6990626FEFAAD297343E3957AC5C1394FAB58625215
      SHA-512:4DFB13CEC1072E60DE0EB278BA490004B828808FFF87FF6EB027E31E7F36EE972D2B7ABC481B3883A2F147B423CB8BDAFB176C550F4B0A06AD1DA96871D3E638
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..'....................'....91ci......:..'.'..1....P....... ......a....`{..`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMg9lZNTNZl7d:SvbZF
      MD5:9E46895540FD75BA1C21CC8BCA9446B4
      SHA1:09C5D01771B26A3F003757FD9788D13C0F10AE26
      SHA-256:56B0002469F572CFD0CB8C8BECEA7A1005EA8F7ED1D3DD308E0C4AD28A88F0C6
      SHA-512:B7B792042ABA5729EB852ECDA456087F05E459641F62C1BC6E951F3BD72A81B8C6D55A995FC07BFFD2CE342CF87618010A4AD63271CA4518950C9B93B9B6DF85
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.|....................|.....91ci..........{.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):20160
      Entropy (8bit):4.748356832411956
      Encrypted:false
      SSDEEP:384:COCKXHE0Ahg5nm9VnEzH2EujuSUUWqSss7/lE63cyv5+e4jcmk5eX53bxgYW95gY:qGuEzH3Tmk+MXhZ8XbcXfjoX0Aa+M6I7
      MD5:017493C71CB00B7CBB897FCD0A38A59E
      SHA1:0AE1B830D2C549E4E5978C2C87B6FA045D1F8B4B
      SHA-256:07006BFEC02F4A199B2EEFE81879EF37C1C4DF3A0763E1C611ABB49E74BC4EB4
      SHA-512:ABEBA452B8EF35FCEEAB554BA1C64BEDD9B92CEF4C6F65C5181152F835145341629F03EA13747D223B51F3749AF64F05FEE3DB489220DAE25904CE5A7A7CB423
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .`....................`.....91ci..k.i.v.i.d...o.o.m.i.d...{.0.}./.k...{.0.}. .a.....{.0.}. .h.j...s...l.l.a.d...a.a.k.r.i.d...m.o.o.l.i.d...{.0.}. .i.p...{.0.}. .l.l...{.0.}. .l.p...{.0.}. .p.l...{.0.}. .s.a.j...{.0.}. .s.p.l...d.u.n.a.m.i.d...p.u.n.k.t.i.d...{.0.}. .k.u.u...{.0.}. .n...d...{.0.}./.n...d...k.W.-.t.u.n.d...k.v.a.r.d.i.d...n...d.a.l.a.d...{.0.}. .o.o.m...{.0.}./.s.e.k...{.0.}./.....p...{.0.}. .k.u.u.d...p.a.r.s.e.k.i.d...b.u.a.a.e.l.i.d...d.a.l.t.o.n.i.d...h.e.k.t.a.r.i.d...k.a.r.a.a.d.i.d...{.0.}. .b.a.i.t...{.0.}. .j.a.l.g...{.0.}. .k.i.v.i...{.0.}. .m.i.i.l...{.0.}. .t.o.l.l.......p...e.v.a.d...{.0.}. .m.o.o.l...{.0.}. .s...l.m...{.0.}. .t.a.s.s...b.a.r.r.e.l.i.d...k.e.l.v.i.n.i.d...s.a.j.a.n.d.i.d...{.0.}. .b.i.t.t...{.0.}. .k.u.u.s...{.0.}. .n.a.e.l...{.0.}. .o.o.m.i...{.0.}. .p...e.v...{.0.}. .s...l.d...{.0.}. .t.u.n.d...{.0.}. .u.n.t.s...{.0.}. .l...h. .t...j...u.n.a.e.l.a.d...f.u.r.l.o.n.g.i.d...r.u.u.t.j.a.l.a.d...k.i.l.o.v.a.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.8041805894387437
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXE/66E7lyMC/n:SvV/66gdC/
      MD5:6134F4CD4D6C15CE86537D2613927036
      SHA1:59D53B482F70551D8DEA499A310E7DA230219A18
      SHA-256:68F743AEC976A4117DCA15A76760CAC2F8580CEDFA64B9C7D523A8F7BC0FE081
      SHA-512:AAB3C6A451737433D25E38D86D21F865D944541D8C3A1EA23D937AFB33C3A06C56A436AFA997D42343AAE8395607819A1A79F0FCB60A8017EE4C6E4C9A140172
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.h....................h.....91ci......g.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.945547915629603
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDklU8gl8l/csyMmllZn:SBtkJYlU8g8l/knlzn
      MD5:6531B41F94F0C023EA9A39B05C6FB84B
      SHA1:64BDFFF943DD28467054EDE432FA0403169A6334
      SHA-256:B1CC805BA88346F9FAD694C30084B1959F9E786D862EE4458DC395BA021823D3
      SHA-512:2CD388003FB69FA7EB82DFB6D44A3E06B68A78B9B44902024BBE99ECB5387C2A7A04529267AE7BE52CADD372B02837E786D4BD6E8A69E021BA7E4F80F8A565F4
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci..f.f._.L.a.t.n._.C.M...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.945547915629603
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDklU8gl8l/csyMdZn:SBtkJYlU8g8l/kon
      MD5:0CEF3ECF95918F9D55B7E33A1A913CAB
      SHA1:6AC685DF4E065388CD09A6E6EFFDF6D2DB98669B
      SHA-256:63DCB2AEA982B720D1C96BF7113AE4F934C4A41467871DB5EF076CF6A32BFB9E
      SHA-512:1DE954E153E428802B04317FD5ACCF61CCB827611F18144C4326973454F4C51A85FFC3FBEABE8E78E11CD8F6F3D82817241A5B0F90134899AD26E3D5BD4036F3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci..f.f._.L.a.t.n._.S.N...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):15044
      Entropy (8bit):5.081373986205722
      Encrypted:false
      SSDEEP:384:eglvm9xEoqtVIzFDKiiRp+5jL+SUm8Wjn:HWxqtVIzQv+N+SUmDn
      MD5:A75E87DA1FB2541F6973C3DA1615C649
      SHA1:D456C2288906A660AD5F683A8EDCD29D39217E82
      SHA-256:2E1786D2BCA98C7239FF3C373DEE7789217285672D6ADD315D8BE68B7838011D
      SHA-512:98E262F3D6ADE188D4741E93BE09AC78D18A4C2E770CE0535676244B4E241E9ED5D25703352EA1EDA376C1A7916ADC1D30760DAB85796FE950EEFDF853B5BFC5
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................91ci..p C...p.t.s...{.0.}.H.....s.e.g...m.s.e.g...m.i./.h.r...{.0.}. .K.D.....m.e.t.r.o...d.e.g... .K...m.e.t.r.o.....y.a.r.d.a.....y.a.r.d.a.....{.0.}.t.a.o.n...n.a.n.o.s.e.g...m.i.l.i.s.e.g...s.q. .m.i.l.e...{.0.}. .a.r.a.w...{.0.}. .o.r.a.s...{.0.}. .t.a.o.n...{.0.}./.a.r.a.w...{.0.}. .k.i.l.o...{.0.}.b.u.w.a.n...{.0.}. .t.a.s.a...{.0.}./.t.a.o.n...{.0.}. .o.n.s.a...l.i.t.r.o./.k.m...m.g.a. .o.r.a.s...m.g.a. .t.a.o.n...p.u.l.g.a.d.a.....p.u.l.g.a.d.a.....{.0.}. .b.u.w.a.n...{.0.}.l.i.n.g.g.o...m.e.t.r.o./.s.e.g...m.g.a. .b.u.w.a.n...m.g.a. .s.i.g.l.o...m.i.l.y.a./.g.a.l...{.0.}. .n.a. .l.y...{.0.}. .n.a. .m.c...{.0.}. .n.a. .p.c...{.0.}. .n.a. .p.m...{.0.}. .n.a. .y.d...{.0.}./.b.u.w.a.n...{.0.}. .l.i.n.g.g.o...{.0.}. .n.a. .m.p.t...{.0.}./.l.i.n.g.g.o...m.g.a. .l.i.n.g.g.o...m.g.a. .m.i.n.u.t.o...m.i.l.y.a./.o.r.a.s...{.0.}. .n.a. .b.i.t...{.0.}. .n.a. .d.e.g...{.0.}. .n.a. .g.a.l...{.0.}. .n.a. .l.u.x...{.0.}. .n.a. .
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):13300
      Entropy (8bit):5.062980967084747
      Encrypted:false
      SSDEEP:192:WFBU8GLBJHxKQFvTnkcmEVoE4p4RI4J4fW0BWS3fcwHiYPzL4n+:SBUJJ5znm1iZC+SWS3vp4+
      MD5:3DABB114B27AEAD5A07BF429DE29A4F3
      SHA1:348C56AD959BDC7B2E02FD688BBE3244101416A4
      SHA-256:9769E6AB898659935A5B8CC4EAD3CA4A3C86BDC68C6FFDC8BEBA449B0B93D6F4
      SHA-512:E4CACF5BB56A5F0EB808B488619477B91BB51A33C1E8EC8786E1F941C91CF54EB51C04D49044701045377A70E2B8738DD97707132269A7CAF37398664A9DA1B5
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .w....................w.....91ci..{.0.}...r...{.0.}.t.....{.0.}.v.....{.0.}. ...r...{.0.}.m.s.....{.0.}. .......{.0.}./...r...{.0.}. .b...t...{.0.}. .m...l...{.0.}. .p.k.t...{.0.}. ...s.....{.0.}. .m.s.....{.0.}. .v.i.....{.0.}./.f...t...{.0.}. ...l.d...{.0.}./.v.i.....{.0.}. .s.t.i.g...{.0.}. .m...n.....{.0.}. .m...l.....{.0.}. .e.k.r.a...{.0.}. .m...l.....{.0.}. .s.n.......{.0.}. .t.u.m.....{.0.}. .u.n.s.a...{.0.}./.m...l.....{.0.}./.t.u.m.....2...1...4.8...9...{.0.}. .f...t.....{.0.}. .t...m.i...{.0.}. .v.i.k.a...{.0.}./.u.n.s.u...{.0.}. .m...l./.t...{.0.}. .u.n.s.u.r...{.0.}. .t.e.s.k.....{.0.}. .t.u.m.......{.0.}. .f...t.u.r...{.0.}. .f...t.u.r...{.0.}. .t.u.m.......{.0.}. ...l.d.i.r...{.0.}./.t.u.m.......m.i.k.r.o.s.e.k.....{.0.}. .l.i.t.u.r...{.0.}. .m.e.t.u.r...{.0.}. .t.u.m.m.i...{.0.}. .t...m.a.r...{.0.}. .s.j...m...l...{.0.}. .s.m...l./.t...{.0.}. .f.e.r.m...l...{.0.}. .k.o.p.p.u.r...{.0.}. .f...t.u.r.....{.0.}. .f...t.u.r.....{.0.}. .e.y.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):20012
      Entropy (8bit):4.889244556728978
      Encrypted:false
      SSDEEP:384:3v616sK0ClHiNnF6mw0CVmP8mGY0PM1dFjlGqaY:f4C0F6mw0X0PMDPVaY
      MD5:9D5764E76638394E0485835CE73F84E0
      SHA1:7851AF4721AB80356A042918BB320733C2917068
      SHA-256:43C70995F7005BE5203FB96EC0878F4B96D4C557673A1C77EE1A697E95ECE524
      SHA-512:8FEFC22DD116A116802B5AFE955F08684EF7450043E3F0C1A4592D9F473A4C071C78E1BD941B4329EC51F14FD570D7F2B46B2A2641D9184C5C8B762FD4073545
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................{.. .X....................X.....91ci..3 H.g...{.0.}./ N...{.0.}./ g...{.0.}./ h...{.0.}./ j...{.0.}./ l...{.0.}./ s...{.0.}./ A...{.0.}./ J...{.0.}./ K...{.0.}./ V...{.0.}./ W...{.0.}./ t...{.0.}./ ....{.0.}./ 0 ..{.0.}./ 1 ..{.0.}.c.h...{.0.}.u.a...{.0.}./ m...{.0.}./ o...{.0.}./ E...{.0.}./ O...{.0.}./ S...{.0.}./ c.t...{.0.}./ M.l...{.0.}./ a.l...{.0.}./ c.m...{.0.}./ h.l...{.0.}./ k.g...{.0.}./ k.m...{.0.}./ l.x...{.0.}./ m.....{.0.}./ m.m...{.0.}./ m.s...{.0.}./ m.....{.0.}./ n.d...{.0.}./ p.i...{.0.}./ p.o...{.0.}./ u.a...{.0.}./ ..C...{.0.}...s.....{.0.}./ D.a...{.0.}./ G.W...{.0.}./ G.o...{.0.}./ H.z...{.0.}./ L..&..{.0.}./ M.W...{.0.}./ M.o...{.0.}./ M.."..{.0.}./ M..&..{.0.}./ P.o...{.0.}./ R..&..{.0.}./ T.o...{.0.}./ a.c...{.0.}./ c.h...{.0.}./ d.m...{.0.}./ e.V...{.0.}./ h.a...{.0.}./ k.J...{.0.}./ k.W...{.0.}./ k.o...{.0.}./ l.b...{.0.}./ m.A...{.0.}./ m.W...{.0.}./ m.g...{.0.}./ m.i...{.0.}./ m.....{.0.}./ n.m...{.0.}./ n.s...{.0.}./ o.z...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):10868
      Entropy (8bit):4.868626587414015
      Encrypted:false
      SSDEEP:192:7iQalBBLRP0memzcKbJb2fRsNw/SK3XkeVsNKMxB7gA8enK6CMX42541gSY:5al32memzcEw/mNfr94hY
      MD5:DF4CA241DF2B2CB331C23579CDEE3EFE
      SHA1:055046C8F97EBC6ECD99F286CAC37EA418B6C9F6
      SHA-256:61DC72F03AE6CE930899CB5D02C36E033183330E2D173A1328D87FA25C70E713
      SHA-512:1C6D528C6376EF4A49F93D4D39EA037397ED733DC388CFDDE11DBA8092FCF4491BAE35AF34D0A978E28EDF67F9181D809B63B3CF741FCC2F553EE836D566D85F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..}....................}....91ci..{.0.}.t.c...{.0.}.N.M...{.0.}.a.l...{.0.}.n.d...{.0.}.p.i...{.0.}.p.o...{.0.}.v.g...{.0.}...s...{.0.}. .G.o...{.0.}. .M.o...{.0.}. .T.o...{.0.}. .c.h...{.0.}. .k.o...{.0.}. .p.o...{.0.}. .t.c...{.0.}...N.M...{.0.}...v.g...{.0.}. .p.i...{.0.}. .v.g...{.0.}...p.i...{.0.}...u.a...{.0.}.....C...{.0.}. .v.g.....{.0.}. .a.n.s...{.0.}. .p.o.....{.0.}. .p.o.....{.0.}...p.i.....{.0.}...p.s.i...{.0.}...p.t.e...{.0.}...v.g.....f.o.r.c.e. .G...{.0.}. .p.i.....{.0.}. .p.t.e...{.0.}. .v.g.....{.0.}./.s.e.m...{.0.}...p.i.....{.0.}. .c.h.o.p...{.0.}. .m.o.i.s...{.0.}. .j.o.u.r...{.0.}. .o.n.c.e...{.0.}. .p.i.e.d...{.0.}. .o.c.t.e.t...{.0.}. .l.b.-.p.i...{.0.}...p.o. .H.g...{.0.}. .d.e.g.r.....{.0.}. .h.e.u.r.e...{.0.}. .j.o.u.r.s...{.0.}. .m.i.l.l.e...{.0.}. .m...t.r.e...{.0.}. .o.u.e.s.t...{.0.}. .p.o.u.c.e...{.0.}...v.e.r.g.e...{.0.}. .v.e.r.g.e.s...{.0.}. .d.e.g.r...s...{.0.}. .g.r.a.m.m.e...{.0.}. .h.e.u.r.e.s...{.0.}. .l.i.v.r.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):452
      Entropy (8bit):3.9471071501604382
      Encrypted:false
      SSDEEP:12:i3ALEPoq0wq0wYDGdOY3H0Gdos6yFGfTHhxVP:iwLyo1w1FDEX0Fs1F8LhxV
      MD5:243D1302D7C328418F1E9A6E2B73CDF1
      SHA1:7045BAE90A58F0ADF05B6A64CC709D7EE39D255E
      SHA-256:7B0F28AA6E2066CBBDA528B1A38471CBA87205826A77CD098A6254224BA41F3E
      SHA-512:0F1A9BB383F371151DF7FEF9D28085A48A30C1211E91D66A30A61765D44962C782D511EFA988C345A1125272AFF3CCF9A4EAC727889122F78693EA576FBB4917
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................b.. ..0.....i...i..........0J...91ci..g.r.....{.0.}.k.r...{.0.}.g.r...{.0.}.c.a.r.r.e.a.u...{.0.}.c.a.r.r.e.a.u.x...{.0.}. .p.o.u.r. .c.h.a.q.u.e. .m.e.t.r.e. .c.u.b.e...{.0.}. .p.o.u.r. .c.h.a.q.u.e. .c.e.n.t.i.m.e.t.r.e. .c.u.b.e.....5...:.)0&010....X0....=0..5..0..5..0..5...:..0.0.0....:. 0 0....c..P........j..Pm..P....j...J.. L.. ....p..P..8.T.. ..S.s..P........v..P}..P..J.8...X.. Z.. ......a.m...{..`P.. V.. ^..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):3936
      Entropy (8bit):5.218369961499987
      Encrypted:false
      SSDEEP:96:F2/kSmh1rjfPEYjB8FfMsOfDkknCZIpKacZP4L:P1djCFfslNpik
      MD5:5BDF3315281153E636EBD136A8845E73
      SHA1:676ED0061FC25F98780F73A38813C08A6D63E42A
      SHA-256:3D6CBF05380EAD90AE3FA495F68F5F911A1A4B3479FAD2889F264F4D9F47646B
      SHA-512:EE27967062D81545258633878613C5B0F6C59B0BE0F329CA3355126F0CB671BFD83F67FE878B8ADE52F37F5EC96EFF7E5362F1D6605BFD3471B7A6B4B77E6838
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................91ci..{.0.}. .j.r...{.0.}. .m.y.l...{.0.}. .a.r.e...{.0.}. .d.e.i...{.0.}. .w.k.n...{.0.}. .o.e.r.e...{.0.}. .f.o.e.t...{.0.}. .a.r.e.s...{.0.}. .j.i.e.r...{.0.}. .w.i.k.e...{.0.}. .d.e.i.e.n...{.0.}. .w.i.k.e.n...{.0.}. .t.o.m.m.e.n...{.0.}. .m.o.a.n.n.e...{.0.}. .h.e.k.t.a.r.e...{.0.}. .m.o.a.n.n.e.e.n...{.0.}. .s.e.k.o.n.d.e.n...{.0.}. .b.o.o.g.m.i.n...t...{.0.}. .l.j.o.c.h.t.j.i.e.r...{.0.}. .k.u.b.i.k.e. .m.y.l...{.0.}. .m.y.l. .d.e. .o.e.r.e...{.0.}. .h.y.n.s.t.e.k.r...f.t...{.0.}. .b.o.o.g.s.e.k.o.n.d.e.n...{.0.}. .m.i.l.l.i.s.e.k.o.n.d.e.n...{.0.}. .h.y.n.s.t.e.k.r...f.t.e.n...{.0.}. .f.j.o.u.w.e.r.k.a.n.t.e. .m.y.l...{.0.}. .k.u.b.i.k.e. .k.i.l.o.m.e.t.e.r...{.0.}. .m.e.t.e.r. .d.e. .s.e.k.o.n.d.e...{.0.}. .f.j.o.u.w.e.r.k.a.n.t.e. .f.o.e.t...{.0.}. .k.i.l.o.m.e.t.e.r. .d.e. .o.e.r.e...{.0.}. .f.j.o.u.w.e.r.k.a.n.t.e. .m.e.t.e.r...{.0.}. .f.j.o.u.w.e.r.k.a.n.t.e. .k.i.l.o.m.e.t.e.r...........!.......5...:.LgMEHg..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):15020
      Entropy (8bit):5.438754249792362
      Encrypted:false
      SSDEEP:192:jlNk6C0xU+CIV3whCBhvqdgFgImX84SkhTQUeVqx/PRvkeiIW4vgZDx8d8R:jPkkO4fRqnVQFCHRv6oA18+R
      MD5:F57075E98EDEA1CA8EE2ADCE95DE727A
      SHA1:78192E7525106F75225FA9E6ACA7673D98EADADF
      SHA-256:F0D60C43FCD628071777D0ADD6523ECDC489C18BA2C39F1B17E620C53958A4C6
      SHA-512:14663E1BEEF54BF19D24E394E7AD720F2B845623CF8982DFF670857899009BB2D18C3F9078AD2346EC56BC0199E1754CD357EEE49FACD51CC204FDF0FFD7FF52
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..=....................=....91ci..{.0.}.....{.0.}.....{.0.}.....{.0.}. ."...{.0.}. .'...{.0.}. .....{.0.}. .....{.0.}. .....{.0.}.......{.0.}./.....{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .......{.0.}./.......{.0.}./.......{.0.}./.......{.0.}./.....................{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}./.........{.0.}./.........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}./.........{.0.}./. .......{.0.}./.........{.0.}./.........................{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}./.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):3.4007237652827222
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQwl8t8WolUE+l2iAllfPAkll1:SvXl8t8FlUrl2iA/Ak9
      MD5:C177B7AA90760FB221186EBCB1EFDD58
      SHA1:3DCA7953EE83E5AA19331259E3CDBA45FE64DECD
      SHA-256:B4C6C502D250FF8DD61D2867C70F1C7719C15390561075A4FEA0E47304950244
      SHA-512:6E133FD97246DEB378888AF541353ABFF1ADCADA02E2F915099EA1D08F77956CA95284D83F7300440BA93C991C58AD574579F58424B47EF45B59D88EC625B1E0
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................91ci..........!................`...P
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):13408
      Entropy (8bit):5.390599142540395
      Encrypted:false
      SSDEEP:384:Vl8llSg7xEIIflnlFidJJJGHkBtY1y1tvUyl0ju:3mL8r1y1lUylp
      MD5:48F871CB77A03A83BF1FEF28E820A4AC
      SHA1:8B99F6804736372BCA2F635DEF63DDD32909A6FA
      SHA-256:F0E0908070F44D09F063A3F401D8E24493108CB1BC2B867BE029D937E2F2B43E
      SHA-512:4BAE6ADA2A352A9AE738C1593FB2B6429F0E0D1D2225CC3BD4A110E6FB911DA36A04026BEF79528C8A9C9CF2A14325EB57A01AAA8B2CECA35463D0ACFB9F7586
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................91ci..{.0.}.......{.0.}...@...{.0.}.5.I...{.0.}. ...*...{.0.}.&.?.(...{.0.}...>.9...{.0.}...@.2...{.0.}. .......{.0.}. ...p...{.0.}. ...@...{.0.}.....p...{.0.}...A.p...{.0.}.....p...{.0.}...?.p...{.0.}.2.@.p...{.0.}.8.G.p...{.0.}.9.G.p...{.0.}./...@.......M.*.@.p...{.0.}. .....6...{.0.}. .(.I.....{.0.}...8.G.p...{.0.}. .........{.0.}. .....8...{.0.}. .&.?.(...{.0.}. .,.?.....{.0.}. ...>.9...{.0.}. ...@.2...{.0.}.5.0.M.7...{.0.}.....!.<...{.0.}./.........{.0.}./.....8...{.0.}. ...H.p...{.0.}. .6.$.>...{.0.}. .....p...{.0.}. ...B.2...{.0.}. ...?.p...{.0.}. .2.@.p...{.0.}. .5.I.....{.0.}. .8.G.p...{.0.}. .9.G.p...{.0.}.....*.@...{.0.}./.....p...{.0.}./.&.?.(...{.0.}./...>.9...{.0.}./.2.@.p...{.0.}./.8.G.p...{.0.}. .!.K.(.....{.0.}. .,.H.0.2...{.0.}. .....!.<...{.0.}. ...H.2.(...{.0.}. .*.?.......{.0.}. .*.L...!...{.0.}. .,.>.......{.0.}. ...H.0.....{.0.}. .2...M.8...{.0.}./.*.L...!...{.0.}. .+.<.@.....{.0.}./...?.(.......@.2.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):14884
      Entropy (8bit):5.311890721101611
      Encrypted:false
      SSDEEP:192:kbbxETvMSqU6dzpEcsq5AZqQJFNZ52lyy+nG5elTrHNu5xVptSYeY:5tj2Ey+n3RM5xVj
      MD5:883FCA1C6A6B724D39F88C1D90B96AA3
      SHA1:1410A7A0F4B820E4C440393C65EB7847D0EA38DF
      SHA-256:8843EB32F3601B27420FA30F753A8945F7EFCA0E173E73977FEFA704BF7E3D33
      SHA-512:5366BD5D7A3F8F27022500253D4FF6DA0BDBCAA29F157AB9252F07235002317F7B7D48EB9D15CA673209395DD9642461B36F7442EB3F964301BA0C030DEB79E1
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................y.. ......................g...91ci..{.0.}. .a.....{.0.}. .B.~.....a.m...t.o.n.y...{.0.}. .c...l...{.0.}. .d.z.....{.0.}. .l...t...{.0.}. .m...s.....{.0.}. .B.~.k.....{.0.}. .u.n.c.y...{.0.}. .a.c.r.y...{.0.}. .c...l.e...{.0.}. .d.z.e.D...{.0.}. .l...t.a...{.0.}. .l...t.o...{.0.}. .l.....e...{.0.}. .h.o.d.z.....{.0.}. .t.y.d.z.....{.0.}. .B.~.i.c.y...{.0.}. .a.a.l.k.i...{.0.}. .a.c.r.a.j...{.0.}. .a.c.r.o.w...{.0.}. .b.i.t.a.j...{.0.}. .c...l.e.j...{.0.}. .c...l.o.w...{.0.}. .d.n.j.e.j...{.0.}. .m...s.a.c...{.0.}. .o.h.m.a.j...{.0.}. .B.~.i.c.a...{.0.}. .a.a.l.c.e...{.0.}. .a.a.l.k.a...{.0.}. .m.i.n.u...e...{.0.}. .m...s.a.c.y...{.0.}. .B.~.i...k.i...{.0.}. .b.y.t.e.a.j...{.0.}. .g.r.a.m.a.j...{.0.}. .j.o.u.l.e.j...{.0.}. .l.i.t.r.a.j...{.0.}. .m.e.t.r.a.j...{.0.}. .p.i.n.t.a.j...{.0.}. .p.u.n.t.a.j...{.0.}. .s.t.o.p.j.e...{.0.}. .s.t.o.p.o.w...{.0.}. .t.y.d.z.e.D...{.0.}. .v.o.l.t.a.j...{.0.}. .w.a.t.t.a.j...{.0.}. .y.a.r.d.a.j...{.0.}. .B.~.i.c.o.w...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):17340
      Entropy (8bit):5.050776509041609
      Encrypted:false
      SSDEEP:384:mREwBdbJsHmcmlJpA2nBCtlu9Vr9deFsF:qxnBCfsr9dHF
      MD5:AC858DA404C2D1DDD4F55792178D943D
      SHA1:ACDF2F8F537A7B061C4B6F88DB489A7EA32B2604
      SHA-256:AB8D8F8323D47054142CB79190D51CA2844BA83FDDE38FBA4192F2895BAEB7E2
      SHA-512:C956624A54DC3886EEE62E5AB5D0BE65B70E3927B9E307477390B6AE80E6776CE21D5B2326CB2FF17752267482BEE41A315087AFFA438E5C2569E0EA6EC38DDD
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .w....................w.....91ci..{.0.}.....P.b...t...m.....l.....s.e.k.....{.0.}. .m.....{.0.}. .s.e...{.0.}. ...r...{.0.}...r.h...{.0.}. .h.....{.0.}. .e.k...{.0.}. .p.....{.0.}. .t.....{.0.}. .t.....{.0.}. .v.....{.0.}.m.......m./.s.e.k.....{.0.}./.t.....{.0.}./...r...{.0.}. .f.e.t...{.0.}. .s.m.l...{.0.}. .e.k.....{.0.}. .k.t.....{.0.}. .l...x...{.0.}. .m.s.k...{.0.}. .m.......{.0.}. .s.n.....{.0.}. .t.s.k...{.0.}. .j...l...{.0.}. .l.j.....{.0.}. ...r.h...{.0.}./.f.e.t.....m.e.t.r.a.r...t.o.m.m.u.r.....t.o.m.m.u.r.....y.a.r.d.a.r.....y.a.r.d.a.r.....{.0.}. ...l.d...{.0.}./.t.o.m...{.0.}./...r.i...{.0.}. .s.t.i.g...{.0.}. .b...t.i...{.0.}. .m...n.....{.0.}. .m...n.....{.0.}. .f.e.t.....{.0.}. .v.i.k.a...B.N.A. .t.o.n.n...g.-.h.r.....u.n...n.a.n...s.e.k.....{.0.}. .L.s...l...{.0.}. .M.s...l...{.0.}. .R.s...l...{.0.}. .b.i.t.i...{.0.}. .m.b...r...{.0.}. ...n.s.a...h...f.u.....t.t...t.r.o.y.e.s.o.z...{.0.}. .e.k.r.a...{.0.}. .m...l.a...{.0.}. .v...t.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.8041805894387437
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXE/66E7lyMC/n:SvV/66gdC/
      MD5:6134F4CD4D6C15CE86537D2613927036
      SHA1:59D53B482F70551D8DEA499A310E7DA230219A18
      SHA-256:68F743AEC976A4117DCA15A76760CAC2F8580CEDFA64B9C7D523A8F7BC0FE081
      SHA-512:AAB3C6A451737433D25E38D86D21F865D944541D8C3A1EA23D937AFB33C3A06C56A436AFA997D42343AAE8395607819A1A79F0FCB60A8017EE4C6E4C9A140172
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.h....................h.....91ci......g.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.8041805894387437
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXE/66E7lyMC/n:SvV/66gdC/
      MD5:6134F4CD4D6C15CE86537D2613927036
      SHA1:59D53B482F70551D8DEA499A310E7DA230219A18
      SHA-256:68F743AEC976A4117DCA15A76760CAC2F8580CEDFA64B9C7D523A8F7BC0FE081
      SHA-512:AAB3C6A451737433D25E38D86D21F865D944541D8C3A1EA23D937AFB33C3A06C56A436AFA997D42343AAE8395607819A1A79F0FCB60A8017EE4C6E4C9A140172
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.h....................h.....91ci......g.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):9156
      Entropy (8bit):5.545391513355349
      Encrypted:false
      SSDEEP:192:BpZWVBvLdJk6Q99qtlQ0eO+koRL7Bz3ylgr:BpZWVBjdJPQ9O29Kopdz3yWr
      MD5:B135AA99FF00AC0A9A1C3CB98633898F
      SHA1:05A0D200915B96FD99B0B25633960E0BBA7C7E2B
      SHA-256:F27CD269E2365F699A9343C92F97726F0B2A40AC6C60EB201000BF2449FBD03E
      SHA-512:7963A17BE946F2FC0C6EE49095DA9C74B2A6C3B8ABB1621B35F126DC0F49939F49F96E4A3D04374E354B291F6887AF7B7B918ED7A94EA5FACCE4E02D3C26B352
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .._...................._-...91ci......).....-.(...T.(...{.0.}.....{.0.}.....{.0.}.D...{.0.}.|...{.0.}.....{.0.}.....{.0.}.C...{.0.}.....{.0.}..!..{.0.}.4...{.0.}.....{.0.}.....{.0.}.......{.0.}.......{.0.}.P.....{.0.}.......{.0.}...D...{.0.}./.D...{.0.}./.....{.0.}./.|...{.0.}./.....{.0.}.|....{.0.}......{.0.}.......{.0.}.$....{.0.}.x.....{.0.}.t.4...{.0.}..4...{.0.}.....{.0.}..%...{.0.}.0.....{.0.}.......{.0.}.8.0...{.0.}.(....{.0.}...H...{.0.}......{.0.}...9...{.0.}.(.d...{.0.}...q...{.0.}.t....{.0.}.......{.0.}./.....{.0.}./.....{.0.}.H.P...{.0.}.......{.0.}.......{.0.}.D.....{.0.}.@....{.0.}.x.X...{.0.}.<....{.0.}.........{.0.}.N.."m...{.0.}...\.....{.0.}.|.\.....{.0.}.B.t.u...{.0.}.b.b.l...{.0.}.l.b.f...{.0.}...x.....{.0.}.|...H...{.0.}.........{.0.}...t.....{.0.}....|...{.0.}.......{.0.}...x....{.0.}...x....{.0.}.....t...{.0.}.".H.g...{.0.}./.......{.0.}...t....{.0.}.T.....{.0.}...t. ....... .{.0.}...... .{.0.}....... .{.0.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):3.368272640304357
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQ5Ell88W2lT+l2iAllfPn9n:Svf/88hlCl2iA/n9n
      MD5:4EB54990F712FE7E3F2DA1088393C832
      SHA1:2375FB6AA7696FB3019296E2DCD6F885AC52A804
      SHA-256:B759FCCFDFA0644D5EC14A30A3DEE6C2A008DE94C804DF1EE7F0F1AAC84567C0
      SHA-512:BDB640894EDCCBCC3A03B805DDF27074D70EB137C90EC8DF73D4D2CCD66D9B3BD68645FBCA891D9CCF5C188661068BE0FC16885177FDB060D541B4111D50DB49
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................91ci..........!................`...P
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):29800
      Entropy (8bit):4.84026116737284
      Encrypted:false
      SSDEEP:384:LAq61BTfImbTzBfYOGpnuXLWuTe1dWBM8oBQKEO87ykRsG:sN/fUpniTe1dWG8CQKEO4y0
      MD5:46C050C3658896E74B8A60461C6438B0
      SHA1:6773A3A0D860BACEC66E3E1C22007EAAC2C439FC
      SHA-256:D02996547794E680462092430169F15B8B83E4DCB00A17734581F39048A872C9
      SHA-512:F6690044DCA30353C784C0B778F1E00D4855911AF0473555C3D6BE0354177E7A8490A3F88862C68564E6433325B79CF0FE9699E278B1A096B9E24B6468664274
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..x....................xM...91ci..{.0.}. .P...{.0.}. .R...{.0.}. .`...{.0.}. .I.M...{.0.}. .A.G...{.0.}. .K.N...{.0.}. .A.V...{.0.}. .a.m.....{.0.}. .N.-.m...{.0.}. .o.m.o...{.0.}. .o.m.s...{.0.}./.m.y.....{.0.}. .m...n.....{.0.}. .s.a.v.....{.0.}. .a.k.r.....{.0.}. .v.a.l.....n.a.n.o.s.e.k.....{.0.}./.s.a.v.....{.0.}. .m.e.t.s...{.0.}./.m...n.....{.0.}. .a.k.r.o...{.0.}. .a.k.r.s...{.0.}. .b.i.t.o...{.0.}. .b.i.t.s...{.0.}. .o.m.a.i...{.0.}. .o.m.a.s...{.0.}. .p...d.a...{.0.}. .p...d.s...{.0.}. .r.y.t.s...{.0.}. .t.o.n.s...{.0.}. .v.a.t.o...{.0.}. .v.a.t.s...{.0.}. .a... .a.....{.0.}. .k.v... .m...{.0.}. .v... .a.....{.0.}. .m.e.t.a.i...{.0.}. .t.o.n.o.s...{.0.}. .a.k.r.a.i...{.0.}. .p...d.o.s...{.0.}. .m...n.u.o...{.0.}. .a.k.r.a.s...{.0.}. .a.m.~.i.s...{.0.}. .b.a.i.t.o...{.0.}. .b.a.i.t.s...{.0.}. .b.i.t.a.i...{.0.}. .b.i.t.a.s...{.0.}. .c.o.l.i.o...{.0.}. .c.o.l.i.s...{.0.}. .c.o.l.i.s...{.0.}. .d.i.e.n.s...{.0.}. .g.r.a.m.s...{.0.}. .h.e.r.c.o.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.8041805894387437
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXE/66E7lyMC/n:SvV/66gdC/
      MD5:6134F4CD4D6C15CE86537D2613927036
      SHA1:59D53B482F70551D8DEA499A310E7DA230219A18
      SHA-256:68F743AEC976A4117DCA15A76760CAC2F8580CEDFA64B9C7D523A8F7BC0FE081
      SHA-512:AAB3C6A451737433D25E38D86D21F865D944541D8C3A1EA23D937AFB33C3A06C56A436AFA997D42343AAE8395607819A1A79F0FCB60A8017EE4C6E4C9A140172
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.h....................h.....91ci......g.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.8041805894387437
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXE/66E7lyMC/n:SvV/66gdC/
      MD5:6134F4CD4D6C15CE86537D2613927036
      SHA1:59D53B482F70551D8DEA499A310E7DA230219A18
      SHA-256:68F743AEC976A4117DCA15A76760CAC2F8580CEDFA64B9C7D523A8F7BC0FE081
      SHA-512:AAB3C6A451737433D25E38D86D21F865D944541D8C3A1EA23D937AFB33C3A06C56A436AFA997D42343AAE8395607819A1A79F0FCB60A8017EE4C6E4C9A140172
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.h....................h.....91ci......g.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.7614817407829997
      Encrypted:false
      SSDEEP:3:XCbVSm/tlM5Ell66E7lwMixn:SvL/66g7ix
      MD5:73C69C57B33AEF2C0727DFDA891B26D5
      SHA1:FCBB492532E487DAF4DE8D4F8884925FF3B1412F
      SHA-256:13AFEF8EFD97579CFB7C479EA1B5B71DCF90FE527F4F9E7EE78F5F7EF97ECAA9
      SHA-512:DDB84814465EA9CD26C061E49D03779C7FC4B11C4E6B3466D8EA24614D7C838CA84E2D2B14312A4ABCB24C78AC973F1D589B4579099D55150C9A2989BF665020
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.8041805894387437
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXE/66E7lyMC/n:SvV/66gdC/
      MD5:6134F4CD4D6C15CE86537D2613927036
      SHA1:59D53B482F70551D8DEA499A310E7DA230219A18
      SHA-256:68F743AEC976A4117DCA15A76760CAC2F8580CEDFA64B9C7D523A8F7BC0FE081
      SHA-512:AAB3C6A451737433D25E38D86D21F865D944541D8C3A1EA23D937AFB33C3A06C56A436AFA997D42343AAE8395607819A1A79F0FCB60A8017EE4C6E4C9A140172
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.h....................h.....91ci......g.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):18364
      Entropy (8bit):5.295725885924158
      Encrypted:false
      SSDEEP:384:IuxDceZIl7vU8jWYgyL+pL/BVeg1KcVzx0g9Tw2HFRTMwV8hyLrQG4H3LGjH+R2E:Iuxp/YgS0xfeV7qDPb4
      MD5:095C02A340E27E028CF7A2ADDACF10B7
      SHA1:E55181D9E0F75B6DDAD050E03E5838CE2D0EE391
      SHA-256:ED1F67B22587A8083061BE79BABEDFE6E54F515189D8E80852D62AAA83F936F9
      SHA-512:E556A4790F3AB02FCFA89839F6A507EDB84314148507D87FE652B9588044199D9262664DB8275BB919A63B44E8A2A2A8955F829B9C67FB1E3BB804AD0E6C6077
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .._...................._....91ci..5.>.0.....5.>.0.....{.0.}. .....{.0.}. .....{.0.}. .5...{.0.}...z...{.0.}.......{.0.}. .....{.0.}. .....{.0.}.*.....{.0.}.5.....{.0.}...8.F...{.0.}. .*.W...{.0.}. ...?...{.0.}. ...z...{.0.}...+.>...{.0.}. .......{.0.}./.......{.0.}.*.K.....{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .&.?...{.0.}. ...>...{.0.}. ...H...{.0.}. ./.>...{.0.}. .5.>...{.0.}. .9.F...{.0.}./.......{.0.}./.......{.0.}./.5.....{.0.}.+.>.....{.0.}.+.|.....{.0.}. .K.. ..{.0.}. .*.....{.0.}. .5.....{.0.}...?.....{.0.}.$.F.......H.}./.......{.0.}. .(.B.....{.0.}. ...H.....{.0.}. .....?...{.0.}. ...?.....{.0.}. ...@.....{.0.}. ...H.}...{.0.}. .2.?.....{.0.}. .5.>.0...{.0.}. .8.F.....{.0.}./.....?...{.0.}.....@.....{.0.}./...?.....{.0.}. .*.H.......$.A.....H.}...{.0.}. ...>.....{.0.}. ...B.....{.0.}. ...B.~...{.0.}. .*.K.....{.0.}. .+.>.....{.0.}. .+.|.....{.0.}. ...@.....{.0.}. ...@.....{.0.}. .5.>.....{.0.}. .5.>.....{.0.}. .5.>.....{.0.}. .9.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):11676
      Entropy (8bit):5.557641880818722
      Encrypted:false
      SSDEEP:192:SX1L61ITu9d8cO9fS0BdtvL+WaqraNbVK7au7xfbNbVMtIY5shF0MN3xMBQCrFO3:nnqZSXWxBwujlDOnXM41O4TmjLvHB
      MD5:2758071178FF41F92D9245465A596645
      SHA1:2321E5635A8C64C2F170306BEF489C03EE8319C8
      SHA-256:DBB8BA891FCDCE92442F918140F986E6B6A7D97087BEDBB50778EF1A43A9E6A0
      SHA-512:B448B399A1453359027577CE082C8EBB0F0CEDA1730363A8549D3158E50FD72D984A356C0DF46225C9568A824522BBEF0CC504E949A09B1F2A0CB00A95B3CF6F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................W.. .x......_..._.........x.....91ci....*.<...{.0.}. .0...{.0.}. .F...{.0.}./.F...{.0.}.......C. .E.M.<...F. .E.M.<.....<.5.B.@.......0.9.B...{.0.}. .3.@...{.0.}. ...3...{.0.}. .......{.0.}. ...8...{.0.}. .......{.0.}. .<.....{.0.}. .<.E...{.0.}. .A.=...{.0.}. .E.....{.0.}. .F.....{.0.}. .4.....{.0.}. .6.>...{.0.}. .:.6...{.0.}. .<.8...{.0.}. .D.B...{.0.}./.3.@...G.8.3.;.M.;...:...-.F.0.3...:.<./.F.0.3...{.0.}. .A.0.@...{.0.}. .6.8.;...{.0.}. .C.=.F...{.0.}.7.C.C.=...{.0.}. .<.8.....{.0.}. .c.<.....{.0.}. .E.M.<...{.0.}. .F.0.3...{.0.}./.8.=.G...{.0.}.......=...{.0.}. .:.@.F...{.0.}. .4./.E...{.0.}. .:...F...{.0.}. .:.@.B...{.0.}. .<.C.1...{.0.}. .?.=.B...{.0.}. .D.B.....{.0.}./.A.5.:...<.8.;.8.0.<.?...:.2...<.8.;.L...;.8.B.@./.:.<...<.8.;.8.A.5.:...{.0.}. ...4...@...{.0.}. .>.=.>.>...{.0.}. .:.<./.F...{.0.}. .E.C.2.L...{.0.}.#.<.0.@.4...{.0.}...<.=...4...{.0.}...@.=...4...{.0.}. ...A.5.:...{.0.}. .8.=.G.....{.0.}. .0.O.3.0...{.0.}. .8.=.G.....{.0.}. .<.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.500123730064915
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/FMlln:SBtkJ1li6gml/K/n
      MD5:C34486D88A5544F3392A4FB031ECA28C
      SHA1:287AE38B9011FD9BF97FAC414B405F1748B748FB
      SHA-256:F7835F43B81AF073E115DCDBDD71E6D274C476853FFE6BEFCFF4A6DD26E02CC6
      SHA-512:DD334E26082CD5F5B9CF2DD581930DB2DCFC8AE136FEA02B0A7E8376BAA2C0582236086C7D973A84C14EB3F873C6F540E70FE65917D757C6FA630E56CD780C35
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):13936
      Entropy (8bit):5.215968864855855
      Encrypted:false
      SSDEEP:192:Veg0oCCGGnmAI7Tl4/1/U61hNPT2X7ruy40XM4dwhvE9HUZnuy/P2MG1Q64nbv8e:ZYyhqUsy/OmRCfvg
      MD5:22FFA30D7C22584CC9EF87670F302457
      SHA1:201C2E426FBD5F7259BFF23C6F09AB1BC485D5D5
      SHA-256:25EE16CBB54BA20C61B132152CA8A7018C13B898B04C46E2746E8AA150F06AB3
      SHA-512:29B56747AD32B55F61B57E1CFA37A17E57838409587C4EDC92C3E18EF54FA0BEE6A870BCACED2946801217743641E4FBA70EFDAAB90997B01CB97B84E97ABBFE
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................@...91ci..y.r...{.0.}.....{.0.}.3...{.0.}.4...{.0.}.D...{.0.}. .....{.0.}. .3...{.0.}. .4...{.0.}. .D...(.J.1.D.2...1.'./...'.F...{.0.}. .(.|...{.0.}. .A.|...{.0.}. .|.F...{.0.}. ...2...".1.....3.....{.0.}. .H.1.....{.0.}. .A.|.G...{.0.}. ...2.G...i.n.c.h.e.s.....i.n.c.h.e.s.....k.m./.h.o.u.r...m.e.t.e.r.s.....{.0.}. .w.k.s...{.0.}. .(.|.3...{.0.}. .F.'.|...{.0.}. .H.'.|...{.0.}. .|.F.2...{.0.}. ...'.D...3.'.9.*.H.F.G...E.1.(.9. ...1...{.0.}. .3.D.F.G...{.0.}. .'.H.F.....{.0.}. ./.1.,.....{.0.}. .2.1.E.G...{.0.}. .H.1.......{.0.}. ./.H.F.E...{.0.}. .G.1.|.2...{.0.}. .(...1.D...{.0.}. .F.'.|.3...{.0.}. .m.t.h.s...{.0.}. .'.F.......{.0.}. .'.H.G.E...{.0.}. .'.J.......{.0.}. .(.'.J.|...{.0.}. .,.H.D.2...{.0.}. ...*.J.....{.0.}. .3.H.J.D...{.0.}. .D.J.|.1...{.0.}. .E.*.1.G...{.0.}. .H.'.|.3...{.0.}. .H.H.D.|...{.0.}. ...1.'.E...{.0.}. ...J.D.F...{.0.}.G.1. .A.|...{.0.}. .'.H.G.E.2...{.0.}. .'.J.....2...{.0.}. ./.H.F.E.2...{.0.}. .
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):2.9909324233057175
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMI9lx/lTNZlR4:SvjB2
      MD5:5E3E0A089D7BACD2F1AC2684EE9BEF02
      SHA1:4BD888AE18FA11258D13F8FA615D8915777CA4EE
      SHA-256:F963A5003BFC4BCF7A310C34BDADED866BFE24561FEF032E89FECAB13BC3FFBB
      SHA-512:A65C63ADD4DB82803F2ACA5D2CA2EBDADD12FAFF258472D36B0F735617104C352FF28B49AFC19446FCAB396E1FEBDC9A08BD91D2EF43F96EE25658D3A216C4BF
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci............
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):2.9909324233057175
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMI9lx/lTNZlR4:SvjB2
      MD5:5E3E0A089D7BACD2F1AC2684EE9BEF02
      SHA1:4BD888AE18FA11258D13F8FA615D8915777CA4EE
      SHA-256:F963A5003BFC4BCF7A310C34BDADED866BFE24561FEF032E89FECAB13BC3FFBB
      SHA-512:A65C63ADD4DB82803F2ACA5D2CA2EBDADD12FAFF258472D36B0F735617104C352FF28B49AFC19446FCAB396E1FEBDC9A08BD91D2EF43F96EE25658D3A216C4BF
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci............
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):2.9909324233057175
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMI9lx/lTNZlR4:SvjB2
      MD5:5E3E0A089D7BACD2F1AC2684EE9BEF02
      SHA1:4BD888AE18FA11258D13F8FA615D8915777CA4EE
      SHA-256:F963A5003BFC4BCF7A310C34BDADED866BFE24561FEF032E89FECAB13BC3FFBB
      SHA-512:A65C63ADD4DB82803F2ACA5D2CA2EBDADD12FAFF258472D36B0F735617104C352FF28B49AFC19446FCAB396E1FEBDC9A08BD91D2EF43F96EE25658D3A216C4BF
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci............
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):4396
      Entropy (8bit):5.349190956533119
      Encrypted:false
      SSDEEP:96:d4M01bDvkzmlMwWADyqoAzrYavLcapS88NVyyecUvWr:dkbDvQvw9RYazcCbIr
      MD5:E4219AF836A36899BFBA8B1631813406
      SHA1:F075D64302327FC2BD662958761CEA35DF2C9D69
      SHA-256:6FA1F6835FD4F23FC763CECB7CC857A2E1DBF84C1A0D03C6B7B89E2E48C18B9B
      SHA-512:B86AA2133B72A72F7920198C5B0D6D2C65F28C271AF77785A38F1405444EECCA1922622C3B9E6C440B7016C0993B3B6FA86DD8367CDDE358288980C8D2345240
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................<.. ........C...C...............91ci..{.0.}. .c.s...{.0.}. .s.u.l...{.0.}. .c.h...m...{.0.}. .e.s.t.e...{.0.}. .c.h...v.....2...1...4.7...8.9...{.0.}. .O.e.s.t.e...{.0.}. .n.o.r.t.e...{.0.}. .c.h...v.e.n.a...{.0.}. .c.h...v.e.n.a.s...m.i.l.h.a.s./.g.a.l...o...m.i.l.h.a.s./.g.a.l. .i.m.p.....{.0.}. .e.l.e.t.r...o.-.v.o.l.t...{.0.}. .e.l.e.t.r...e.s.-.v.o.l.t.s...{.0.}. .c.h...v.e.n.a. .m...t.r.i.c.a...{.0.}. .o.n...a. .f.l.u.i.d.a. .i.m.p.....{.0.}. .c.h...v.e.n.a.s. .m...t.r.i.c.a.s...{.0.}. .o.n...a.s. .f.l.u.i.d.a.s. .i.m.p.....{.0.}. .m.i.l.i.m.o.l.e. .p.o.r. .l.i.t.r.o...{.0.}. .q.u.i.l...m.e.t.r.o. .q.u.a.d.r.a.d.o...{.0.}. .q.u.i.l...m.e.t.r.o.s. .q.u.a.d.r.a.d.o.s...{.0.}. .p.o.r. .q.u.i.l...m.e.t.r.o. .q.u.a.d.r.a.d.o...{.0.}. .m.e.t.r.o. .p.o.r. .s.e.g.u.n.d.o. .q.u.a.d.r.a.d.o...{.0.}. .m.e.t.r.o.s. .p.o.r. .s.e.g.u.n.d.o. .q.u.a.d.r.a.d.o.....5...:..8.8.8..5...:.,...(...5...:..........5...:..@.4.@..5...:.-...)...5...:...+.....5...:...|.}...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):3560
      Entropy (8bit):5.072081775060199
      Encrypted:false
      SSDEEP:96:xT7S+Nkq+gm1gN0fMqkOomB/P0siDO8+9QDrcFQevWdiJPrdTUEdxpR/ajHVLGVX:p7S+NkqLm1gN0fMqkOomBnFiDO86QDrW
      MD5:E8DF44D39650D3C4CE831FC53BD059F1
      SHA1:20487F16071939861E7C2D88A09B3E7F06C61E5F
      SHA-256:CC61D9B22630DADBE6299A43D8B23778175E60AFF1EF6066050EC656FFA51251
      SHA-512:CD982FB6D96ACE087CDB1B7C8AE492826D32B187486475F92B1A214BDF324C5FECA54BBFA6220A484300F9382D9AD69A79616646A52656B424DDF41C0B270125
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................j.. .......r...r..........y...91ci..{.0.}.;...:...0.9.B...{.0.}. .K.9...{.0.}./.K.9...{.0.}. .......{.0.}. .4.6...{.0.}. .=....."...0.0.9.B...:.K.@... .!.....9.M.;.M.@...{.0.}. .<...=...{.0.}. .A.K.;...{.0.}./.:...=...{.0.}. .:.4.6...{.0.}. .3.0.0...{.0.}. .A...:...{.0.}. ...9.M...{.0.}./.<...=...{.0.}./.=.M.4...{.0.}./.A...:...{.0.}. .1.8.8.B...{.0.}. .=.M.4.....{.0.}. .G.0.0.A...K.9.3.0. .{.0.}...{.0.}. .<.8.8.;.M...{.0.}. .:.8.8.;.M...{.0.}. .1.0.0.9.B...{.0.}. .:...B./.G...A.K.;.3.0. .{.0.}...{.0.}. .:.0.@.0.0.B...{.0.}. .:.K.@.0.0.<...{.0.}. .....0.0.9.B...G.0.0.A.:.0. .{.0.}...{.0.}. .;.8.8.B.8.@.M...{.0.}. .<.8.M.B.M.@.M...{.0.}. .<...=.....B.M...{.0.}. .=.M.4.8.M.;.M...{.0.}. ...0.;.>.@.8.9...{.0.}. .3.5.:.B.0.0.@...{.0.}. .:.K.@.0.0.4.K.A...{.0.}. .:.8.;.>.1.8.8.B...{.0.}. .3.8.3.0.1.8.8.B...{.0.}. .<.5.3.0.1.8.8.B...{.0.}. .A...:.....=.4.M...{.0.}. .:.8.;.>.1.0.0.9.B...{.0.}. .<.5.3.0.1.0.0.9.B...{.0.}. .B.5.@.0.1.0.0.9.B...<...=.....B.M...M.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.8041805894387437
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXE/66E7lyMC/n:SvV/66gdC/
      MD5:6134F4CD4D6C15CE86537D2613927036
      SHA1:59D53B482F70551D8DEA499A310E7DA230219A18
      SHA-256:68F743AEC976A4117DCA15A76760CAC2F8580CEDFA64B9C7D523A8F7BC0FE081
      SHA-512:AAB3C6A451737433D25E38D86D21F865D944541D8C3A1EA23D937AFB33C3A06C56A436AFA997D42343AAE8395607819A1A79F0FCB60A8017EE4C6E4C9A140172
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.h....................h.....91ci......g.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):92
      Entropy (8bit):2.763053661085392
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMl2lYlillDTc6lLMGa:SBtkJcklIilNI6Jfa
      MD5:5F7A1ACDBA8273876C06946D52D7EF6A
      SHA1:6838F6556B7CB39A28F2D6D10B227D3511089B1D
      SHA-256:4968812F54EEB455A6F0BAA9FAA9A68B5B5F94860FE4766506D8D265E2DB6B9B
      SHA-512:DAEEF53AD06B57CC089E2CC5E1B053183CABFFC3D90215BFE84BB610A0A39D2E64CF55277CA7D4933430C33807D893079A82D1795C0BC204B673A7B7C6BEBFDE
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci..s.r._.L.a.t.n.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.8041805894387437
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXE/66E7lyMC/n:SvV/66gdC/
      MD5:6134F4CD4D6C15CE86537D2613927036
      SHA1:59D53B482F70551D8DEA499A310E7DA230219A18
      SHA-256:68F743AEC976A4117DCA15A76760CAC2F8580CEDFA64B9C7D523A8F7BC0FE081
      SHA-512:AAB3C6A451737433D25E38D86D21F865D944541D8C3A1EA23D937AFB33C3A06C56A436AFA997D42343AAE8395607819A1A79F0FCB60A8017EE4C6E4C9A140172
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.h....................h.....91ci......g.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):2.9794524468707886
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMXE/flflcUTNZlgY/:SvV/cMEY/
      MD5:6A9273AF56E5D1F6F2D24203334DDF9B
      SHA1:BD7CA1CB1BA90B6036803043B8E351E6EC499DA5
      SHA-256:F1D94FCB430E36370FA030C9D9892214DCB624289BC5282D432BF2A49378A08C
      SHA-512:066CC289321C632CA0657AAC15F9F0E121C506B3EBD752E19277A5087417430E3C40525E0B410B930EF3A238328906AA64BF2A53B0FEBB26724918333C500508
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.h....................h.....91ci..........g.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.872172957387978
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlgelU8gl8l/csqtDelOph:SBtkJZlU8g8l/soleh
      MD5:F1FD5E8EDA008BB8F7B9C82734D8B0BE
      SHA1:44D4EBA762F1BF83C2EF92EDD8A91163CF6EAB37
      SHA-256:8777C3E45987B50B72F43DA1331824D298934CF97877E1789E376A65A9C6FDAD
      SHA-512:30530B5DE13DA12DE36ABC9376494F90F1C3FB7926B5A65DA2CD65DD865822043CB5E52844DDF1B022A4C6D3EF630D1CFB35D90672BC6292ACC25EF8ACB654A4
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci..s.h.i._.T.f.n.g._.M.A.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):16752
      Entropy (8bit):4.833541903803518
      Encrypted:false
      SSDEEP:192:+GkljLQTCV7qfR8/bvIWWz/TIK9HrxD0fId2M4WQ3LTEFQMs9DbIfJekqkZMI2:YcR8zIBz/nHrxofIdJdOTHshrqkSH
      MD5:9B8FD3379E3E120A72E01EFECF1643AC
      SHA1:8FA10FC67BBF756984F98EAD2594A6F4004F933B
      SHA-256:19ECB3C299829F1CD34E0D202B877C4D208B72531FD5A72D70A4D7FC09C5F484
      SHA-512:70157A00B353248F0E615C7D489D738A1CC92031E595A8245B7B53747A71E3FB14D589C9BA0CAAD83CF84AD7D4C02702CB72933183B61DDE52A92B640EAE54AF
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................L.. ..t.....T...T..........t....91ci..B.i.l...H.K.B...k.t.s...s.n.o...j.i.h.o...B.i.l.o...M.e.y.l...m.k.o.b...{.0.}. .q...I.n.j.i.s...o.h.m.i.s...{.0.}. .C...{.0.}.i.l...B.B.e.y.t...F.u.u.d.h...G.B.e.y.t...M.B.e.y.t...T.B.e.y.t...f.i.i.t.....i.n.j.i.....k.B.e.y.t...m.l.s.e.k...{.0.}. .h.b...{.0.}. .B.B...{.0.}. .C.Q...{.0.}. .K.T...{.0.}. .b.m...{.0.}. .b.s...{.0.}. .b.t...{.0.}. .b.w...{.0.}. .k.r...{.0.}. .m.y...{.0.}. .n.t...{.0.}. .o.w...{.0.}. .u.x.....m.i.t.i.r...{.0.}. .m.k...J.u.u.l.e.s...M.a.a.l.m.o...Y.a.a.r.d.i...i.n.j.i.s.....{.0.}./.b.w...{.0.}./.m.t...{.0.}./.o.w...{.0.}./.s.k...{.0.}.M./.K...{.0.}. .b.i.l...{.0.}. .s.c.d...{.0.}. .m.l.n...{.0.}. .t.a.n...{.0.}. .M.b.a...{.0.}. .b.i.j...{.0.}. .h.B.a...{.0.}. .k.B.a...{.0.}. .m.b.t...{.0.}. .m.y.....{.0.}. .n.m.y...{.0.}. .s.m.y...{.0.}. .b.b.m...{.0.}. .C.D.h...{.0.}. .H.k.b...{.0.}. .K.W.s...{.0.}. .d.i.g...{.0.}. .m./.i...{.0.}. .m.y.....{.0.}. .s.n.d...B.a.r.s.e.k.s...a.m.b.e.r.e.s...m.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.905547915629603
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDklU8gl8l/csc6lSU5YMLn:SBtkJYlU8g8l/a6/5YMLn
      MD5:331666E059510303EA5E9BD22324ACBC
      SHA1:8CC2ECEEB94BFD3EF2F5B6DB21FE0CA71B06987B
      SHA-256:38E6A6432D4E199AEDE8FA04AC7A448F95749F0E8EC3889E8BFA8D7D470D25CE
      SHA-512:A99330F7DA649970C46F7A93F53D2FECA2D8C4EE9427E59058C4F02B591A84C6D1A3BCBF56BB0625145C38C7BC8FC390F766414F1DD38C30BFBB9A3DF77390AA
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci..s.r._.C.y.r.l._.B.A...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.9849392665878645
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMWlut6E7l+/DT4aN:Sv/ut6g+bUaN
      MD5:88CA5D2B5F3BAA53F32D1A17AFFB3CC4
      SHA1:B603EF247D2E23125E79C34F3695B44853A2024E
      SHA-256:413C50EF83D5A3FF6C6F693E50594FF033A0301DCB807C2AD1EFDEB25FCB7642
      SHA-512:BE26D85B7EA633275DE857127A7E8891FE0BD1EB66BA33E83EE6B652A76C0618BF052DA6A43FB9E21394941732D9805DC2FB801A5065B7EE8CDA6EA77FF3914D
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P..(....................(....91ci.......(
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.500123730064915
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/FMlln:SBtkJ1li6gml/K/n
      MD5:C34486D88A5544F3392A4FB031ECA28C
      SHA1:287AE38B9011FD9BF97FAC414B405F1748B748FB
      SHA-256:F7835F43B81AF073E115DCDBDD71E6D274C476853FFE6BEFCFF4A6DD26E02CC6
      SHA-512:DD334E26082CD5F5B9CF2DD581930DB2DCFC8AE136FEA02B0A7E8376BAA2C0582236086C7D973A84C14EB3F873C6F540E70FE65917D757C6FA630E56CD780C35
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.500123730064915
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/FMlln:SBtkJ1li6gml/K/n
      MD5:C34486D88A5544F3392A4FB031ECA28C
      SHA1:287AE38B9011FD9BF97FAC414B405F1748B748FB
      SHA-256:F7835F43B81AF073E115DCDBDD71E6D274C476853FFE6BEFCFF4A6DD26E02CC6
      SHA-512:DD334E26082CD5F5B9CF2DD581930DB2DCFC8AE136FEA02B0A7E8376BAA2C0582236086C7D973A84C14EB3F873C6F540E70FE65917D757C6FA630E56CD780C35
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.9849392665878645
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMWlut6E7l+/DT4aN:Sv/ut6g+bUaN
      MD5:88CA5D2B5F3BAA53F32D1A17AFFB3CC4
      SHA1:B603EF247D2E23125E79C34F3695B44853A2024E
      SHA-256:413C50EF83D5A3FF6C6F693E50594FF033A0301DCB807C2AD1EFDEB25FCB7642
      SHA-512:BE26D85B7EA633275DE857127A7E8891FE0BD1EB66BA33E83EE6B652A76C0618BF052DA6A43FB9E21394941732D9805DC2FB801A5065B7EE8CDA6EA77FF3914D
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P..(....................(....91ci.......(
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.9849392665878645
      Encrypted:false
      SSDEEP:3:XCbVSm/tlM10t6E7lHbT4d:SvZt6g7Ud
      MD5:3A213577811436F09FF24D0DF8D5BB64
      SHA1:412A7D31D9BF049CDF57CC29CBBB81B73BC856BD
      SHA-256:F290EA9AE14EA99460199281AEE05EDB1532D2C47715999D01C1F6A4B91FE976
      SHA-512:1E10DE89F72496207ACAFF7BCB79342E5AC41BE27CAF134EE07C36768D3086C2B8A80B49E3D77F37069F378C9B86EE18511357D61B643C2CFFF631556FA2F2AA
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.Z)...................Z)....91ci......Y)
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.500123730064915
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/FMlln:SBtkJ1li6gml/K/n
      MD5:C34486D88A5544F3392A4FB031ECA28C
      SHA1:287AE38B9011FD9BF97FAC414B405F1748B748FB
      SHA-256:F7835F43B81AF073E115DCDBDD71E6D274C476853FFE6BEFCFF4A6DD26E02CC6
      SHA-512:DD334E26082CD5F5B9CF2DD581930DB2DCFC8AE136FEA02B0A7E8376BAA2C0582236086C7D973A84C14EB3F873C6F540E70FE65917D757C6FA630E56CD780C35
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.500123730064915
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/FMlln:SBtkJ1li6gml/K/n
      MD5:C34486D88A5544F3392A4FB031ECA28C
      SHA1:287AE38B9011FD9BF97FAC414B405F1748B748FB
      SHA-256:F7835F43B81AF073E115DCDBDD71E6D274C476853FFE6BEFCFF4A6DD26E02CC6
      SHA-512:DD334E26082CD5F5B9CF2DD581930DB2DCFC8AE136FEA02B0A7E8376BAA2C0582236086C7D973A84C14EB3F873C6F540E70FE65917D757C6FA630E56CD780C35
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.9849392665878645
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMWlut6E7l+/DT4aN:Sv/ut6g+bUaN
      MD5:88CA5D2B5F3BAA53F32D1A17AFFB3CC4
      SHA1:B603EF247D2E23125E79C34F3695B44853A2024E
      SHA-256:413C50EF83D5A3FF6C6F693E50594FF033A0301DCB807C2AD1EFDEB25FCB7642
      SHA-512:BE26D85B7EA633275DE857127A7E8891FE0BD1EB66BA33E83EE6B652A76C0618BF052DA6A43FB9E21394941732D9805DC2FB801A5065B7EE8CDA6EA77FF3914D
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P..(....................(....91ci.......(
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):22536
      Entropy (8bit):5.055542219826834
      Encrypted:false
      SSDEEP:192:5use72HkP0HnjmfIusADne/tdhaQAbyB98qQfig71nl8uLT6qw6RGnEfhHQxE2iP:5WQRm8Bi71nlX6qw6OAZQxE2i3g3N4Jf
      MD5:248A72F139BFD13159187A0011FA2B6D
      SHA1:E0CE0321DDF5B1794C156B4EDAA797B70B99F455
      SHA-256:9AC800439CB6D05264C533353F40993335476FA7CB65BF832EC877009E108E14
      SHA-512:38B4A1953ABEEC4DCF7A5CC1E604FAF637B4A0A092F19A95179C90D9D2C9ED2BFEF0A15B8F460D5E69CEA697E9E4D17FC8CC9D125451B8B902CE30B19F78E1EE
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .._...................._M...91ci..(.?...?...{.0.}.5.>...{.0.}.8.F...{.0.}. .....{.0.}. .6...{.0.}.......{.0.}.(.?...{.0.}.(.F...{.0.}...@...{.0.}.0.K...{.0.}.2.@...{.0.}.8.....!.?...+.>...{.0.}. ...F...{.0.}. .......{.0.}. .......{.0.}. ...A...{.0.}...+.>...{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .&.....{.0.}. .*.....{.0.}. .,.?...{.0.}. .,.H...{.0.}. ...H...{.0.}. .2.....{.0.}. .5.K...{.0.}./.......{.0.}./.......{.0.}./.0.K...{.0.}./.8.F.......>.2.A.........>.2.A.....(.>...8.F.......?...8.F.......H...8.F.....{.0.}. .5.>.....{.0.}. ...G.....{.0.}. ...H.....{.0.}. .........{.0.}. .*.L.....{.0.}. ...@.....{.0.}. .9.F.....{.0.}. .........{.0.}. .(.>.....{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. ...L.....{.0.}. .!.?.....{.0.}. .$.B.....{.0.}. .(.F.....{.0.}. ...@.....{.0.}. ...@.....{.0.}. ...H.....{.0.}. ...H.....{.0.}. .0.G.....{.0.}. .2.@.....{.0.}. .8.......{.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):3.368272640304357
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQVl/88WDlNT+l2iAllfPtk9n:Sv+C8SNCl2iA/tcn
      MD5:F18F6D8DC0E40E96A1B5058D53270004
      SHA1:696FE9BD9343B7BBE26041326571C2C99CC485DB
      SHA-256:118D6F6CDD6912A4366B5C6478DFD735D606CB7210157AF2A8904B44297CE0D4
      SHA-512:8DAEA2D8173E64A903B0CE89672E81F28A34DB824B8A2C07B6AC3DC380187F318E1F49FED00875DF6F41491756E4DEB664529B9D2354E467401D59D9215161E7
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .*!...................*!....91ci..........!.............)!.`...P
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):14192
      Entropy (8bit):5.162604351879862
      Encrypted:false
      SSDEEP:384:JjuBknvo7nMjqA6QMg+UXJcdrPXgnqNX+M1:J2kvo7M7M7UZc5yq51
      MD5:C88DF0C69931B5DF6FC00A9C6652917D
      SHA1:D2AF577CB36AC0F180C018DD458D9B4918254A6E
      SHA-256:9EA2245F37F6DAAF5BBE5BCF4FDEA870CEDFED366A7E0212D3CCEAD7B569F9C8
      SHA-512:FE1F0DB9A575FA02FF31E9CB5F1D3DE8DD8036452DC740C2D9F874B072CD4A7A7C6632F7749BC446629CB2BB19C85397AC43D6BDDA0F6F08498AAEDF2DF508F8
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .._...................._5...91ci....4.(...{.0.}.....{.0.}. .....{.0.}.'.4...{.0.}. .....{.0.}.......{.0.}...5...{.0.}.!.....{.0.}.%.....{.0.}.........{.0.}...!.....{.0.}...!.....{.0.}.!.!.....{.0.}. .......{.0.}. ...-...{.0.}. ...5...{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .!.....{.0.}. .%.....{.0.}. .'.4...{.0.}./.......{.0.}./...5...{.0.}./.!.....{.0.}./.%.....{.0.}./.'.4...{.0.}...!.....{.0.}.'.1.....{.0.}.+.%.2...{.0.}.C...I.....5...5.".9...{.0.}. ...8.....{.0.}. ...-.....{.0.}. .#.-.....{.0.}. ...9.%...{.0.}. ...1.....{.0.}. ...4.....{.0.}. ...8.....{.0.}. .'.1.....{.0.}. .+.%.2...{.0.}. .B.!.%...{.0.}...2...5...{.0.}. .........{.0.}. ...'.....{.0.}. .........{.0.}. ...%.....{.0.}. ...!.....{.0.}. .!.......{.0.}. .!.%.....{.0.}. ...%.....{.0.}. .........{.0.}. ...!.....{.0.}. ...!.....{.0.}. ...!.....{.0.}. ...%.....{.0.}. .!.!.....{.0.}./.........{.0.}./...!.....{.0.}./...!.....{.0.}./...!.....{.0.}./...8.....{.0.}./.'.1.....{.0.}.D.!.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):2.9886793699589003
      Encrypted:false
      SSDEEP:3:XCbVTtkJtldelFal9lUfsqJ/qcs8Vn:SBtkJUlY05Zn
      MD5:E72557576FFE1CD5460C3497156F022C
      SHA1:AE59392718061FC184F7C4C6FFA937FD08C153D3
      SHA-256:4AD5CFD24AB4748C4D5B25F88C66390A41B36BE6BA4932EC6B689A47D4DDEC21
      SHA-512:D55B9F4FBF0A289C0133CBA35C6AF52DB40804745FBC9EED2732634B9170055ADE0ACA225FEC8CEA1AFEB4D88CF7E1E01F44D21D8922874B69D885DD2DFE8F49
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................91ci..b.u.d.d.h.i.s.t..................P
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):12244
      Entropy (8bit):5.296719609460231
      Encrypted:false
      SSDEEP:192:s1yk/rQ+mES0sXOIi0lQ3UM7eCCuTOglO28qBbg7m:SzQ+mES1pi063UWhY2ZBbwm
      MD5:792BE2B17FBBBCF06D955D98F5F9DC7B
      SHA1:B8D002E124B125FEA43A235FDDAC514BD5244830
      SHA-256:06A9DD526E56AB9E07D5FE6F284853FADB7BB216577F68A0169AB5848E4CB681
      SHA-512:8359FE20A7306ABF4DFBDBD5908FD539E301C5CD9FA4B86A4DE6AC35638284193E7181396F036FB5EC213617DC3CCE28F4E41280FE64A12B39E692D8D6B8F747
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................91ci..{.0.}.....{.0.}.s.m...{.0.}.s.g...{.0.}.s.e...{.0.}./.....{.0.}.d.g...{.0.}.g.b...{.0.}.g.d...{.0.}.g.o...{.0.}. .......{.0.}. .O.m...{.0.}. .a.b...{.0.}. .g.l...{.0.}. .l.k...{.0.}. .s.l...{.0.}. ...d...{.0.}. .W.t...{.0.}. .a.s...{.0.}. .a.....{.0.}. .d.....{.0.}. .e.W...{.0.}. .g.a...{.0.}. .k.....{.0.}. .......{.0.}./.a.....{.0.}./.d.....{.0.}./.......a.k.r.-.f.t...m.o.l.l.a.r...{.0.}. .d.g...{.0.}. .g.b...{.0.}. .g.d...{.0.}. .g.o...{.0.}. .m.W.t...{.0.}. .G.G.s...{.0.}. .G.W.t...{.0.}. .M.G.s...{.0.}. .M.W.t...{.0.}. .d.m.i...{.0.}. .d.......{.0.}. .d.......{.0.}. .g.P.a...{.0.}. .k.G.s...{.0.}. .k.W.t...{.0.}. .k.w.t...{.0.}. .m.k.....{.0.}. ...d.....{.0.}. ...d.....{.0.}. ...y.l...{.0.}. .d.......{.0.}. .h.e.p...{.0.}. .s.a.g...{.0.}./.d.......{.0.}./.f.u.t...{.0.}./.h.e.p...{.0.}./.s.a.g...l.i.t.r./.k.m...{.0.}./.s.e.k...{.0.}. .k...s.e...{.0.}./.f.u.n.t...{.0.}. .a...g.....{.0.}. .a.s.y.r...{.0.}. .a...l...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):30452
      Entropy (8bit):5.158024533586776
      Encrypted:false
      SSDEEP:384:9DuH0mg+Ez8uAJ0f+3Dt8gcC0AP5hJhUNoFFj6tt8PxO3P50NcfsGQgzHttPHIhV:9vzqPIXC83x0NZGtzPHISl8
      MD5:D0AB00A38F64576C2236C5EE6A61153C
      SHA1:D4D12349E97E235A9B6B3ABC43A6EAFC5A4FB4DE
      SHA-256:7E46B5D874788E7CF483A209DADEE21442DBE01717FC2B3C08DE1C93AACB1C2F
      SHA-512:76BD20F7ABD0EE04AE783720F5E595D1B4167EFC6D7D8D8405DDA53BCAC1496C9613D8EF31D5A9409FF372CC84030E2E4E9B1F3DCF82EA4FF1EB5680843BDD62
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .x....................x.....91ci..{.0.}.B...{.0.}.......1.V.B.....1.V.B...".1.V.B...:.1.V.B...<.8./.3...{.0.}.4.<...{.0.}.=.<...{.0.}.=.A...{.0.}.?.B...{.0.}...0...{.0.}.5.....{.0.}.<.3...{.0.}. .1...{.0.}.?.:...{.0.}./.@...{.0.}./.B...{.0.}. .@.....{.0.}. .E.2...{.0.}.<.:.<...{.0.}.<.:.3...{.0.}.....<...{.0.}...B.1...{.0.}.A.B.....{.0.}. .>.1...{.0.}. .5.....{.0.}.1.C.H...{.0.}./.E.2...g.-.A.8.;.0...{.0.}. ...E...{.0.}. ...4...{.0.}. ...=...{.0.}. .!.E...{.0.}./.@.....=.0.?.@.O.<...{.0.}. .4.=.....{.0.}.<.>.;.L...{.0.}.1.0.@.....{.0.}.<./.A.....{.0.}.<.<.@.A...{.0.}.D.=.B.A...{.0.}. .....<...{.0.}. ...B.1...{.0.}. .1.C.H...{.0.}. .A.B.....{.0.}.4.C.=.....{.0.}. .4.=.V...{.0.}. .>.<.8...{.0.}./.D.=.B...{.0.}. .1.V.B...{.0.}. .4.=.O...{.0.}. .@.V.:...{.0.}./.3.>.4...{.0.}./.4.=.....<.5.B.@.8./.A...{.0.}. .<.V.A.....{.0.}. .B.8.6.....{.0.}. .<.8.;.V...{.0.}.B.@... .C...{.0.}. ...:.0.;...{.0.}. .1.0.@.....{.0.}. .3.0.;.....{.0.}. .:...A.....{.0.}. .<.V.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.500123730064915
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/FMlln:SBtkJ1li6gml/K/n
      MD5:C34486D88A5544F3392A4FB031ECA28C
      SHA1:287AE38B9011FD9BF97FAC414B405F1748B748FB
      SHA-256:F7835F43B81AF073E115DCDBDD71E6D274C476853FFE6BEFCFF4A6DD26E02CC6
      SHA-512:DD334E26082CD5F5B9CF2DD581930DB2DCFC8AE136FEA02B0A7E8376BAA2C0582236086C7D973A84C14EB3F873C6F540E70FE65917D757C6FA630E56CD780C35
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.500123730064915
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/FMlln:SBtkJ1li6gml/K/n
      MD5:C34486D88A5544F3392A4FB031ECA28C
      SHA1:287AE38B9011FD9BF97FAC414B405F1748B748FB
      SHA-256:F7835F43B81AF073E115DCDBDD71E6D274C476853FFE6BEFCFF4A6DD26E02CC6
      SHA-512:DD334E26082CD5F5B9CF2DD581930DB2DCFC8AE136FEA02B0A7E8376BAA2C0582236086C7D973A84C14EB3F873C6F540E70FE65917D757C6FA630E56CD780C35
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.965547915629603
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDklU8gl8l/csllwl3l/Ln:SBtkJYlU8g8l/fK/Ln
      MD5:92C8207FC061004A9199AEB7B897CA30
      SHA1:3057478FFA023C34B6B8F8E32ABA2EB90A685C6A
      SHA-256:98E38696C8243B84CAD71E47F1077B1D7B5DC54B9BCF501BFB965CC9CFAA36EF
      SHA-512:362FC0A5FF0B6DAECA3A575AAA1908ADF996C66FFA94832C5A30C26E9F7BC69F7772468ECDC580E416087C9B667E7B91B33CB9BE6B90789127207DF0C5D444A7
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci..u.z._.L.a.t.n._.U.Z...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):508
      Entropy (8bit):4.127084859354323
      Encrypted:false
      SSDEEP:12:sG0sNYkc+R+/HtFY89LDKlcLsnPGcjzjd:6sNYkc++vtFY2LNLavh
      MD5:592C3FD4F74A53D6D35227FC302C57C3
      SHA1:3C3D80ECED0C41EFE1C92F7B947EA2FE48D3B66E
      SHA-256:37DC93529EDFDCC38D62AEACDE411F88AA08BF374D1D37EF7B4AD946208F71A1
      SHA-512:0BA17B0EDC3E74D2CF0ED5D8C53834AFCD06EECC78CE231F40C9422534A635F2529F04F3E6AFE7786B11940B04C6DC1A162C39025A65883F9480510DE895C6A6
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................r.. .F......w...w.........F.X...91ci..{.0.}. .j...r...{.0.}. .t...g...{.0.}. .w.u.......{.0.}. .w.u...a...{.0.}. .m...n.e.t...{.0.}. .s.t.u.n.d...{.0.}. .m.i.n...t.e...{.0.}. .s.t.u.n.d.e...{.0.}. .m.i.n...t.a.....5...:.S.O.O...5...:...s.....5...:.....}...5...:.m.i.i...5...:.E..'.4..5...:.[.`.W...5...:.K.G.G...5.S...5.....5.....5.m...5.E...5.[...5.K...[...c.w.d...c.X..P_..Pf..Pm..Pt..P{..P...P..J.X.. ..[...c.w.d...c....P...P...P...P...P...P...P..J.e.. ......m.g..`c.. p..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):96
      Entropy (8bit):2.6065957221707605
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlu112lFvlslpl9lUfsBOlhFc/u+ln:SBtkJK0lslL0AOlg3l
      MD5:984B9A1F11CC36ECCE851C57010A572C
      SHA1:DDE4651D99AF095C01CE7A1A2F5E5572C32F8A41
      SHA-256:BD47EF872F6A9D88B7304311170B8C524C2FB432ECCF8D6A4CEB03AD61AE6A58
      SHA-512:236AE3FA7F2150AA020F5D2864147F565894EDC926DCDC0503CA1AA0B5B24A49D3B41E2DC2D2A211261458DC5D5BFD9DAD7BA9BA1D00353A29D646FCDF0FDE9F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci..2...1...4.8...8.9.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.500123730064915
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/FMlln:SBtkJ1li6gml/K/n
      MD5:C34486D88A5544F3392A4FB031ECA28C
      SHA1:287AE38B9011FD9BF97FAC414B405F1748B748FB
      SHA-256:F7835F43B81AF073E115DCDBDD71E6D274C476853FFE6BEFCFF4A6DD26E02CC6
      SHA-512:DD334E26082CD5F5B9CF2DD581930DB2DCFC8AE136FEA02B0A7E8376BAA2C0582236086C7D973A84C14EB3F873C6F540E70FE65917D757C6FA630E56CD780C35
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.945547915629603
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDklU8gl8l/csfJRzlI/kmn:SBtkJYlU8g8l/FJFGkmn
      MD5:AEB320D4912F54EF1312147C4488DBB9
      SHA1:1178FE7F00D59FC7F4EB51979DB5E12D6BD0B0B6
      SHA-256:84FFA987E78CA5B8CE583956F30ACC050F93D73A9E75695D1DD93C1EEAA7DBEB
      SHA-512:F3859842E63CB3D6AA9892898713E343079754C6896FD3738EF62826C7F3AC4D9FC1FA004AD9912F65FEA4587414BDDCDFD86712EC358A0DB76D748D8C1947F7
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci..z.h._.H.a.n.s._.C.N...........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.8041805894387437
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMI06E7lwlfMW/n:Svj06gwiW/
      MD5:85A6974221A7807B04C9E016B6C8904C
      SHA1:421C17E072A104975C29E5C4A51575C5A9542489
      SHA-256:939C1DA1C4ED3E97227CFC94D46BACDFBBB8D2BFF721EC42618B641DB731AD3D
      SHA-512:EADBC62801B0D5ABA4B9A2BBDF469F007493FE613E04B640AA511383A4E3D707AC0ADCFF3E5D80F1598090E12CD65C5985DFCDF0CF8D46AF807BAD00204182CC
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.500123730064915
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/FMlln:SBtkJ1li6gml/K/n
      MD5:C34486D88A5544F3392A4FB031ECA28C
      SHA1:287AE38B9011FD9BF97FAC414B405F1748B748FB
      SHA-256:F7835F43B81AF073E115DCDBDD71E6D274C476853FFE6BEFCFF4A6DD26E02CC6
      SHA-512:DD334E26082CD5F5B9CF2DD581930DB2DCFC8AE136FEA02B0A7E8376BAA2C0582236086C7D973A84C14EB3F873C6F540E70FE65917D757C6FA630E56CD780C35
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................91ci........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):172
      Entropy (8bit):3.7784798679943252
      Encrypted:false
      SSDEEP:3:XCbVSm/tl9e8Crlas08lLQHptizlu7giN/+k/Fshgp9kD//UlAjW/lKxfn:Svc8CrqqQJEz8xtNT0//UijWAxf
      MD5:9D9B9C544D250F573B187FA20A37FAB6
      SHA1:16C2B4227D4A969E336292B2A9C3A23A51BD9505
      SHA-256:8423C2E865B10BB622270AB95F80F6F2D34FF4B4F3F828B0EEA928EB8757CE47
      SHA-512:2928C40A6F35EE175EADBB4B96DD26965DC7C23243740DD4A96E0679DD4D9586549625405265B4CCF6B80FE575B6DDC46B4ADB53A181B1173C3DBA52F7493F39
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........#...#...............91ci......3...:.....5.:.......:.......d....P..D....P....J......P... ... ..D....P....... ......m....`... ...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):58416
      Entropy (8bit):5.816633436992908
      Encrypted:false
      SSDEEP:768:+RaWSN/Ixeb7VZNw5/sWK7O+HQe9l3YFFonJ0QhPxjK+Kv2:CMfVZa0Oyl3hnhPxu72
      MD5:DEDDFC6884799EFF970AD3809557DCC8
      SHA1:E27755C52CD11323FC90AD094428904128B4CC72
      SHA-256:75BF5DDADF3423305C40C67E09E8A38F1A10A912F9810D041966D8A86DB29BCB
      SHA-512:A6ADFAA68355F35A699A274D155E876D754F57DEB5D3D3EAB31263D44ECC299FECA491C44C85E0D2FB4F756112111BD71563C22F5B1BB24ACA29CDE303BF6067
      Malicious:false
      Reputation:low
      Preview: ..'........Nrm2................P...............................A...A.......P...vS......`...tJ...R..rS..........3irT.....<..[.....@.......?.......;.i.....".b.....!._.......C.........n.......-.k.......T.......K.......E.......A.~.....5.t.....3.r.....1.n.....,...g.......7.t....... .O.t.............................V.......L...l.......\.........[.......G.........C.......<.|.....<.|.....<.{.....;.{.....+.j.............9.y.............................................-.:...q.............K.g...... 0 ..p . . .!P!.!.!."P".".".#N#.#.#.$N$.$.$.%N%.%.%........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):92
      Entropy (8bit):3.3283646412792995
      Encrypted:false
      SSDEEP:3:XCbVSm/tluF3lElwqllERnySPikv:Sv6VMwfBySdv
      MD5:7501CC41631B81BC6FA175B8963ACD70
      SHA1:B04D289CE28F1842249549D378530F49C8765DC6
      SHA-256:3B3D70E6FAC4E5CD85444CED64A6DD3A5C73680734524EB30B3C159C063DC389
      SHA-512:1778AA289D567BDABA783CD651FC6A34E75E7F2F04BA28737EF3829574CCDC37D8811C602F1737E7DDAABE67CF305975B79B85E8146842CFA6E7C3E0303AA266
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ...................................t.....o.w......`...P
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):920
      Entropy (8bit):5.773106278693203
      Encrypted:false
      SSDEEP:24:DMzq6TvMx06TvMsEAgbcusZhC//ooRQQXswrVorA8cs:ejMxrjMsvgb+C/o3QXhYATs
      MD5:CAE16B5CBD28771099A3AA4BEE4BFF22
      SHA1:B692625C2D3A2AFE65519F57B20235E7321AB332
      SHA-256:199DA3398504CE87F971816F6F67D7505D7BE136BED8B5690E4E6845EF2CA3D6
      SHA-512:D2CB5ABE1E38E121A66220A29DCEC48CCF52D068A2FB59FD85225EBC0158D51004DF99BFC8DECF530FCB8DBB4BE297E9687A7509C6083871C44C8C17A1727083
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................................I.n.u........)..k..)...4.wEy..................................!.$...0.............'./..4....eN>...D....L...3..].N..).P.M.N........."....."..k..)...4.wW*eh................................!.$...0.............'./..4....eN>...D....L...3..].N..).P.M.N..............u......."","B...........G.G.G.G.D.q.G.....|....mMm..=.1...M.e.E.A...I.).9.}...........e.w...............G.A..4D..4G.G.D.>.J.../.......................h.~.................H...@.........E............................5k....4............7.......P....... ...............P................................... ... ................................................... ... ....................... ..j.v.......".H.S...A...D...G...U..P... ... ... ... ....`...... ... ...........`...P......:.l..... ...a........ ...P...P...P...P...P...P...P...P...P......C...o.w.]........`...`...`... ...`... ...P...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
      MD5:8E658E24E91577B14FB18BDC90A2E1C5
      SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
      SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
      SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):4032
      Entropy (8bit):5.607182675392539
      Encrypted:false
      SSDEEP:96:kPkUdmvpI+tIJhIIhsBy8+VvbH7cpIIcLHB9m2Sj:k4dEhIMI+VvbH7cfcLHBfs
      MD5:C180EE0ABDE3EF986D6725617A964F34
      SHA1:189E8D526AC80FF06E3C74AB1987D92C4E36F3F9
      SHA-256:E59900C74EE25A80F80B7F2856B32E43F38F0F4FE61F0934FFDFB13E63E14D39
      SHA-512:C7D4A98C3ECF00B1805A69C1251BA72AEB0DF4CBCAE0963C84804118E019452F002DD68A8825132C8B52A6AA326C52F2B5DB929F78B3F69F3174DD9FC3518FF7
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .5....................5..................2...............................................................................................................................................h.e.b.r.......................................................................................................[.. . ]............................................................................................................................................................. ............. ............................................................................................................................................................................................................................. ................. .........................................................................................E. ....... .d...................................................................................................{.0.}. ....... .{.1.}...d..... .M.M.M. .y. .G...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):4104
      Entropy (8bit):5.602271383533896
      Encrypted:false
      SSDEEP:96:wiOtFIxmiQWKpVH7XVSRerbMmgxmQhxxymTmFi:LOtFomRhpVTURSQJx7xxJ
      MD5:8E47DD79C2A4902D3930DC926A72C4ED
      SHA1:4BBFAA0586B10D12F86F2AD49B73768D7B733681
      SHA-256:4F8716C2397705120536D220A3928B7D247596093E0EA78BFD75BA9A2CC908B6
      SHA-512:6FDB3116278569AE835F5C6E9DB2993637536AD1F9E873294FF15D1AD2558DD7A0E134FF5E6A878D1406FC24398091BA87F84447ABA0E5BA90E889E590847F88
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .A..............-.....A........................................A.j.....t.........A.g...B.....K.e...O.w...k.......r.....g.....g.....k.....r...O.s.......n.......n.....H.:.m.......k...A.g.[...B...l...K.[.r...K.[.t...O.w.e.....g.b.....g.......k.........p.......w.......b.....d...n.....j.T.........l.a.....b...m...K.[.i.n...S.h.[.......r...l.....g.b.........p.[.......w.........b.i.......r.T.........s...n.......s.[.....H.:.m.:.s.....s.[...g.....j.T...b.....j.T...r...S.h.[...r.....j.[.t.a.....r.[...n.....j.T...b.T.....j.T...r.....W...k...t.......s.[...j.....d. .M.M. .y.....t.....n.l.a.....j.T... .A.j.......j.T... ...t.....o.s.h... .y.........j.T... .....k.....O.s.h... .B...l.....O.s.h... ...g.b.....O.s.h... ...g...n...T...s.[... .y.......T...d...n. .y.........d... .m.[...r.i.n...O.s.h... .A.g.[.m.T...O.s.h... .O.w.e.w.e...O.s.h... ...r...l.....O.s.h... ...k...d.u...O.s.h... .....p.[.....M.[...t...r.....k.......s.[...j... .....y.....O.s.h... .....w...r.....O.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.8046240823663435
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlgelU8gl8l/68Qal6lafWn:SBtkJZlU8g8l/FQal6lSW
      MD5:D9A010B9AEDF260EF91085DC8FCA33BD
      SHA1:9ED18250ECF83FCE98ED8B4063FB39760E482D54
      SHA-256:A06E9211A0DC2D0BF324B9101CDDB0E90B9BAEA6A71F32E4C6E9E4008A93DF82
      SHA-512:1BA88D77B55502E79340A8EA47DF6798A26B47332465056306754693468DA4564323C0CE919EE8E14A3D5BA959B041FDB5CDC289FCD83BEE1784F41597092300
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.................................y.u.e._.H.a.n.t._.H.K.........
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlM76E7lqt6Enln:Svi6gqttl
      MD5:6A2BE9D9E2A53419CFDA1820DA3CDB60
      SHA1:D9354DEA3AEB269C8DBEFFE2AA41FFCBBFA737B4
      SHA-256:AFD2CC131926A8D03C35D770BDB2D2BB92EF2F3A02B7FEB4293BE1D69A1BCA2F
      SHA-512:973DD278E08B0F787835BA45DCD4359B7AE587C9B151F304D127F1BDCC127ED098EAE6A72E11AD58E8A971BDCA339E8646C38DF04B111A8269152F7FBB9C52E8
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P..2....................2..............2
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):1040
      Entropy (8bit):5.389035174290986
      Encrypted:false
      SSDEEP:12:fOHM7iiRd8YR4EzlqAIjI59gQ1EzlqAIzUzuUFYXcRUkC/5Qp6+EsF/jtL7qHwmz:3xhlbuqLelb7RZEFLX0srN
      MD5:26B42AE469D40966DD8F593075E51DA3
      SHA1:3877D9BE4348E3C9D6BCAB1EBCAD2C64BC21FCA9
      SHA-256:0006536EAE7598E66586CDE3E411F7C519FC1C8A80A2B175248EC49064ABBCAC
      SHA-512:C28EA9F75461721E93D14B8E662A00E91BBB2E3F6193EA6262C362BB1E6D44B3A64E545EF908FAEECADE6E3999221DC4684F1433167AA147DA90F01C2E78BF26
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .fl...................fl.........0.0.0..N.N..d./.M./.y...E.....E.,. .d./.M./.y.G.G.G.G.G.....J.il..J.hl..J.gl..J.il..J.hl..J.gl...P.PE#.C.].k.kb.................... ..`5J...elJ...elJ....P.PE#.C.].k.k.=....................!........4.N...E..{lvlyl.......B.B.................*....$....R.R.R..$..]....$....4.4.4...P.PE#.C.]K_K_c...................W.!....... ..4.N.E.4..N.ml.).4.......B.B.................*....$....R.R.R..$..]....$....4.4.4...P.PE#.C.].k.kb..............P.PE#.C.].k.kb...............!.. .L...P.PE#.C.].k.kb.................!.....F...J.....J..............P!..P$..P..7.... ........'..P*..P-..P..7.... ..*........ ... ....... ........0...>..P.....P.`.P.`E#.`.C.`C...F...I...:7.`...`...`...`...`...`..........I.M.P......... ...k..Pp..P...`s..Pv..Py..P...P...P......5.L...Z..P... ..I.M.P......... ......P...P...`...P...P...P...P...P......5........P... .......................P...............P........`.......... ... ... ... ... ... ... ...........P...P....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):26208
      Entropy (8bit):6.543541236901681
      Encrypted:false
      SSDEEP:768:YkIrZQ5X18HJJPj13JJP71O151y1z121i1S1UWWuffmP7h:Yjt8X1QJJL13JJD1O151y1z121i1S1Wt
      MD5:E34479A94A6AC513FAFD973E6D849AB1
      SHA1:88AB5C9348A0367CB29FFADE0CA5F574E200A171
      SHA-256:303E336A751CAC92D160E94036F8752F0EF2EB71303AD666AC94F4ED9863B68B
      SHA-512:45E933F518F36336729644A72AE4B07A5E1812F08F9327B65C89D68D5430F420B6BD93E251D28A820BDAFA2F61466EE0E4FF1B142BB65F55010B1993EC4F4643
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................w.. ................V................TQ..[r...r..4s......N......l.......... ........y......0...0...0...0..._.......NHS...\.n..Zf.N...nhf..@z......z..U..f..Z.....ft^...Q.g....g...N1....N1...EN.X..EN.[..~NCQ...N.O...N.T...N._...N.y...N.T...N.X...N.[...Ns^...N.l...N)Y..[O.f...OCQ...O.[...O.^..CQ-N..CQEN..CQ.N..CQ.N..CQ.T..CQ._..CQ._..CQva..CQ.a..CQ.e..CQ.f..CQ8l..CQ.l..CQ.y..CQ....MR)Y...St^...T.....V.O...VCQ...V.T...Vva...V.a...V.b...V.f...V8l...Vey...V.y...V.y...X8l..'Y.S..'Y.T..'Y.[..'Y8l..'Y.l..)Y.N..)Y.O..)YCQ..)Y.T..)Y.U..)Y.[..)Ys^..)Y.^..)Y._..)Yva..)Y.a..)Y.b..)Y.c..)Y.e..)Y.f..)Y.f..)Yck..)Y8l..)Y.l..)Y.y..)Y.y..)Yw...)Y.....[CQ...[.T...[?e...[8l...[.....[.N...[.O...[CQ...[.T...[.U...[s^...[.^...[._...[._...[?e...[.e...[ck...[8l...[.l...[._...[.f...[8l...[.l...[....s^.l..t^.N..t^)Y...^.O...^CQ...^.T...^s^...^.a...^.f...^ck...^.l...^EN...^.N...^CQ...^.U...^.[...^._...^va...^.a...^.f...^w....^EN...^.N...^.O...^._...^.f...^fk...^8l...^.l...^w.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):4644
      Entropy (8bit):5.7980756728475376
      Encrypted:false
      SSDEEP:96:nD0t0AhbysgPLVmOxdcc/ggycFIc/G9kl9YZIFPzRucL+5:gaPf0mIX9kl9oyzM
      MD5:2B6769071D3D531FA1C1B64BA54480E8
      SHA1:43E33BEF27C95267C09760D1238260AE8B760BCB
      SHA-256:1AAF0609F0DDF59FFB261FBFE754792B7F42584AD83DA818034A1F92334D851E
      SHA-512:7651524903AA542D2FA23EFAFA078D3A5D18BD0EB22174A5C87539E3716539FE94E65D6365FF3CA13C01410E96A3EFA876DCCADF8C6BB90FA84DA72E1EA75A59
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................v.. ..{.............,......{..........e.N..Zf.N...Nt^...Nt^...Nc[...N.e..MR.e..._.e...f.e..(f.e...Nc[...Nc[..,g.f.g...N.f.g...N.f.g...f.g~^.....R.......P.\Bf..,g.f.g.N..,g.f.g.N..,g.f.g.N..,g.f.gmQ..,g.f.g.V..{.0.}.."..."{.0.}....].S.{4V..,g.f.g.N..,g.f.g.e...T.].{4V...N.N.{4V...T.N.{4V...T.S.{4V..+.{.0.}.Q...M..g,{W.1...Y.t^,{w.1...{.0.}..RMR..{.0.}..R._..{.0.}.t^._..{.0.}..eMR..{.0.}..e._..{.0.}..y._..G.y.t^.y.t^..d.-.M...E.....{.0.}..P.gMR..{.0.}..P.g._..{.0.}..\BfMR..{.0.}..\Bf._..{.0.}..f.gMR..{.0.}..f.g._..{.0.}..S{.1.}...{.0.}. ..f.gMR..{.0.}. ..f.g._..{.0.}.."{.1.}...G.y./.M..y./.M...d./.M. .. .d./.M...M./.y. .. .M./.y...U...r...t^M.M.M.d...d./.M./.y. .. .d./.M./.y...U...r...t^M.M.M.d.E.E.E.E...d./.M...E... .. .d./.M...E.....d./.M./.y...E... .. .d./.M./.y...E.......$./.<...*.7..|.|.|.|.|.|..J.m...J.....J.....J.q...J.....J.....J.]...J.....J.....J.U...J.....J.....J.n...J.....J.....J.r...J.....J.....J.^...J.....J.....J.V...J.....J.......!.y#
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.932307687640496
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
      MD5:F637999C3373220F35094AB85161AFBB
      SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
      SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
      SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P...................................o...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):20600
      Entropy (8bit):4.710087176621795
      Encrypted:false
      SSDEEP:384:RO7EpdiGx3F9nkphQvEvnVrLfnGVrEBkRo70LoBO2oSm6:IMd9VY70L2Gi
      MD5:618BF105AA359F19B795895062E8EF83
      SHA1:A1765E32A5AF318306C5DDE3E535614B2ED6AD4F
      SHA-256:1BB55FDC74E76E0D911DD8B54E2609D6340A943B1D22F7C902609F56400341CB
      SHA-512:F2C669E19D67281CF396331F8145E12C928AAAF1D66252BFC0FFB599FAA666109207E94D489559DEC083DDDFF5146C29E395EAA80421194F574ECBAE72115611
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ."..............G.....".....n.pQ..K.i...f...P.a.a.s...W.e.n.e...A.s.o.r.e...K.a...r.o...P.a.r.y.s...P.r.a.a.g...R.i.a.a.d...S.e.o.e.l...B.e.r.l.y.n...D.o.e.b.a.i...K.a.b.o.e.l...B.r.o.e.n.e.i...K.a.a.i.m.a.n...K.a.n.a.r.i.e...K.a.r.t.o.e.m...S.a.r.a.t.o.f...W.a.r.s.k.o.u...{.0.}.-.t.y.d...A.p.i.a.-.t.y.d...D.j.a.k.a.r.t.a...D.j.i.b.o.e.t.i...H.o.v.d.-.t.y.d...I.r.a.n.-.t.y.d...K.a.r.a.t.s.j.i...K.u.b.a.-.t.y.d...M.a.l.e.d.i.v.e...M.a.t.a.-.U.t.u...N.i.u.e.-.t.y.d...O.m.s.k.-.t.y.d...P.e.r.u.-.t.y.d...A.s.o.r.e.-.t.y.d...C.h.i.l.i.-.t.y.d...C.h.i.n.a.-.t.y.d...C.h.u.u.k.-.t.y.d...D.a.v.i.s.-.t.y.d...F.i.d.j.i.-.t.y.d...G.l.a.c.e.b.a.a.i...G.o.o.s.e.b.a.a.i...J.a.p.a.n.-.t.y.d...K.a.t.m.a.n.d.o.e...N.a.u.r.u.-.t.y.d...N.e.p.a.l.-.t.y.d...P.a.l.a.u.-.t.y.d...S.a.m.o.a.-.t.y.d...S.i.n.g.a.p.o.e.r...S.y.o.w.a.-.t.y.d...T.o.n.g.a.-.t.y.d...A.l.a.s.k.a.-.t.y.d...A.n.a.d.y.r.-.t.y.d...E.i.l.a.n.d. .M.a.n...G.u.y.a.n.a.-.t.y.d...I.s.r.a.e.l.-.t.y.d...K.a.a.p.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.777864799965059
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
      MD5:264C63861CEEF0E1A4CC72D014AA43FC
      SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
      SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
      SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):28844
      Entropy (8bit):4.8624824473043695
      Encrypted:false
      SSDEEP:768:Wz7MIuz9Q0izAdzKn44TlqOXY7Ai4mtZ0ol:Wz7MIuz9f3clqOCAi/j
      MD5:6B4CC9E2BB391A6C39697A2B1E13377B
      SHA1:E6CABD5F2E9281181B6EFA60840D4970B20E2ED3
      SHA-256:E8A040142868D625961515E2E34FBAD3A9D99B25F0FF732015789394FAD222A5
      SHA-512:16B12CF835EB5285F2D2A3E216BA34A7FE1E5B651FFA645500EC72CD91B04F76257A3FDF037F9C4576AB26370416DCD732C0197A3AFF532F1C31BF4B70085342
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .lG.....#...#...C.....lG....n.pQ......................................................................................................................................................................................................................................... ............................................................................................................................................................................................................................................................................. ................................................................................................................................................................................................................. .................................................................................................................................... .....................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.777864799965059
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
      MD5:264C63861CEEF0E1A4CC72D014AA43FC
      SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
      SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
      SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.777864799965059
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
      MD5:264C63861CEEF0E1A4CC72D014AA43FC
      SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
      SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
      SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):25388
      Entropy (8bit):4.821860981536896
      Encrypted:false
      SSDEEP:768:2z/Z/Lz/7N1KKvdaKT5l93GOX038P+207S:2rBLr7N1KKvdaKT5l93GOX0CrN
      MD5:9D84C23D88CD13DBA3F72AB07F044EFE
      SHA1:A4FF53C3627F58FDC205417EA3C44E92F7B69337
      SHA-256:2189E53495AFB7A728485A2290ACDBBEB667018398269728038384E5474464DE
      SHA-512:B536FFA184DEBFAE23B12CB09B8B03BB8D02E807EE5B4BFEBA945BE1D1387C0811CE9C2E706D3C98DEFF1625363F0ED20F77794790872D401D9BD8C0C8E99275
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ...............G......T...n.p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
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):120
      Entropy (8bit):3.627526768396092
      Encrypted:false
      SSDEEP:3:XCbVSm/tl+OsB/pll9l/JlROlIlXqkxPlu9l13lPP6n:SvuOElROqhPlYY
      MD5:2E73166BDB1D4DC461A53A884E7B63A6
      SHA1:E25361BD9881C21155B512E85C4206BF5A68F166
      SHA-256:B3C0A1262290D2DF85B304E0AA12A77AA2224BBC63482E290D4DBE2406B871CF
      SHA-512:96F7FAEFE92AD8E8DEAA63439E9C72E1A2A548B89AD542C36E8B98DB5E60FE2BA46FA3E29EDC7318EEBE4D79255630B95AE44C4B9311079EFC82D347FB61290D
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .S....................S.....n.pQ..X...b...|.B.f...T.....#.T........P........R..`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):17336
      Entropy (8bit):5.139077167547189
      Encrypted:false
      SSDEEP:192:BVzZjdzVQD/b39FrQWEX2bjkMCrUwt6m3XDTUZ:LzZ9C/b39aWrwfrUwgEfUZ
      MD5:2018A278B686B8FAE3CED280A8DDB441
      SHA1:7BF83B51BF064DE0239EC8184A7F52CB164BD937
      SHA-256:4C3A0E1F66749F2E497666BEDA521505AFFFBFE4465EFC5D58E8B18DC6A5D9DD
      SHA-512:C24935034297DF1FAC5311BEBDB633EC29F36ABDF89EA38E72909DD908FAC49796A9E62321A39F8415177101499382A210F7AF7306145D8F8F2F939F5D2AB2B7
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .L..............'.....L.....n.p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
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):51488
      Entropy (8bit):4.166628682082664
      Encrypted:false
      SSDEEP:384:dQR0ti9JsZ8vPJ94bvXvIAvGTvusv7r/v7gvUv7dv7hv7v7mv7zv7bv79v7kvUER:YPv9+3DV8h/N
      MD5:A6177E4FDF9E69B2DD3BD46529563EB5
      SHA1:92B44DD562E270E0B57AAC0753D53168E09B8401
      SHA-256:DA18DAFE0470C119EBE9320B6C2FE3FB8D30AD6C82CCB2FFD1A73F6FD4B778AB
      SHA-512:162D068518BAC2B432E7E43F362E325A9DC495D5E2F71845BDED8E1C73C086E8C45B711D831BA41D42EED2F1ECC40A661CD3138CC4C83CB6263D25C808309EE6
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................<2. .lG.....@2..@2..B.....lG....n.pQ............................ .............(.............*............."...$...........................*.........&...,....."...(.........#...(.........%.......".....%...(...$.....&.....................3...".................4.............(... ............."...4.........1.......4.............-.............*....................."...4............. ...#.........(...".............*...#...(.........(...#...(.........*.......-.........%.......*.........*.......4.................4.........#.......*.........(.......(.........%.......*.........&...(... .................1.........#............."...........4.....#...*...%.........#...........,.....%...........-.....&..."..."...,...2...1...4.8...8.8.....#. ...........4.........(...........,.........,..."...*................."...#...4.............,..."...(.............*...#...4.............,.......4.............4.......#......... ...4...".............&...,.......4.........'...".......
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2344
      Entropy (8bit):3.8096174694386007
      Encrypted:false
      SSDEEP:24:U/lkGWXtKcRtKDYGkEpKsu8obAXIgAJKlzV5GrryVhV6qrYIoENlNrvxyZeZ9:Uj6TtKhr2AXvAJKrUvEj6OxNlN1yZeZ9
      MD5:A331E7B5A5AE00C5919C939B726D8050
      SHA1:927E89E14F00A69CCA0CC9C775F74BC620CD8C98
      SHA-256:34A46FE41B98599E75A33B9C3262FC27D36D7CABEA4E180801475A5D824E00C0
      SHA-512:11C5E425F00E0F7BBD767E66DE0F6292A7240348A5DA866C87F92BF8943FB1CD7B3E8175DC0BE99FF1F8628CF8F9C0F83A619B1A418F1AB045403D72B9C13373
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................>.. .lG.....B...B.........lG"...n.pQ..{.1.}. .{.0.}...T.a.g.-.i.n.i.t. .O.r.a.s. .{.0.}...S.u.k.d.a.n.a.n.g. .O.r.a.s. .{.0.}...W.a.l.a. .M.a.i.l.h.i.n.g. .S.i.y.u.d.a.d...N.o.r.t.e. .A.m.e.r.i.k.a. .S.u.k.d.a.n.a.n.g. .O.r.a.s...K.a.s.a.r.a.n.g.a.n.g. .O.r.a.s. .s.a. .G.r.e.e.n.w.i.c.h...N.o.r.t.e. .A.m.e.r.i.k.a. .O.r.a.s. .s.a. .P.a.s.i.p.i.k.o...N.o.r.t.e. .A.m.e.r.i.k.a. .O.r.a.s. .s.a. .S.i.d.l.a.k.a.n...N.o.r.t.e. .A.m.e.r.i.k.a. .O.r.a.s. .s.a. .A.t.l.a.n.t.i.k.o...N.o.r.t.e. .A.m.e.r.i.k.a. .O.r.a.s. .s.a. .K.a.b.u.k.i.r.a.n...T.a.l.i.w.a.l.a. .n.g.a. .O.r.a.s. .N.o.r.t.e. .A.m.e.r.i.k.a...K.o.o.r.d.i.n.a.d.o. .n.g.a. .U.n.i.b.e.r.s.o.h.a.n.o.n.g. .O.r.a.s...S.u.k.a.d.a.n.a.n.g. .O.r.a.s. .s.a. .K.a.s.a.d.p.a.n.o.n. .s.a. .E.u.r.o.p.a...S.u.k.d.a.n.a.n.g. .O.r.a.s. .s.a. .T.a.g.a.-.O.r.y.e.n.t.e. .s.a. .E.u.r.o.p.a...N.o.r.t.e. .A.m.e.r.i.k.a. .S.u.k.d.a.n.a.n.g. .O.r.a.s. .s.a. .P.a.s.i.p.i.k.o...O.r.a.s. .s.a. .K.a.s.a.d.p.a.n.o.n. .s.a. .E.u.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.777864799965059
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
      MD5:264C63861CEEF0E1A4CC72D014AA43FC
      SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
      SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
      SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):20012
      Entropy (8bit):4.787487694159469
      Encrypted:false
      SSDEEP:384:nqw4u2arR1dM+9zK+AbcRC9Iggzo7xePWBohrZw:nqluFq+8gS8M0Zw
      MD5:EA14443A48A5785B950AF7DFF8058650
      SHA1:AEB1E67A930670A0C7D22EEE0D4C7324D7919BA8
      SHA-256:9EE65ACE547964B6B36ADF21BBDEDB156EA0FCC4962BB02DBC3DB6FE4F0B099E
      SHA-512:004EBEE510F5D93AF0109698122286E556C4FD598BCF0901464530F081A4D06FAF6C80AAEF6161363C669864D2745FB777FEF4497031F5B67EDEAA037593BB62
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ."..............P.....".....n.pQ..A.c.r.e.-.t.i.d...A.p.i.a.-.t.i.d...A.z.o.r.e.r.n.e...F...r...e.r.n.e...H.o.v.d.-.t.i.d...N.i.u.e.-.t.i.d...O.m.s.k.-.t.i.d...P...s.k.e...e.n...C.h.u.u.k.-.t.i.d...C.o.m.o.r.e.r.n.e...D.a.v.i.s.-.t.i.d...J.u.l.e...e.r.n.e...L.a.n.g.a. .t.i.d...M.a.c.a.o.-.t.i.d...N.a.u.r.u.-.t.i.d...S.y.o.w.a.-.t.i.d...U.k.e.n.d.t. .b.y...V.a.t.i.k.a.n.e.t...A.l.a.s.k.a.-.t.i.d...A.n.a.d.y.r.-.t.i.d...B.h.u.t.a.n.-.t.i.d...I.r.a.n.s.k. .t.i.d...K.o.s.r.a.e.-.t.i.d...M.a.l.d.i.v.e.r.n.e...M.a.w.s.o.n.-.t.i.d...M.o.s.k.v.a.-.t.i.d...P.o.n.a.p.e.-.t.i.d...S.a.m.a.r.a.-.t.i.d...T.a.h.i.t.i.-.t.i.d...T.a.i.p.e.i.-.t.i.d...T.u.v.a.l.u.-.t.i.d...V.o.s.t.o.k.-.t.i.d...A.r.a.b.i.s.k. .t.i.d...A.r.m.e.n.s.k. .t.i.d...C.a.y.m.a.n...e.r.n.e...C.e.n.t.r.a.l.-.t.i.d...C.h.a.t.h.a.m.-.t.i.d...C.u.b.a.n.s.k. .t.i.d...E.a.s.t.e.r.n.-.t.i.d...G.a.m.b.i.e.r.-.t.i.d...I.r.k.u.t.s.k.-.t.i.d...J.a.k.u.t.s.k.-.t.i.d...J.a.p.a.n.s.k. .t.i.d...M.a.g.a.d.a.n.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):21760
      Entropy (8bit):4.726886706277565
      Encrypted:false
      SSDEEP:384:i9Br0QYulvmpDNbRbtaKN1CVxZ1DxZ3jIQ3ZhzbPbKdiimDXDnwqNTdYpxplFNMM:U5rv3GHrdPot2f
      MD5:ABA4F91B8CBBD3EA505CA51DBE75FD05
      SHA1:A580E14E2F768319440A12CC74A98814EBC6CAF6
      SHA-256:DF20932397AE0BB6CBB84E5F9E561FC80432854BCFED82F24D1853EF11463F84
      SHA-512:8C78D8A7164CAD53399F83DAC258772D222BA192C6DE21448C3C1968BCA2E332C1836B6E361352035AC2BB49D323098093270694E338FA8A5047915FE613A6A0
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................4.. ."......8...8...Q.....".....n.pQ..C.h.o.w.d...E.r.i.w.a.n...K.a.n.a.r.e.n...K.o.m.o.r.e.n...S.a.r.a.t.o.w...T.s.c.h.i.t.a...{.0.}. .Z.e.i.t...A.c.r.e.-.Z.e.i.t...A.p.i.a.-.Z.e.i.t...A.s.t.r.a.c.h.a.n...G.o.l.f.-.Z.e.i.t...G.u.a.m.-.Z.e.i.t...M.a.l.e.d.i.v.e.n...N.i.u.e.-.Z.e.i.t...O.m.s.k.-.Z.e.i.t...A.q.t.a.u.-.Z.e.i.t...C.a.s.e.y.-.Z.e.i.t...C.h.o.w.d.-.Z.e.i.t...C.h.u.u.k.-.Z.e.i.t...D.a.v.i.s.-.Z.e.i.t...M.a.c.a.u.-.Z.e.i.t...N.a.u.r.u.-.Z.e.i.t...O.s.t.e.r.i.n.s.e.l...P.a.l.a.u.-.Z.e.i.t...S.a.m.o.a.-.Z.e.i.t...S.y.o.w.a.-.Z.e.i.t...A.l.a.s.k.a.-.Z.e.i.t...A.l.m.a.t.y.-.Z.e.i.t...A.n.a.d.y.r. .Z.e.i.t...A.q.t...b.e.-.Z.e.i.t...A.z.o.r.e.n.-.Z.e.i.t...B.h.u.t.a.n.-.Z.e.i.t...G.u.y.a.n.a.-.Z.e.i.t...K.o.s.r.a.e.-.Z.e.i.t...M.a.w.s.o.n.-.Z.e.i.t...P.o.n.a.p.e.-.Z.e.i.t...R.e.y.k...j.a...v...k...S.a.m.a.r.a.-.Z.e.i.t...T.a.h.i.t.i.-.Z.e.i.t...T.a.i.p.e.h.-.Z.e.i.t...T.u.v.a.l.u.-.Z.e.i.t...W.o.s.t.o.k.-.Z.e.i.t...C.h.a.t.h.a.m.-.Z.e.i.t...F.i.d.s.c.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):252
      Entropy (8bit):3.5570860102991015
      Encrypted:false
      SSDEEP:3:XCbVSm/tlt5lI/Illl/uolilS2Mks9ks9ks9ks9ks9ks9ks9ksajtrI+58SU9tIS:Sv5IgN2oli0NTTTTTTTyDuiEW1M5N
      MD5:7410A2E68E5324871E29EF1CE1EC3358
      SHA1:388E5B0078C343AA1608D47E27105FA1263D5728
      SHA-256:4B3E8A2D4C07E0C906AFDF11DBBB3A471805BE44E6AF6C1234622B3F1D2AA09F
      SHA-512:7312A8D7C021FFCB839FE5755EFDB8E42BDBFA6D316E9D4833A7EC5CABCAD5756BEC57153BCB6D82E3F5593A8A30B2F96238454B54D3208C13F114286E50F1EC
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................3.. .g......7...7.........g.&...n.pQ................................................................................................................................1...d......P...P...P...P...P$..P+..P2..P........f..`&..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):152
      Entropy (8bit):3.8192580345823637
      Encrypted:false
      SSDEEP:3:XCbVSm/tlE4lhxczDVclS2Mq8avn0PfxWwk7kllnI6AuifD+f:Sv/sO0Nnav0P8wk7kl6xVDO
      MD5:0C71A5B9C2CC51F08C3649005BD1667B
      SHA1:9508AE1734F0C95DC9156EC6CB02F95AE23F975F
      SHA-256:478DA27ACF835FB1C483F4D821C89B3470B887FDEA6E5C6CA60D67D565981391
      SHA-512:153C672F0D957ABE9E54BBDAC31FE3835E9BE0B67B79F10C60172F9CEADF7922EDAD51C4DCAC1869315719DC4CFFB0E9D7ABF15B43B8C88C4175C7DA3C852757
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .g....................g.....n.pQ..............................................A.U......P...P...P..^%.......`f..`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlM4lzxlbkllMs:SvHjkss
      MD5:7B933F365B0F6A04C6DB118E4A5C302E
      SHA1:193D872892E0BE99BDEB813CF9BC6E6B9AE2022F
      SHA-256:21EDA0DEA9E1F55F8E7A899B005526EA9D3D08E9338B7A57524E35C0D472D903
      SHA-512:91C56392F9924F26BF28A803377B5EF517A3F4D0E5DDA3541C0A73BA33BCE1EC6B78B325C59B4DEFCCE830C4133E4BCAF118372067A5D9D05A0AC4E592D75980
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.g....................g.....n.pQ....^%....f.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlM4lzxlbkllMs:SvHjkss
      MD5:7B933F365B0F6A04C6DB118E4A5C302E
      SHA1:193D872892E0BE99BDEB813CF9BC6E6B9AE2022F
      SHA-256:21EDA0DEA9E1F55F8E7A899B005526EA9D3D08E9338B7A57524E35C0D472D903
      SHA-512:91C56392F9924F26BF28A803377B5EF517A3F4D0E5DDA3541C0A73BA33BCE1EC6B78B325C59B4DEFCCE830C4133E4BCAF118372067A5D9D05A0AC4E592D75980
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.g....................g.....n.pQ....^%....f.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):3.165365317526889
      Encrypted:false
      SSDEEP:3:XCbVSm/tlu1YlM68tbROl1ylh+V/9hAlP:SvKYlf8tROCl0WlP
      MD5:2CBAA3E01A9CE225D0451E1F176E8F75
      SHA1:05D436146BAD0B3926378FDA4143A3B19DC43B22
      SHA-256:5FF27D8579BA400E855094F67D72E3DC577F68C734D6F3F57F510F7BC246DAAB
      SHA-512:EF946D17BC1E6EF198E2A39BD61303DC0A147BFAB62C3B199EA6AB5D72B4D22232A34B5273C51EB9BA7730BF190CCD12B88EADFA4BCD37D666B9BEED2E3B232E
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.\....................\.....n.pQ..2...1...4.8...5.0.....^%..[.].
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlM4lzxlbkllMs:SvHjkss
      MD5:7B933F365B0F6A04C6DB118E4A5C302E
      SHA1:193D872892E0BE99BDEB813CF9BC6E6B9AE2022F
      SHA-256:21EDA0DEA9E1F55F8E7A899B005526EA9D3D08E9338B7A57524E35C0D472D903
      SHA-512:91C56392F9924F26BF28A803377B5EF517A3F4D0E5DDA3541C0A73BA33BCE1EC6B78B325C59B4DEFCCE830C4133E4BCAF118372067A5D9D05A0AC4E592D75980
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.g....................g.....n.pQ....^%....f.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.040932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlM4lzxlbkllMEn:SvHjksE
      MD5:2D23AF6F7FE7AE532F9E762BFE487A5C
      SHA1:4742A78FC6D26E800814510D71749A05DA578C97
      SHA-256:E9F6EF5729737BBD2236826FF878786D5009A6772997D0B363DAA04017BBF83E
      SHA-512:03D2F1B5E1EDF75D120CBA0D19C5370FD34BC3000599B814B3D02519958E399BA61CE9CA98EC0798C7FC78C2F9FFABC488F0DB921537681F99163F0890122E77
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.g....................g.....n.pQ....^%..[.f.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):152
      Entropy (8bit):3.855671533556861
      Encrypted:false
      SSDEEP:3:XCbVSm/tlE4lhxvlRkls02l2kv+PYJGD26kD9Gl19l1SMuifDkfn:Sv/3kaV+PYE26ksv9aMVDk
      MD5:A2FECB24B478F9A9E53E5BD8CB82947B
      SHA1:3EBA18A74E53BC95B39065AD1C229181284F3BDE
      SHA-256:55D9048A31CCFB28F5DA7A418A221D2CF8D488DA50DC7A125A7BBB0EB7BD01B4
      SHA-512:69A04CF483233F71DFE3E3730A11E4A5E86B57946A3BC9BE823DCB7C5E0B3C26C771962242E226C82E8A72ABD29133E90DCC0AEFAFA2CEAB146ED4FB321439C1
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .g....................g.....n.pQ..............................%.%.....|............P...P...P...P..^%.......`f..`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.040932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlM4lzxlbkllMEn:SvHjksE
      MD5:2D23AF6F7FE7AE532F9E762BFE487A5C
      SHA1:4742A78FC6D26E800814510D71749A05DA578C97
      SHA-256:E9F6EF5729737BBD2236826FF878786D5009A6772997D0B363DAA04017BBF83E
      SHA-512:03D2F1B5E1EDF75D120CBA0D19C5370FD34BC3000599B814B3D02519958E399BA61CE9CA98EC0798C7FC78C2F9FFABC488F0DB921537681F99163F0890122E77
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.g....................g.....n.pQ....^%..[.f.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):604
      Entropy (8bit):4.308950039805167
      Encrypted:false
      SSDEEP:12:rTOEqgfVyWUfTFs2RCoa5ndJaNO+ntJaNO+n0KJaNO+nPIRav0PLA4zZFMVxJ:2fBsDxSAC18aELA4gf
      MD5:69DEA09287AFAC41CDF3D43CA243C040
      SHA1:27B28E0A97C9EE44DA281BCCAF4D7C10A716387F
      SHA-256:BEA763868037715A0F573BA746AA4C3252187058D7CB922913BA808C9ADAF0F4
      SHA-512:03D1E92ABD64AF15C20D9B698EB840D2CA34CD600A494053EAD4888B398F5DAA816FF7F64D7B2D8B542DE9D57071160DB193B32F0843715EC611E55A4751D99B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................v...n.pQ..B.S.T...S.t. .K.i.t.t.s...S.t. .L.u.c.i.a...S.t. .H.e.l.e.n.a...S.t. .J.o.h.n.. s...S.t. .T.h.o.m.a.s...S.t. .V.i.n.c.e.n.t...S.t. .P.i.e.r.r.e. .&. .M.i.q.u.e.l.o.n. .T.i.m.e...S.t. .P.i.e.r.r.e. .&. .M.i.q.u.e.l.o.n. .D.a.y.l.i.g.h.t. .T.i.m.e...S.t. .P.i.e.r.r.e. .&. .M.i.q.u.e.l.o.n. .S.t.a.n.d.a.r.d. .T.i.m.e.....#.[K..#.....#.....#.....#.....#.....#.............5..w..................................................5.......................I...A.U...."...P...P...P...P...P...P...P...P...P...P...P...P...P..^%.......`T".`v..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlM4lzxlbkllMs:SvHjkss
      MD5:7B933F365B0F6A04C6DB118E4A5C302E
      SHA1:193D872892E0BE99BDEB813CF9BC6E6B9AE2022F
      SHA-256:21EDA0DEA9E1F55F8E7A899B005526EA9D3D08E9338B7A57524E35C0D472D903
      SHA-512:91C56392F9924F26BF28A803377B5EF517A3F4D0E5DDA3541C0A73BA33BCE1EC6B78B325C59B4DEFCCE830C4133E4BCAF118372067A5D9D05A0AC4E592D75980
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.g....................g.....n.pQ....^%....f.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):152
      Entropy (8bit):3.855671533556861
      Encrypted:false
      SSDEEP:3:XCbVSm/tlE4lhxvlRkls02l2kv+PYJGD26kD9Gl19l1SMuifDkfn:Sv/3kaV+PYE26ksv9aMVDk
      MD5:A2FECB24B478F9A9E53E5BD8CB82947B
      SHA1:3EBA18A74E53BC95B39065AD1C229181284F3BDE
      SHA-256:55D9048A31CCFB28F5DA7A418A221D2CF8D488DA50DC7A125A7BBB0EB7BD01B4
      SHA-512:69A04CF483233F71DFE3E3730A11E4A5E86B57946A3BC9BE823DCB7C5E0B3C26C771962242E226C82E8A72ABD29133E90DCC0AEFAFA2CEAB146ED4FB321439C1
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .g....................g.....n.pQ..............................%.%.....|............P...P...P...P..^%.......`f..`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):252
      Entropy (8bit):3.5570860102991015
      Encrypted:false
      SSDEEP:3:XCbVSm/tlt5lI/Illl/uolilS2Mks9ks9ks9ks9ks9ks9ks9ksajtrI+58SU9tIS:Sv5IgN2oli0NTTTTTTTyDuiEW1M5N
      MD5:7410A2E68E5324871E29EF1CE1EC3358
      SHA1:388E5B0078C343AA1608D47E27105FA1263D5728
      SHA-256:4B3E8A2D4C07E0C906AFDF11DBBB3A471805BE44E6AF6C1234622B3F1D2AA09F
      SHA-512:7312A8D7C021FFCB839FE5755EFDB8E42BDBFA6D316E9D4833A7EC5CABCAD5756BEC57153BCB6D82E3F5593A8A30B2F96238454B54D3208C13F114286E50F1EC
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................3.. .g......7...7.........g.&...n.pQ................................................................................................................................1...d......P...P...P...P...P$..P+..P2..P........f..`&..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):152
      Entropy (8bit):3.855671533556861
      Encrypted:false
      SSDEEP:3:XCbVSm/tlE4xvlHtqls02l2kv+PYJGD26kD9Gl19l1SMuif5OF3Nn:SvPtqaV+PYE26ksv9aMV5MN
      MD5:584B7ED10634A00ED0E4F58E9404CD0F
      SHA1:F167A677FBC727A61D5AC6A326CF1F2EAA8E6073
      SHA-256:D3E4B494D598C2C08DCDBB9379B164C95158BB673AAE0AD789124F46170937F3
      SHA-512:F32C2E4FD559487D4B3E8A67392D5989EC99212453E1AFA2DCBBD22AB69C3E21C589790653D357A5C048C670E2961A1810AF3718823038BA9523164478468D0E
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .]....................].....n.pQ..............................%.%.....|............P...P...P...P..^%.......`\..`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMqxlVtqllMe:SvDtqse
      MD5:7C270F310229B7A3BCEABD9AE3BE08B8
      SHA1:B4FB1A986654111BEAA667E79A6EE7EFD3958C21
      SHA-256:A865EC010C2680B1674F3F258F1AFF7A401E7ED6459F98C0699287FC05B8C520
      SHA-512:1967B7F33051C0E665CDE999BF594921BA1376017895E2CD74B3863D8704BEABE9CB4D7E44BE46C038225A24C205A31310198682885E8BC7A14575860C5CC988
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.]....................].....n.pQ....^%....\.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMqxlVtqllMe:SvDtqse
      MD5:7C270F310229B7A3BCEABD9AE3BE08B8
      SHA1:B4FB1A986654111BEAA667E79A6EE7EFD3958C21
      SHA-256:A865EC010C2680B1674F3F258F1AFF7A401E7ED6459F98C0699287FC05B8C520
      SHA-512:1967B7F33051C0E665CDE999BF594921BA1376017895E2CD74B3863D8704BEABE9CB4D7E44BE46C038225A24C205A31310198682885E8BC7A14575860C5CC988
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.]....................].....n.pQ....^%....\.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMqxlVtqllMe:SvDtqse
      MD5:7C270F310229B7A3BCEABD9AE3BE08B8
      SHA1:B4FB1A986654111BEAA667E79A6EE7EFD3958C21
      SHA-256:A865EC010C2680B1674F3F258F1AFF7A401E7ED6459F98C0699287FC05B8C520
      SHA-512:1967B7F33051C0E665CDE999BF594921BA1376017895E2CD74B3863D8704BEABE9CB4D7E44BE46C038225A24C205A31310198682885E8BC7A14575860C5CC988
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.]....................].....n.pQ....^%....\.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):152
      Entropy (8bit):3.855671533556861
      Encrypted:false
      SSDEEP:3:XCbVSm/tlE4xvlHtqls02l2kv+PYJGD26kD9Gl19l1SMuif5OF3Nn:SvPtqaV+PYE26ksv9aMV5MN
      MD5:584B7ED10634A00ED0E4F58E9404CD0F
      SHA1:F167A677FBC727A61D5AC6A326CF1F2EAA8E6073
      SHA-256:D3E4B494D598C2C08DCDBB9379B164C95158BB673AAE0AD789124F46170937F3
      SHA-512:F32C2E4FD559487D4B3E8A67392D5989EC99212453E1AFA2DCBBD22AB69C3E21C589790653D357A5C048C670E2961A1810AF3718823038BA9523164478468D0E
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .]....................].....n.pQ..............................%.%.....|............P...P...P...P..^%.......`\..`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):152
      Entropy (8bit):3.855671533556861
      Encrypted:false
      SSDEEP:3:XCbVSm/tlE4xvlHtqls02l2kv+PYJGD26kD9Gl19l1SMuif5OF3Nn:SvPtqaV+PYE26ksv9aMV5MN
      MD5:584B7ED10634A00ED0E4F58E9404CD0F
      SHA1:F167A677FBC727A61D5AC6A326CF1F2EAA8E6073
      SHA-256:D3E4B494D598C2C08DCDBB9379B164C95158BB673AAE0AD789124F46170937F3
      SHA-512:F32C2E4FD559487D4B3E8A67392D5989EC99212453E1AFA2DCBBD22AB69C3E21C589790653D357A5C048C670E2961A1810AF3718823038BA9523164478468D0E
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .]....................].....n.pQ..............................%.%.....|............P...P...P...P..^%.......`\..`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):152
      Entropy (8bit):3.855671533556861
      Encrypted:false
      SSDEEP:3:XCbVSm/tlE4xvlHtqls02l2kv+PYJGD26kD9Gl19l1SMuif5OF3Nn:SvPtqaV+PYE26ksv9aMV5MN
      MD5:584B7ED10634A00ED0E4F58E9404CD0F
      SHA1:F167A677FBC727A61D5AC6A326CF1F2EAA8E6073
      SHA-256:D3E4B494D598C2C08DCDBB9379B164C95158BB673AAE0AD789124F46170937F3
      SHA-512:F32C2E4FD559487D4B3E8A67392D5989EC99212453E1AFA2DCBBD22AB69C3E21C589790653D357A5C048C670E2961A1810AF3718823038BA9523164478468D0E
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .]....................].....n.pQ..............................%.%.....|............P...P...P...P..^%.......`\..`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):152
      Entropy (8bit):3.855671533556861
      Encrypted:false
      SSDEEP:3:XCbVSm/tlE4xvlHtqls02l2kv+PYJGD26kD9Gl19l1SMuif5OF3Nn:SvPtqaV+PYE26ksv9aMV5MN
      MD5:584B7ED10634A00ED0E4F58E9404CD0F
      SHA1:F167A677FBC727A61D5AC6A326CF1F2EAA8E6073
      SHA-256:D3E4B494D598C2C08DCDBB9379B164C95158BB673AAE0AD789124F46170937F3
      SHA-512:F32C2E4FD559487D4B3E8A67392D5989EC99212453E1AFA2DCBBD22AB69C3E21C589790653D357A5C048C670E2961A1810AF3718823038BA9523164478468D0E
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .]....................].....n.pQ..............................%.%.....|............P...P...P...P..^%.......`\..`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMqxlVtqllMe:SvDtqse
      MD5:7C270F310229B7A3BCEABD9AE3BE08B8
      SHA1:B4FB1A986654111BEAA667E79A6EE7EFD3958C21
      SHA-256:A865EC010C2680B1674F3F258F1AFF7A401E7ED6459F98C0699287FC05B8C520
      SHA-512:1967B7F33051C0E665CDE999BF594921BA1376017895E2CD74B3863D8704BEABE9CB4D7E44BE46C038225A24C205A31310198682885E8BC7A14575860C5CC988
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.]....................].....n.pQ....^%....\.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.8041805894387437
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMr/66E7l7cls/DDn:Svq/66gQa/fn
      MD5:093DE8623D6D1F9CDF81286A210EE1CC
      SHA1:55B4F15F11A4CAC5916D97F1DFD223D44F3A3F0F
      SHA-256:7A99245469289DB8E7452AF32179CF9FFA12DE7FA65536A9481E0C78C7F847AC
      SHA-512:A00DDD2FFF9C37BF986872735ED3FB16B3642D898C4E4D221F981EBEE7D1A283ACF8C17ED459FF81F9F419B3FB4CB505A9D36355FF6071E93998F79F3E598FFB
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P..&....................&....n.pQ.......&
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):22764
      Entropy (8bit):4.579134794988456
      Encrypted:false
      SSDEEP:384:8HI6wYEKPUC+AV0C9PcvycIIBV7+I25bA5Bo+jEypRlJd:8orpK8C+AVD0/j+I2ZALBRLd
      MD5:E85C8E73BEA1878FB4B139F5B262E02C
      SHA1:9D78A14D78B95D2E5B093787DE493EC89A360CB3
      SHA-256:7DD88943034DE7C1E70760FC9884C35D93B8781A8DEA2F9E04106EAB6C2AE046
      SHA-512:6DB91F89F22EF5FE9E2BB4CC48581BCC72DA5F03480CCDD2968FABB15F56113DF90BE463F917350630D3029439D9BA1B2F64A4CCC0C6D6AA71E1C3E077C78039
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................/.. .D......3...3...P.....D.....n.pQ..A.d...n...D.a.c.a...A.r.g.e.l...B.e.l...n...B.i.s...u...C.h.i.t.....D.u.b...i...K...r.o.v...T.i.m.b.u...T...n.e.z...A.b.i.y...n...A.n...d.y.r...B.a.r...i.n...B.e.l.i.c.e...C.a.y.e.n.a...E.r.e.v...n...J.a.r.t...n...M.a.n.a.o.s...S.a.i.p...n...S.k.o.p.i.e...S...d.n.e.y...Y.a.m.e.n.a...Y.i.b.u.t.i...Z...r.i.c.h...A.s.j.a.b.a.d...B.a.r.n.a...l...C.o.m.o.r.a.s...C.u.r.a.z.a.o...S.a.r...t.o.v...T.a.s.k.e.n.t...Y.a.k.a.r.t.a...A.s.t.r.a.c...n...B.r.u.s.e.l.a.s...C.h.i.s.i.n...u...E.l. .C.a.i.r.o...E.s.t.a.m.b.u.l...H.o.n.o.l.u.l.....K.o.s.t.a.n...i...N.u.a.k.c.h.o.t...S.h.a.n.g.h...i...U.a.g.a.d.u.g.......z.h.g.o.r.o.d...J.e.r.u.s.a.l...n...U.l.i...n.o.v.s.k...Z.a.p.o.r.i.y.i.a.....m.s.t.e.r.d.a.m...G.r.a.n. .T.u.r.c.a...S.a.n.t.o. .T.o.m.....E.l. .V.a.t.i.c.a.n.o...I.s.l.a. .d.e. .M.a.n...I.s.l.a.s. .F.e.r.o.e...L.o.s. ...n.g.e.l.e.s...S.a.n.t.a. .E.l.e.n.a...H.o.r.a. .d.e. .A.c.r.e...h.o.r.a. .d.e. .F.i.y.i...h.o.r.a. .d.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):156
      Entropy (8bit):3.8338907553219608
      Encrypted:false
      SSDEEP:3:XCbVSm/tlHFf/glull55Jcl2ktlxl/pl2lZkbOa+/Q6+ne8vSMQtfkbN:Sv5IUR5O4WqobO1o/HvH4f6N
      MD5:0FB437D334430CBAA4931566E18477F5
      SHA1:093E013BE25D6827C504669A333D5482ACDB0B82
      SHA-256:E8DC00AC382773E5D86B3701B5B09289978D50CC0DD0CB4E6EF975F18129259B
      SHA-512:24A49A68686E89B025C74E83D21FB4987C0711BB1C32432DD6FE11E6BD7BC26B50E6E7F2C1A3CE819A07E215DCE37F8BFC0341EAF40BEAC5697B4D75E3BF8AAC
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .]....................].....n.pQ..W.A.R.T...W.A.R.S.T...........d._._.........c.^.^...i.x......P...P..^%...._..`\..`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):112
      Entropy (8bit):3.382914428948526
      Encrypted:false
      SSDEEP:3:XCbVSm/tlrntbr5OllqZkg6tMMQtfkAN:SvrOakg6tx4fL
      MD5:5ED6BE36E3AF9385F15F8C9A869F806C
      SHA1:56F14B5F08AD95543A6AF2896D17397D1B2D5E75
      SHA-256:61BB8B40B3585ABAF84250AAFB515305025821B362DD2E3865410235B7CDC74F
      SHA-512:EAD67AA2CF5A350C3E7D3CE18E7502571BC4E64A7D517A983381CCF9ED0F3D41A731912B05F889AC4FD55B258A9822D179A9E9DAF4E8F2D1E1D3049D5FC5093D
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .]....................].....n.pQ..B.O.T.......^...E....P..^%...._..`\..`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.040932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMqxlVtqllMk6:SvDtqsk6
      MD5:10E40DF5115F3C4978DCE4DA2E0D6451
      SHA1:BC28046E014F618395E2CCCCC316C17ED91DAA4A
      SHA-256:876F59B33BA2CA4DFCB619BAE86DA6165DF4955B09EC4FC989BC4E8FD4F1DF89
      SHA-512:00E5DF6097B58ACFEE5B47748856A95F4E0CD920AE9C33A4D6ED71425B1714E7F2DC6031FEBC5EC4CCF216A1E3E3CAB2A3950999DC8343B746EE20747DBCF6FF
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.]....................].....n.pQ....^%.._.\.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):112
      Entropy (8bit):3.4007715718056684
      Encrypted:false
      SSDEEP:3:XCbVSm/tlrntbr5OlgmZkgLsaMQtfkAN:SvrOOWkgm4fL
      MD5:609E1049FBC3527EB61D51C82BC5333D
      SHA1:B9A6E79053EB441328E6D474567069A99D264F26
      SHA-256:0713312787DC30E6903ABED7D316D580C6427071FD16673E96621B446E9BA9D1
      SHA-512:2421778496FBEFC0EA61C81DCBCE01B0E7EE6E9CFF3B116F7BC4AF0C67D0762013A91B392784CC3DD8E6FF72CF0696C9FB8C84464D5E499EBE21C63507D7139F
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .]....................].....n.pQ..E.C.T.......^...4....P..^%...._..`\..`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.040932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMqxlVtqllMk6:SvDtqsk6
      MD5:10E40DF5115F3C4978DCE4DA2E0D6451
      SHA1:BC28046E014F618395E2CCCCC316C17ED91DAA4A
      SHA-256:876F59B33BA2CA4DFCB619BAE86DA6165DF4955B09EC4FC989BC4E8FD4F1DF89
      SHA-512:00E5DF6097B58ACFEE5B47748856A95F4E0CD920AE9C33A4D6ED71425B1714E7F2DC6031FEBC5EC4CCF216A1E3E3CAB2A3950999DC8343B746EE20747DBCF6FF
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.]....................].....n.pQ....^%.._.\.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.040932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMqxlVtqllMk6:SvDtqsk6
      MD5:10E40DF5115F3C4978DCE4DA2E0D6451
      SHA1:BC28046E014F618395E2CCCCC316C17ED91DAA4A
      SHA-256:876F59B33BA2CA4DFCB619BAE86DA6165DF4955B09EC4FC989BC4E8FD4F1DF89
      SHA-512:00E5DF6097B58ACFEE5B47748856A95F4E0CD920AE9C33A4D6ED71425B1714E7F2DC6031FEBC5EC4CCF216A1E3E3CAB2A3950999DC8343B746EE20747DBCF6FF
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.]....................].....n.pQ....^%.._.\.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):880
      Entropy (8bit):5.1076431106135
      Encrypted:false
      SSDEEP:24:GlO10lTlw0WelRWj7WUS8lQqqciigVWnz7mn:jvKUS8lDqjigVt
      MD5:005590E5FD1DF5FB6ACFB74C1C32C1D7
      SHA1:AAF654A259DC1C87D4325119284DBA3CE271D909
      SHA-256:38F7EA608D52F4BD129ECF6E2963A1F443D7C2127C3DA0ABCAD0DA2972B27F19
      SHA-512:7F6DB0B64B35B2EE656E9A58015006D27DC929EC3018C45E2CEEC9C4834DC27C9EA9B39C49E94C628C985DF7AD6CAB44C7D769E712CF7C47A06B98F765DA3B2C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ................%...........n.pQ..h.o.r.a. .d.e. .C.h.a.m.o.r.r.o...h.o.r.a. .d.e.l. .O.c...a.n.o. ...n.d.i.c.o...h.o.r.a. .d.e. .l.a.s. .i.s.l.a.s. .F...n.i.x...h.o.r.a. .u.n.i.v.e.r.s.a.l. .c.o.o.r.d.i.n.a.d.a...h.o.r.a. .d.e. .l.a.s. .i.s.l.a.s. .M.a.r.q.u.e.s.a.s.....#.....#.{G..#.....#.P!..#.M?..#.....#.....5.^...#.(7..#.....#.L7........\.............B...3.........R.,...........W...........5.............u.,.z.............#.....Hz........(.&.....5.....5.v|......5..........5....|....5.........5.............5.........5...........'.a.-...5./...5....5.x...5.....5.^|..5.F...5..]..5....5..n%.&...b.~...i.....................1.R...|...(.U.i.......d.... .!.!.!t"."%#+$w..Pz..P}..P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P..^%...._..`T".`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.500123730064915
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/lcls8l:SBtkJ1li6gml/qa0
      MD5:4F880C5D6BDDF339F850A87F0DC7BE2D
      SHA1:90F0E7728BF802B7E962DB8434D1C562705F0613
      SHA-256:B175F94ED5CE958A83AAB63677471AA4C0B2EA04FABA7C42681A5AEAEF8E5530
      SHA-512:C9FC5B2F71F055D42C8501AAAAF6E6B6C290A6018CF1CFCB993735A01868850D0B3C5EAAD3A611C80D456AF9319DCF1F20CE4A8A0DB54736BA8C8D7089B54144
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................n.pQ.....$..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.925547915629603
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDklU8gl8l/ql5DEMd4Pn:SBtkJYlU8g8l/qnEb
      MD5:4167F884C4D893D3C4CF676EBA59ECCC
      SHA1:F9BB765CDD97565E7F27DA2D29F5595E726EAF43
      SHA-256:6FA9F3809A63EB8495058651296095C1F448FE0E626FD8E3C20A4BF21C92A818
      SHA-512:E1172C023E0EFD679E505BB795D215705B78CBF938A3336E06A934D9645CAC47C070BDAB5C2C7F149209D3B2D9F7908F2851EAA8CEDADADF31C1292A178385D6
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................n.pQ..f.f._.L.a.t.n._.S.N......$....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):22340
      Entropy (8bit):4.587445833031727
      Encrypted:false
      SSDEEP:384:09ChQS+N9XABGt8yG5QTvv5s6VPGvf31g6Ii778bUys79S2djA3A15BP/s6iIdxv:mV8h2FJwUcdeY00rF
      MD5:90127A7DF92278761613D2C5C269506F
      SHA1:4749C60F9BF1B69E2C70484627B2303BCB4E4925
      SHA-256:48E2BABC11DBD696B4C9E73548576F5A4F28FCF7D50A3BC97CA0AB065E2FB8C8
      SHA-512:19F38EB9D1EBD934E20820A06B19DA8D6AC6F1197FDF084A52C1C357F7B107432EFCAB62DF2C833F150DF07A4DEF2E1BFF2AD62A8368CDB9CA67D2A256C627B2
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ."..............Q.....".K...n.pQ..A.q.t.a.w...K.i.o.v.a...R.i.i.k.a...T.a.i.t.a...A.t.e.e.n.a...A.t.1.r.a.w...A.z.o.r.i.t...L.o.n.t.o.o...A.a.g.a.b.a.t...B.r.y.s.s.e.l...G.o.d.t.h...b...H.a.n.d.y.g.a...K.o.m.o.r.i.t...M.o.s.k.o.v.a...P.a.r.i.i.s.i...V.a.r.s.o.v.a...B.e.r.l.i.i.n.i...C.h.i._.i.n...u...D.a.m.a.s.k.o.s...M.a.n.s.a.a.r.i...T.a.l.l.i.n.n.a...T.u.k.h.o.l.m.a...F...r.s.a.a.r.e.t...T.a.o.i.b.a.l.s.a...V.a.t.i.k.a.a.n.i...A.c.r.e.n. .a.i.k.a...A.p.i.a.n. .a.i.k.a...J.o.u.l.u.s.a.a.r.i...M.a.l.e.d.i.i.v.i.t...N.i.u.e.n. .a.i.k.a...P.e.r.u.n. .a.i.k.a...W.a.k.e.n. .a.i.k.a...t.u.n.t.e.m.a.t.o.n...+.H...m.m.;.-.H...m.m...C.a.s.e.y.n. .a.i.k.a...C.h.i.l.e.n. .a.i.k.a...F.i.d.~.i.n. .a.i.k.a...G.u.a.m.i.n. .a.i.k.a...H.o.v.d.i.n. .a.i.k.a...I.n.t.i.a.n. .a.i.k.a...I.r.a.n.i.n. .a.i.k.a...K.i.i.n.a.n. .a.i.k.a...K.o.r.e.a.n. .a.i.k.a...K.u.u.b.a.n. .a.i.k.a...M.a.c.a.o.n. .a.i.k.a...N.a.u.r.u.n. .a.i.k.a...O.m.s.k.i.n. .a.i.k.a...P.a.l.a.u.n. .a.i.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):20800
      Entropy (8bit):4.655454957739464
      Encrypted:false
      SSDEEP:384:scfinzfe5eIM4X0KsnaJWHro751BOIoNofTh:Xfuq5P0N6
      MD5:C3330C381F55DB8725E606C466ED6A20
      SHA1:85FE864A063EAE8C6A30B6920946E367D94ADC6C
      SHA-256:A24C3C66C245EBFAD7E92205CFDF50F1F91ED978CA8D2B03BCDA636C8BC3A92D
      SHA-512:B9F09B877013A8FCE6F5AF98AE3F5132BD78254ECB16075839804BBD52E9F8C881AC0B3D82BFB57993E998D4D1D7F931508431920045A8195B327E2FBB39536E
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................D.. ."......H...H...H.....".....n.pQ..O.r.a.s. .s.a. .G.u.l.f...O.r.a.s. .s.a. .N.i.u.e...O.r.a.s. .s.a. .C.h.u.u.k...O.r.a.s. .s.a. .D.a.v.i.s...O.r.a.s. .s.a. .N.a.u.r.u...O.r.a.s. .s.a. .N.e.p.a.l...O.r.a.s. .s.a. .P.a.l.a.u...O.r.a.s. .s.a. .S.y.o.w.a...O.r.a.s. .s.a. .A.n.a.d.y.r...O.r.a.s. .s.a. .G.u.y.a.n.a...O.r.a.s. .s.a. .K.o.s.r.a.e...O.r.a.s. .s.a. .M.a.w.s.o.n...O.r.a.s. .s.a. .P.o.n.a.p.e...O.r.a.s. .s.a. .S.a.m.a.r.a...O.r.a.s. .s.a. .T.a.h.i.t.i...O.r.a.s. .s.a. .T.u.v.a.l.u...O.r.a.s. .s.a. .V.o.s.t.o.k...O.r.a.s. .s.a. .B.o.l.i.v.i.a...O.r.a.s. .s.a. .E.c.u.a.d.o.r...O.r.a.s. .s.a. .G.a.m.b.i.e.r...O.r.a.s. .s.a. .M.y.a.n.m.a.r...O.r.a.s. .s.a. .R.e.u.n.i.o.n...O.r.a.s. .s.a. .R.o.t.h.e.r.a...O.r.a.s. .s.a. .T.o.k.e.l.a.u...S.a.m.a.r.a. .D.a.y.l.i.g.h.t...S.e.n.t.r.a.l. .n.a. .O.r.a.s...O.r.a.s. .s.a. .M.a.l.a.y.s.i.a...O.r.a.s. .s.a. .M.a.l.d.i.v.e.s...O.r.a.s. .s.a. .P.i.t.c.a.i.r.n...O.r.a.s. .s.a. .S.u.r.i.n.a.m.e...L.u.n.g.s.o.d. .
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.500123730064915
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/lcls8l:SBtkJ1li6gml/qa0
      MD5:4F880C5D6BDDF339F850A87F0DC7BE2D
      SHA1:90F0E7728BF802B7E962DB8434D1C562705F0613
      SHA-256:B175F94ED5CE958A83AAB63677471AA4C0B2EA04FABA7C42681A5AEAEF8E5530
      SHA-512:C9FC5B2F71F055D42C8501AAAAF6E6B6C290A6018CF1CFCB993735A01868850D0B3C5EAAD3A611C80D456AF9319DCF1F20CE4A8A0DB54736BA8C8D7089B54144
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................n.pQ.....$..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):18660
      Entropy (8bit):4.849465373321238
      Encrypted:false
      SSDEEP:384:J+zx2cNQ1oDZlmaxxrjoV4hZ+0fmuoo7SNRBOzb5a:QzHasx1hc0eEek9a
      MD5:DBD5BB81EB3D90797262E6A56192A213
      SHA1:F5741F88935D6293C8798889422631224A16678B
      SHA-256:F4C36BE13BE6DA0D8C17FFA80B921B56811BCB23C0FFA010B2552E4B8A392D16
      SHA-512:28924EC658702AA6A67855E1FFE422D88E97B7E1638B5B0BD02D28883BA6E9140882A3920E80AC370600EB39D8D1BE0690608F4F17184554985AF2666F5E4833
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................-.. ."......1...1...D.....".....n.pQ..G.a.s.a...B.e.l.i.s...B.a.r.e.i.n...K.u.v.a.i.t...F...r.o.y.a.r...{.0.}. .t.......2...1...4.8...9...A.p.i.a. .t.......C.u.b.a. .t.......F.i.j.i. .t.......H.o.v.d. .t.......I.r.a.n. .t.......K.i.l.i. .t.......K.i.n.a. .t.......M...r.i.t.i.u.s...N.i.u.e. .t.......O.m.s.k. .t.......P.e.r.u. .t.......S.i.n.g.a.p.o.r...V.a.r.s.j.a.v.a...A.z.o.r.u.r.n.a.r...B.u.t.a.n. .t.......C.h.u.u.k. .t.......D.a.v.i.s. .t.......I.n.d.i.a. .t.......J.a.p.a.n. .t.......K.o.r.e.a. .t.......N.a.u.r.u. .t.......N.e.p.a.l. .t.......P.a.l.a.u. .t.......S.a.m.o.a. .t.......S.t.o.k.k.h...l.m...S.y.o.w.a. .t.......T.o.n.g.a. .t.......V.a.t.i.k.a.n.i.....A.l.a.s.k.a. .t.......K.o.s.r.a.e. .t.......L.u.k.s.e.m.b.o.r.g...M.a.w.s.o.n. .t.......M.o.s.k.v.a. .t.......P.o.n.a.p.e. .t.......T.a.h.i.t.i. .t.......T.a.i.p.e.i. .t.......T.u.v.a.l.u. .t.......V.o.s.t.o.k. .t.........s.r.a.e.l. .t.......A.m.a.s.o.n.a. .t.......A.r.a.b.i.s.k. .t.......A.r.m.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):108
      Entropy (8bit):3.3591523788867974
      Encrypted:false
      SSDEEP:3:XCbVSm/tlrg/slvl/U5OlGPl/bOk/tlllPPzf:SvEEPCOodTOirf
      MD5:74B3A4A3E3DFDE9ADF9448221E5EA996
      SHA1:7277F7B77A1AFB67ED204988FB6202C0E233A5D4
      SHA-256:A15B59CAF06B44336F6E9046CECE35935500CC6F4851D0ECF624D46FA6E47C07
      SHA-512:7FD4B0F078B3A9D9DF9BE0C37796E95B7E0E73D9755B91B65260273B474FEC5EA45BB2B255F6192CD935BA968ED9AC6CEA447BD80D6FDCEE141281CF6535738A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .]....................].....n.pQ..G.F.T.......^........P........\..`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):18016
      Entropy (8bit):4.247675192624289
      Encrypted:false
      SSDEEP:192:HiiGZC3fksmmNWnajJMKFoMGrCe13e8TasnhDUM38HkH7etCQnt+dNbuLgFD:gZC3MsfPjJvoZZ13LpDUM3NatBcdN+s
      MD5:19BD6A30658D60EA527D4F961A1B12AB
      SHA1:1D47EAEC4553CA76FD8DF9461186B3A49301A544
      SHA-256:C4608EBB73A5A11413381D8C2887441A008880E4ED8C818F2B5A5E9FD8F5BCD6
      SHA-512:4E1DBFF1201D74F76839CEEE382CD3E1FE28A75D22B58694020DFC2F227B55EF69ACC8FF6383EED7B997924F2924C25225D440BFAF0C0C57C50F22C4174C968A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................n.pQ..C.a...r.o...P.a.r.y.s...W.e.n.e.n...B.e.r.l.y.n...P.r.a.a.c.h...F.a.e.r...e.r...I.r.k.o.e.t.s.k...K.h.a.r.t.o.e.m...S.j.a.n.g.h.a.i...{.0.}.-.t.i.i.d...A.c.r.e.-.t.i.i.d...H.o.v.d. .t.i.i.d...O.m.s.k.-.t.i.i.d...A.q.t.a.u.-.t.i.i.d...D.a.v.i.s. .t.i.i.d...K.r.y.s.t.e.i.l...n...L.a.n.k.a.-.t.i.i.d...S.y.o.w.a. .t.i.i.d...A.l.a.s.k.a.-.t.i.i.d...A.n.a.d.y.r.-.t.i.i.d...A.q.t...b.e.-.t.i.i.d...A.z.o.r.e.n.-.t.i.i.d...M.a.w.s.o.n. .t.i.i.d...M.e.x.i.c.o.-.s.t.a.d...M.o.s.k.o.u.-.t.i.i.d...N.i.u.e.s.e. .t.i.i.d...P.e.a.s.k.e.e.i.l...n...P...r.t.o. .V.e.l.h.o...S.a.m.a.r.a.-.t.i.i.d...S...d.-.G.e.o.r.g.i.a...T.a.i.p.e.i. .t.i.i.d...V.o.s.t.o.k. .t.i.i.d...A.m.a.z.o.n.e.-.t.i.i.d...B.e.l.a.u.s.e. .t.i.i.d...C.e.n.t.r.a.l.-.t.i.i.d...C.h.a.t.h.a.m. .t.i.i.d...C.h.u.u.k.s.e. .t.i.i.d...E.a.s.t.e.r.n.-.t.i.i.d...F.a.t.i.k.a.a.n.s.t...d...F.i.j.y.s.k.e. .t.i.i.d...M.a.c.a.u.s.e. .t.i.i.d...M.a.g.a.d.a.n.-.t.i.i.d...P.a.s.i.f.i.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):23536
      Entropy (8bit):4.669685317674906
      Encrypted:false
      SSDEEP:384:73Lu4wf1udeaneyK9CxGoEvE6SAhIBCt90ebBolEyedX:vhCt90eNPX
      MD5:1D5A90E0F1F1ACDD3BD85AF4B6F3C1EE
      SHA1:22142B21B22F9C93F640B4409FC7B803BDB3433B
      SHA-256:53ADFB0D48FD9D37CBAC5CA4D941C0810A23F2BC5D78F5EE9A3A9C801C2F048E
      SHA-512:AEF2445D8D19DF2EB87EE6919BEA149801C0723A3A94EC5BBB1D9BD0EA9A1FDE57F7151AD493E3F03D17B6D3F4C3600CD23348E76D4C7FC170B3C09468F12C7E
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ."..............Q.....".v...n.pQ..T.S.B...F...r.o...G...s.a...P.r...g...R.+.g.a...A.m.m...n...A.r...b.a...M.o.s.g.o...P.a.r.a.s...S.i.d.n.i...T.M.k.y.M...A.s.m.a.r.....B.e.i.r.b.h...K.a.r...c.+...T.e.h.r...n...U.a.l.l.a.s...B.a.g.h.d...d...C.a.i.m.e.a.n...I.n.u.u.v.i.k.....m. .A.c.r.e.....m. .A.p.i.a.....m. .C...b.a.....m. .F...d.i.....m. .G.u.a.m.....m. .H.o.v.d.....m. .N.i.u.e.....m. .O.m.s.k...A.i.n.t...o.g.a...A.n. .R...i.m.h...B.a.c.h.r.a.i.n...B.e.a.r.m...d.a...B.r...n.a.i.g.h...C.u.i.b.h...i.t...D.i.a.m.e.u.g.a...G.r.e.a.n...d.a...G.u.a.d.a.l.u.p...R.a.p.a. .N.u.i.....m. .A.q.t.a.u.....m. .C.h.u.u.k.....m. .L.a.n.c.a.....m. .P.e.a.r.......m. .T.o.n.g.a.....m. .N.a.b.h.r.u.....m. .P.a.l.a.b.h...A.n. ...i.t.h.n.e...A.n.g.u.i.l.l.i.a...D.e...r.s.a.i.d.h...G.l.a.s.b.a.i.d.h...I.e.r.u.s.a.l.a.m...M.a.i.r.t.i.n.i.c...M.a.n.g.a.r.e.v.a...N.. D.j.a.m...n.a.....m. .A.l.a.s.k.a.....m. .A.l.m.a.t.y.....m. .A.n.a.d.y.r.....m. .A.q.t.o.b.e.....m. .B.u.t...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):25988
      Entropy (8bit):4.446503866012001
      Encrypted:false
      SSDEEP:192:u5yST56w65n40o84EGUShxiQuUm/EV02oohqma0gmgZ9CAfNs4AIU9Br2OgltJd0:+yZnME/cTBs9rc+g7LP7HBOc6DZ89AA
      MD5:CCF25A2391B64C4046D7791E4E11157F
      SHA1:46074795DA2FA6F0C93DF5CC5D56CA8C90330AE3
      SHA-256:77343E3C760CF2036620E41EAD789434EB51ABBE77A2E408F5D694D04B5CF6C4
      SHA-512:69A0AC93BADF5AE1371B5E19E4E1D07FCA661B4344AD88B4C2B0D02206925725547C78F36B804E6217713387F5008BBA7F9CC8E3BFD853B3AC73C7DD902C8FD0
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................U.. ."......Y...Y...G.....".....n.pQ..A.d...n...A.m...n...B.a.c.....B.a...a...A. .P.a.z...A.l.x.e.r...C.a.b.u.l...C.h.i.t.....T.u.n.e.s...A.n.t.i.g.a...B.a.m.a.c.o...L.u.s.a.c.a...O. .A.i...n...T.h.i.m.b.u...A. .R.i.o.x.a...I.a.c.a.r.t.a...I.e.r.e.v...n...K.h.a.r.t...n...O. .C.a.i.r.o...X.a.m.a.i.c.a...A. .H.a.b.a.n.a...A.s.t.r.a.k...n...B.r.u.x.e.l.a.s...H.o.n.o.l.u.l.....M.o.g.a.d.i.x.o...S.a.n. .T.o.m.....S.a.r.a.x.e.v.o.....z.h.g.o.r.o.d...A.c.h.k.h.a.b.a.d...H.e.l.s.i.n.q.u.i.....m.s.t.e.r.d.a.n...O. .S.a.l.v.a.d.o.r...O.s. ...n.x.e.l.e.s...R.e.i.q.u.i.a.v.i.k...I.l.l.a. .d.e. .M.a.n...P.o.r.t.o. .E.s.p.a...a...X.o.h.a.n.e.s.b.u.r.g.o...E.k.a.t.e.r.i.n.b.u.r.g.o...H.o.r.a.r.i.o. ...r.a.b.e...I.l.l.a.s. .C.a.n.a.r.i.a.s...H.o.r.a.r.i.o. .d.e. .A.p.i.a...H.o.r.a.r.i.o. .d.e. .C.u.b.a...H.o.r.a.r.i.o. .d.e. .H.o.v.d...H.o.r.a.r.i.o. .d.e. .I.r...n...H.o.r.a.r.i.o. .d.e. .N.i.u.e...H.o.r.a.r.i.o. .d.e. .O.m.s.k...H.o.r.a.r.i.o. .d.e.:. .{.0.}...H.o.r.a.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):148
      Entropy (8bit):3.936161469353265
      Encrypted:false
      SSDEEP:3:XCbVSm/tlEO2oWvXclS2MYnES7OmaZ5UidlPPWFn:SvMoh0NYES7JaZ5UiS
      MD5:F6DB885DC481ADA70E79194A29215141
      SHA1:741D20DC95B0846BC02CA30D7FF386786E512A9B
      SHA-256:EF63F894FB5F80380C15A01DB1055AD64DFC46E2FFED4E67DD5BF7139500B03E
      SHA-512:CC4C87C80E6B392F70A4E20D322F5DB355AECD8E4168D30B42B7CDAD1F6FE9FC26231E691C3D472A7F6B39E5B8414993E61839CDEF003E313CA0B6339F4FC28E
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .B....................B.....n.pQ..........\.............B...3.........'.a.-.......d....P...P...P........A..`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):25968
      Entropy (8bit):4.822707727401076
      Encrypted:false
      SSDEEP:384:qq8mZge/E56J9iDlQzdweTCeEgfVTNeZsBX/0hNcV17baYBO+bgnjiuDwax:wSq65dw+deGF0PcV1nHjbgjiaZx
      MD5:35AC0062FF005B40EC596263CA6F3C5F
      SHA1:B6B32C7416AD6AEFD47C46C5B478DA9D6E759817
      SHA-256:91F3C3ADF2D70C618F06ECD7E34F415BA6CF657B2A8F4DB9163AFD4B5D73D2A8
      SHA-512:F7C841B696F543376CF872C8DC45E0CF090D5D678EC61B5DCB45B97257246C5577AB74F8DED1CFE6B4418FCBA33A2ABA30CE42570DBE046E610A5714A1DD402D
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................P.. ..!.....T...T...O......!....n.pQ....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):22940
      Entropy (8bit):4.7178692801383635
      Encrypted:false
      SSDEEP:384:1WCR2KVuwG9inxiEhkZgxP3smTWOXSm6iMJciPs80AQ5XwzgodBo4ngrBpJ:dQvbUIPv0BZEx2pJ
      MD5:B42DB2CAFAF88E78FF00DF60C75942E2
      SHA1:BC3D36A18CABBF2D64138DD6810D58EF84CF35BD
      SHA-256:A0B6E0260665C7896725EAC8DB6A920348BA25257A7875EF7B21BD8DF97A0169
      SHA-512:E63EB27D0C1A521A008842572F78E16FFB25B7AAAD1093885CC1A703EECA6DF2CB7776029EA47593FEE7C36F071E920C3675ED6355B58149B605A2D6585133B3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................[.. ."......_..._...Q.....".....n.pQ..B...c.s...G...z.a...R...m.a...T.r.u.k.....d.e.n...A.l.g...r...A.t.h...n...C.s.i.t.a...K.a.i.r.....M.a.k.a.....M...l.t.a...O.m.s.z.k...P.r...g.a...S.z...u.l...T.o.k.i.....V.a.r.s.....B.i.s.k.e.k...F.e.r...e.r...F.i.d.z.s.i...K.a.r.t...m...K.o.m.o.r.....K.u.v.a.i.t...M.a.l.a.b.....M.i.n.s.z.k...P...r.i.z.s...S.z...f.i.a...T.o.m.s.z.k...T.u.n.i.s.z...U.n.g.v...r...Z...g.r...b...A.s.g.a.b.a.t...B.e.l.g.r...d...E.l.-.A.j...n...J.e.r.e.v...n...K.a.r.a.c.s.i...K.u.c.s.e.n.g...M.a.g.a.d...n...M.o.s.z.k.v.a...P.h.e.n.j.a.n...P.o.z.s.o.n.y...S.a.n.g.h.a.j...S.z.a.m.a.r.a...T.a.s.k.e.n.t...V.o.s.z.t.o.k...{.0.}. .i.d.Q...A.c.r.e. .i.d.Q...B.r...s.s.z.e.l...D.z.s.i.b.u.t.i...I.r.k.u.t.s.z.k...J.a.k.u.t.s.z.k...S.z.a.h.a.l.i.n...S.z.a.r.a.t.o.v...T.b.i.l.i.s.z.i...a.r.a.b. .i.d.Q...A.s.z.t.r.a.h...n...I.s.z.t.a.n.b.u.l...K.a.m.c.s.a.t.k.a...K.o.s.z.t.a.n.a.j...L.i.s.s.z.a.b.o.n...S.z.a.r.a.j.e.v.....S.z.i.n.g.a.p...r...U.l...n.b.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):31400
      Entropy (8bit):4.623794531707291
      Encrypted:false
      SSDEEP:384:GGVhrTLIra5Q7DgXJrkk77wxJtmG1pSk3WQzY1BOyRK:9hrXImWIZkk77wxJtmGLRzYPhK
      MD5:98B689EF955FB96BD71EB35CB84A72D8
      SHA1:6DA982F170608ED44F894688C0E56DE9DCF4ED08
      SHA-256:EFAE5C8F286397DA2E8E6760D25BC9E3BD803E0C078D7B954D611A11F330AEB3
      SHA-512:C6EB126E21516486D45132A612CAE845294A8208C068A499D942C7521E1D6402A44FD87ABD01B5398955E6AC0AA3517BD846555721781D31A46B73907CFA54E5
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .lG.............D.....lG7...n.pQ..?.k.....D.a.g...F.x.t...1.d.e.v...1.z.k.a...1.....a...3.a.f.a...4.k.l.k...<.k.t.a...<.x.t.e...@.x.~.d...@.|.x.t...I.k...a...J.e...i...L.k.c.a...T.e...k...U.t.}.o...U.}.l.x...V.k.{.k...1.i.e.v.....1.l.j.k.....1.t.t.a.v...2.a.k.u.a...2.a.v.c.k...2.a...x.....2.e.l.e.t...2.e.l.k.f...2.x.u.}.e...3.x...a.t...4.a...a.....4.a.....a...5.....a.v...7...a...e...9.a.k.i.k...<.a.c.x.}...?.a.u.e.v...?.a...a.....?.k...x.~...D.a.l.i.a...D.a.o.a.x...D.a.u.x.i...D.k.v.}.o...F.k.x...e...I.a.c.x.}...J...a.p.a...K.e...}.k...K.x...b.a...K.x...v.x...M.a.l...a...M.e.x...l...M.k...o.a...M.u.x.~.a...M.x...k.a...O.x.o.k.x...O.x.t.}.o...O.x...l.e...O...x.l.l...S.a...k.f...T.e.u.}.k...T.k.w.v.....1.b.k.{.a.v...1.l.t.a.i.k...1.o...a.x.....1.o...x.b.e...1.v.a.d.k.....1.}.t.e...a...1...x...b.a...2.a.r.d.a.d...2.a.t.a.o.x...2.e.|.l.k.v...2.k.w...e.o...2.k.}.a.x.....2.x.c.x...a...3.a.u.a.v.a...3.e...v.}.k...4.a...~.k.v...4.e.u.~.k.}...4.e.v.~.e.....4.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):17048
      Entropy (8bit):4.9398153997186025
      Encrypted:false
      SSDEEP:192:cTznbpp4Rp8wRGP1+mc7bElA4A0C7eVaCMfe7NWUFiPvHuj7cXz66SoolrM7n3yN:cU8/N+FEu4iU5MfSWUiOj7celooq7CN
      MD5:37DECE8933C2A4EC8EB048DECFE7EA75
      SHA1:638B5B6C30A47BB72A2DAEF2047B232F1B5BB33E
      SHA-256:C02E308964060F1DB7A635CAEED8E2638E20C7F986DED2F8119E2A25587ACFE7
      SHA-512:1816143FA7A00A6CCB615B88FB0CF885393FCA8DAD2AE7F2D28FA2131BCB1256D8076074674EFA81D744125D987198953BB5E26887BB23AC71A3BE5448F9FD87
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .S..............P.....S.!...n.pQ..W.I.B...W.I.T...W.I.T.A...W.i.n.a...A.l.j.i.r...W.a.r.s.a.w.a...K.i.s.h.i.n.e.v...P.u.l.a.u. .M.a.n...W.a.k.t.u. .A.c.r.e...W.a.k.t.u. .C.i.l.e...W.a.k.t.u. .G.u.a.m...W.a.k.t.u. .K.u.b.a...W.a.k.t.u. .A.q.t.a.u...W.a.k.t.u. .C.a.s.e.y...W.a.k.t.u. .I.n.d.i.a...W.a.k.t.u. .L.a.n.k.a...W.a.k.t.u. .A.l.m.a.t.y...W.a.k.t.u. .A.q.t.o.b.e...W.a.k.t.u. .B.r.a.s.i.l...W.a.k.t.u. .J.e.p.a.n.g...W.a.k.t.u. .T.e.n.g.a.h...T.i.d.a.k. .D.i.k.e.n.a.l...W.a.k.t.u. .E.k.u.a.d.o.r...W.a.k.t.u. .M.a.l.a.d.e.w.a...W.a.k.t.u. .K.o.l.o.m.b.i.a...W.a.k.t.u. .T.i.o.n.g.k.o.k...W.a.k.t.u. .K.e.p... .C.o.o.k...W.a.k.t.u. .K.e.p... .L.i.n.e...W.a.k.t.u. .K.i.r.g.h.i.z.i.a...W.a.k.t.u. .Q.y.z.y.l.o.r.d.a...W.a.k.t.u. .A.f.g.a.n.i.s.t.a.n...W.a.k.t.u. .P.e.g.u.n.u.n.g.a.n...W.a.k.t.u. .E.r.o.p.a. .B.a.r.a.t...W.a.k.t.u. .E.r.o.p.a. .T.i.m.u.r...W.a.k.t.u. .P.u.l.a.u. .N.a.t.a.l...W.a.k.t.u. .S.t.a.n.d.a.r. .{.0.}...W.a.k.t.u. .T.i.m.o.r. .L.e.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):88
      Entropy (8bit):2.7376269297851303
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlKelBjlgljl/qlkBphlXW:SBtkJTl44iBpDW
      MD5:6A062B4BD17710E30170823F502B0B5E
      SHA1:26E68B38204EB89AB102DFDADEFBE3CAF9614D3F
      SHA-256:461638F44C429A57DBABB202B97B8310B8E856D3A3DB69395622121D9D0AD833
      SHA-512:BA8928D297DCDB049BDE94AFED3FEB1E924C745B5A6362D044F104F5A6D62EC18E32AFAF428D656A850396F25947599AC3ED2E3F2EE4FD76CF6B700A75BEBF9A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................n.pQ..i.d._.I.D......$..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):23800
      Entropy (8bit):4.5080804837934325
      Encrypted:false
      SSDEEP:384:b9En6TDax0SRtvSfYLISCleB1w5fjzBOHgYfDE:5E6ixrSALulecb1I4
      MD5:1227C3201D8D853109024248151D377F
      SHA1:6FFEC15E72745296917D3EEE07938F9ADAC16B54
      SHA-256:C4B9C2116340A9D7E598758C33317F02D00CF7B1373E426063D82A263FAA6DBB
      SHA-512:F529605AC8A1B673BCF3FEFB3D7116F05E006372420819DA7A9E8CA39FD9115B02DD3A5EA7B43237456FB9353A820A01370CBF32F2B41B301D82143E94AD3C21
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................2.. ."......6...6...H.....".....n.pQ..A.t.e.n.e...G.i.u.b.a...A.l.g.e.r.i...G.i.b.u.t.i...N.a.t.a.l.e...P.a.r.i.g.i...T.u.n.i.s.i...Z.u.r.i.g.o...A.n.a.d.y.r.. ..B.e.r.l.i.n.o...C.a.i.e.n.n.a...C.a.n.a.r.i.e...D.u.b.l.i.n.o...E.l. .A.y.u.n...L.u.b.i.a.n.a...L.. A.v.a.n.a...O.r.a. .{.0.}...G.i.a.c.a.r.t.a...G.i.a.m.a.i.c.a...I.l. .C.a.i.r.o...V.a.r.s.a.v.i.a...Z.a.g.a.b.r.i.a...F.a.m.a.g.o.s.t.a...G.u.a.d.a.l.u.p.a...O.r.a. .a.r.a.b.a...P.o.r.t.o.r.i.c.o...S.a.n. .P.a.o.l.o...S.t.o.c.c.o.l.m.a...C.o.p.e.n.a.g.h.e.n...G.i.b.i.l.t.e.r.r.a...S.a.n.t.. E.l.e.n.a...G.e.r.u.s.a.l.e.m.m.e...L.a. .R.i.u.n.i.o.n.e...L.u.s.s.e.m.b.u.r.g.o...O.r.a. .c.o.r.e.a.n.a...O.r.a. .d.i. .A.p.i.a...O.r.a. .d.i. .C.u.b.a...O.r.a. .d.i. .H.o.v.d...O.r.a. .d.i. .N.i.u.e...O.r.a. .d.i. .O.m.s.k...S.i.n.f.e.r.o.p.o.l.i...I.s.o.l.a. .d.i. .M.a.n...O.r.a. .d.e.l. .C.i.l.e...O.r.a. .d.e.l. .P.e.r.....O.r.a. .d.i. .D.a.v.i.s...O.r.a. .d.i. .M.o.s.c.a...O.r.a. .d.i. .N.a.u.r.u...O.r.a.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.915924628458436
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMP86E7l/Jclspmn:Svx6g/Oapm
      MD5:C89AB79572AEE0973AA783D281FCDE07
      SHA1:11E8372F90FBCAAD6BB059FEEFEF65BB0430F2E6
      SHA-256:AE0A466EE3A80283293DB356A68145A8F511876CFF123DB28AAD481B87DAB44C
      SHA-512:7CE0BDC3BA1A5E9387D62DA873C107273FB4FE38D0056C787199EB2A0BCEE30B0B0BF05C5D05FDF4A2250888FE3AE54BFE33AD39C14460A38EC66DB09A76DFC0
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................n.pQ.....$..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):19212
      Entropy (8bit):5.735763854057635
      Encrypted:false
      SSDEEP:384:V+F49oB3jHNJ5VpLBS6jNBMxtdSzLFiZ3QV0tyaMShZf9BoAeotcXB:2OoB3jHNJ5VpLfBBMxtdSHFiZ3QVbanG
      MD5:5FDC594DEDC9EA7DA83F9BEF72CE054D
      SHA1:319D830328309FDF87FD50D90A080104A547C5A3
      SHA-256:C0E56C7B8C134BDF2149906569BD443DD8EB3635FD238510E25EBD45CE5E3937
      SHA-512:5C5FA05E4A92EF3D40D0D9457075C36BCB12C9E896D2F2DBF3C2B5AE658BB4F73A287B26DA4E64A98D077CAAB5737D2B072469D692C59DC21EDEB2FB0C332401
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .lG.............Q.....lG=...n.pQ...0.0...0.0...0.0...0.0...0.0...0.0...0.0..s^.X..qg.N..../n..J.D.T...J.S.T....0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.\...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):2.923728528591944
      Encrypted:false
      SSDEEP:3:XCbVTtkJtldelFal9lDOldMJlnbv/1:SBtkJUlYC0JlnL/1
      MD5:4DF3E79562D7D1384D3245D2C6E52DC8
      SHA1:BF6B6612C1138276BC1D46E73419B7236D515633
      SHA-256:E25DB564D313414F46DE6EBD4D57C19C2D55992E69BB47FF91EE633E1769C2FA
      SHA-512:75744265C5EC9B48241FAA27A7F4C0EC54B8CCE70BBDD5B04AFAC90E41F2FEB27D1FF082137496C250E5BD5574A120A0D1B7637CCABB5142F205C9467E689C58
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ............................n.pQ..j.a.p.a.n.e.s.e......%......~%...P
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.777864799965059
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
      MD5:264C63861CEEF0E1A4CC72D014AA43FC
      SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
      SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
      SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):25556
      Entropy (8bit):4.686397811770793
      Encrypted:false
      SSDEEP:768:uQI6whMQuULn4D4p0io0t7vClnadncsIU7V5E4kHETCVtv4TCgyPL9rM6Dwi6CUK:uQILMQuULn4D4pto0t7vClnadncxU7Vw
      MD5:F6F9E13B01FBACACB4C6548B5D5A777B
      SHA1:6D16A044A8D6A8BA0ECEA7C1A76F4FB2601FAA40
      SHA-256:CCBC4A94EA7849D2FA6794E5766E7A35CE83BF35FC2AC461E71345B12BE6DED6
      SHA-512:1D7A02205EB28FA9A3AC7521717FEE422D8571D269745543A5DDD4637DBF0FA2A31DD25CBE0B25AB7C1EB6BD80537E10F9B65A58B0315BF96A37A0021C017FAC
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .Xf...................Xf....n.pQ..3.H.D...F.P.H...y.1.....-.H.H...../.P.D.....1.P...'...:.'.2.'...A. .1.H...A.P.,.....D.P.E.'...E...H.y...F.H...3.......V.H...".~.P...'...'. ...1.'...'.H.1.N.D...'.N.E.'.F...'.P./.N.....'.....U.F...(. .D. .E...(.'.B.H.W...(.E.'...H...(.H...P.3...(...1.O.*...,.H.W.F.....-.H.'.F.'...-...(.r.y.../.N...'.1.../.O.(.N.....1.P...'./...3.P...F.....3...H.H.'...3.....N.F...B.'.(.O.D...B.N.*.N.1...E.'.(...F...E.'.3.N.F...E.'.D.y.'...E.'.........E.B.'.$.....E.N.F.H.3...E.P.F.3.....F.3.'.$.....F.H.E.......H.'./.O.2...H...D.P.3...H...H.......y. .D.P.F...y.H.....H...y.P.1...F...~.'.E.N.1...~.N.D.'.H...~.T.1.*.....~...1.P.3.......'...'.......H.P.3.....'.3.N.F.....N...1.H.....N.....F.....O.H...*.......E.N.F.......H.3....."...D...F.....'.N.B.y.H.(...(. .D...V.2...(.1.3.(...F...(.1.3.U.D.3...(.H...H.y.'...(.N...P...'...(.P.3.'.$.....(.P.4.........(.P.D.P.3.....(.T.1.D.P.F...*. ...1.'.F...*.1.~.H.D.....*.N...P.*.....*.N...~.......,.O.,.H.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.777864799965059
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
      MD5:264C63861CEEF0E1A4CC72D014AA43FC
      SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
      SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
      SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):23496
      Entropy (8bit):4.892508392504618
      Encrypted:false
      SSDEEP:384:ZFdee0sLkAK/sCXakRAeHLuC0CowZbnjXBOkgYfahWsQ:rdee0sLkR/tRxo2nNH67Q
      MD5:348B448B9DF6BDCB75B69B7368E7C8B4
      SHA1:B724E39E60A131647EDCBC5E0A7114C37DAD1A3D
      SHA-256:E532525F93D83F54129C545F37458B4D2F96753CDDC40F913DA714F46619FE4E
      SHA-512:ECAC208E93A503BF7DB5912B2E081CF921FB2DF277564DA288B955CC86704276FB31918E74BE56C29E79B44A92D5CB6D63C76488FE825E80D0A83BD9461E76B5
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .G..............D.....G.....n.p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
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):16844
      Entropy (8bit):4.396706133608963
      Encrypted:false
      SSDEEP:384:TRiTvqMTJufO2ASV26dkaWe8iWhcoDrcYeGOSUbFC99JBI8lmBlysTSWRDDudWoA:TbHotfYoro4siNjtE6XPi4TptKN/nRh
      MD5:B5BC7162FF7B709924872AEABA47BBD8
      SHA1:8051BCE37F7CC1794FB14543E1A4598A1FF8DD88
      SHA-256:4307A72ECB770C01AC632278E9C62F007955F6732B6E526354630CDE84680251
      SHA-512:33CD96AE0B8405EEE28B101B466CE7928474C2B0EDAD991EC42BB5737420F18212088C3D420BEDFA36F2EB559EED415BE432FAAF51BF3C48AD49A0B17BD1ACD9
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................g.. ........k...k...............n.pQ..R.o.u.m...Z...r.e.c.h...K.o.m.o.r.e.n...B.r...i.s.s.e.l...{.0.}. .Z...i.t...A.c.r.e.-.Z...i.t...G.o.l.f.-.Z...i.t...G.u.a.m.-.Z...i.t...H.o.v.d.-.Z...i.t...N.i.u.e.-.Z...i.t...O.m.s.k.-.Z...i.t...O.n.b.e.k.a.n.n.t...C.h.u.u.k.-.Z...i.t...D.a.v.i.s.-.Z...i.t...L...t.z.e.b.u.e.r.g...N.a.u.r.u.-.Z...i.t...P.a.l.a.u.-.Z...i.t...S.a.m.o.a.-.Z...i.t...S.y.o.w.a.-.Z...i.t...A.l.a.s.k.a.-.Z...i.t...A.l.m.a.t.y.-.Z...i.t...A.n.a.d.y.r.-.Z...i.t...A.z.o.r.e.n.-.Z...i.t...B.h.u.t.a.n.-.Z...i.t...B.r.u.n.e.i.-.Z...i.t...G.u.y.a.n.a.-.Z...i.t...K.o.s.r.a.e.-.Z...i.t...M.a.w.s.o.n.-.Z...i.t...M.e.x.i.k.o.-.S.t.a.d...P.o.n.a.p.e.-.Z...i.t...S.a.m.a.r.a.-.Z...i.t...T.a.h.i.t.i.-.Z...i.t...T.a.i.p.e.i.-.Z...i.t...T.u.v.a.l.u.-.Z...i.t...W.o.s.t.o.k.-.Z...i.t...C.h.a.t.h.a.m.-.Z...i.t...F.i.d.s.c.h.i.-.Z...i.t...G.a.m.b.i.e.r.-.Z...i.t...I.n.d.e.s.c.h. .Z...i.t...I.r.k.u.t.s.k.-.Z...i.t...J.a.k.u.t.s.k.-.Z...i.t...M.a.g.a.d.a.n.-.Z...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.804180589438744
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMZk66E7lillcls/jAn:SvEt6gika/8
      MD5:70ADA25FCCA87A398A07454F1CCF8AF9
      SHA1:BF6A6488EA65B58FEE6A38A4FAD9E8736103D80E
      SHA-256:CEC9F7B0018C18423B65891DCCB8012E61798D06482F3CBE24B40F3A9EE73A44
      SHA-512:5B71FA265E19ADF736DE9854CD69B07D7F34FE51D0195DBE0375808459235E37A97A9221D3E66AE2A9E8EE09D8D436FFF97CBAB66EBC5BFB11D5174901076D42
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P..%....................%....n.pQ.......%
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):264
      Entropy (8bit):4.194496591843038
      Encrypted:false
      SSDEEP:6:SvCOPlhmK+Iwj3gfY/2j33Dwj3+b6yNpwwj/10vT:+PlU0igfY/2jjtb/Nbq
      MD5:2D518042985AD7C3F3516076B425818F
      SHA1:09624BC1C9FB47F07CB0BCBE9419C0E8F4144755
      SHA-256:D8EBB59A0208DA7E80AB2FDACBD9B99B9AE7048B6AFEEC8183B8FFF17240AB11
      SHA-512:8744DA7AFA3B5755A4E47F2C5996880ADBDCE27C627FEC9D0100ACE03F5C597FABE88DFA7FACFFA4A72A51F77B0D09296622682DE566982B0BB56982DBA04EA5
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................6.. .S......:...:.........S.1...n.pQ..F.'./...'.1.....'.[.*. .E...F.,.'.[.......1.H.Y.4.F.'..... .F.&.G.'./.'.1. .1.H.Y.2.....'.[.*. .E...F.,.'.[..... .&.3.*.'.[.F./.'.[.1./.....#.T.......5.i.[..........$F..PI..P...`........R..`1..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.777864799965059
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
      MD5:264C63861CEEF0E1A4CC72D014AA43FC
      SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
      SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
      SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.777864799965059
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
      MD5:264C63861CEEF0E1A4CC72D014AA43FC
      SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
      SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
      SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):28080
      Entropy (8bit):4.398950415400721
      Encrypted:false
      SSDEEP:384:YvaSQDkn/IOAnEcBFrmtx0T/qBE92t9qgGasgZv6Zwota84NHc+Crw8T2ipVaSeo:uxQDfMGasVwoteK+NiKVLX8ZT
      MD5:F1E7CF7CD6190E9A5D1A5F3D2A7CCD47
      SHA1:71F397452FFC708639C9B2A594A377EB395EB96F
      SHA-256:745CE455D67D8A8E7F121E672238D3827EE2F3D8A9EE2C27B549B82E3F452BEA
      SHA-512:F8A54E3D0ADB504F2EA722BF56EE623AC8805FCF90AB7EF1E54908F9795B1D9FE6CDEEA811651B3764403A1367817F3D52F915D030C4182C92B72611CD449FD1
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................`.. ..v.....d...d...G......v....n.pQ..M.a.e...K.a.r.i...N.a.s.o...N.o.m.a...N.k.k.a...R.+.g.a...V.+.n.e.....k.k.a...`.o.v.a...A.d.a.k.a...A.d.e.n.a...A.j.k.n.a...D.~.u.n.o...D.~.k.b.a...G.u.a.m.a...H.o.v.d.a...J.u.k.l.a...K.a.i.r.a...K.e.i.s.i...O.m.s.k.a...O.r.a.l.a...P.r...g.a...P...r.t.a...S.e.u.l.a...V.i.<.F.a...A.k.t.e.b.e...A.l.~.+.r.a...A.m.m...n.a...A.t...n.a.s...B.e.l.e.n.a...B.e.l.i.z.a...B.i.s.a.v.a...C.+.r.i.h.e...D.a.k.a.r.a...G.a.j...n.a...H.u.h.u.j.a...K.a.b.u.l.a...K.a.r.....i...K.a.t.a.r.a...K.i.j.e.v.a...K.i.r.o.v.a...K.u...i.n.a...L.a.g.o.s.a...L.a.p.a.s.a...M.a.j.o.t.a...M.a.p.u.t.u...M.e.h.i.k.o...M.i.n.s.k.a...M.o.s.o.n.a...N.o.r.o.F.a...P.a.r.+.z.e...R.i.j...d.a...T.a.i.b.e.i...T.i.r...n.a...T.o.k.i.j.a...T.o.m.s.k.a...T.r.o.l.l.a...T.u.n.i.s.a...U.a.u.a.j.a...V.a.d.u.c.a...V.o.l.i.s.a.....e.t.e.m.a.....i.k...g.a.....i.v.a.v.a...A.n.a.d.i.r.a...A.n.g.i.l.j.a...B.a.g.d...d.e...B.e.i.r.k.t.a...B.e.r.l.+.n.e...B.i.a.k.e.k.a...B.r.i.s.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.777864799965059
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
      MD5:264C63861CEEF0E1A4CC72D014AA43FC
      SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
      SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
      SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.777864799965059
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
      MD5:264C63861CEEF0E1A4CC72D014AA43FC
      SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
      SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
      SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.777864799965059
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
      MD5:264C63861CEEF0E1A4CC72D014AA43FC
      SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
      SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
      SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.777864799965059
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
      MD5:264C63861CEEF0E1A4CC72D014AA43FC
      SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
      SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
      SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):15692
      Entropy (8bit):5.107136461073751
      Encrypted:false
      SSDEEP:192:9jZTE2gdY0qewORxHEAxmLAckJVniL3Ab8JCe7qq+E4J6BolRnbPrM2+4xt:hZTE2GjhxH1mLAJJdJg17j4YBonjYCt
      MD5:FB23BA30730A5971C264F5E05FABAA72
      SHA1:BFEC5F4476EB55EA95C96A2542E36A8B596E8613
      SHA-256:631FA2E1E597AFCF4962EEC5B424EBEF12CE681C1B5B1D3BF879C1F6475F0996
      SHA-512:2AAA89B36EE96833D57AE50FFDB288F444A1EF0AB2F325F8068137CB37DC8BF58BB0613EC13A4E5BB9973AD2D5978D7491FF5F292CACEF37FB79EB4BC1F9A9DE
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................G.. ........K...K...R...........n.pQ..T.h.i.m.p.u...T.s.j.i.t.a...A.s.o.r.e.n.e...A.c.r.e.-.t.i.d...F...r...y.e.n.e...G.u.a.m.-.t.i.d...J.a.j.a.p.u.r.a...K.o.m.o.r.e.n.e...C.a.s.e.y.-.t.i.d...L.a.n.k.a.-.t.i.d...M.a.c.a.u.-.t.i.d...M.a.l.d.i.v.e.n.e...u.k.j.e.n.t. .b.y...C.a.y.m.a.n...y.e.n.e...K.a.n.a.r.i...y.e.n.e...c.u.b.a.n.s.k. .t.i.d...A.c.r.e. .n.o.r.m.a.l.t.i.d...A.c.r.e. .s.o.m.m.e.r.t.i.d...i.r.s.k. .s.o.m.m.e.r.t.i.d...s.o.m.m.e.r.t.i.d. .. .{.0.}...A.q.t.a.u.,. .s.o.m.m.e.r.t.i.d...M.a.c.a.u.,. .s.o.m.m.e.r.t.i.d...i.r.a.n.s.k. .s.o.m.m.e.r.t.i.d...n.e.w.z.e.a.l.a.n.d.s.k. .t.i.d.....s.t.a.f.r.i.k.a.n.s.k. .t.i.d.....s.t.a.u.s.t.r.a.l.s.k. .t.i.d...A.l.m.a.t.y.,. .s.o.m.m.e.r.t.i.d...A.q.t.o.b.e.,. .s.o.m.m.e.r.t.i.d...a.r.a.b.i.s.k. .s.o.m.m.e.r.t.i.d...a.r.m.e.n.s.k. .s.o.m.m.e.r.t.i.d...a.s.o.r.i.s.k. .s.o.m.m.e.r.t.i.d...b.r.i.t.i.s.k. .s.o.m.m.e.r.t.i.d...c.u.b.a.n.s.k. .n.o.r.m.a.l.t.i.d...c.u.b.a.n.s.k. .s.o.m.m.e.r.t.i.d...j.a.p.a.n.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.500123730064915
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/lcls8l:SBtkJ1li6gml/qa0
      MD5:4F880C5D6BDDF339F850A87F0DC7BE2D
      SHA1:90F0E7728BF802B7E962DB8434D1C562705F0613
      SHA-256:B175F94ED5CE958A83AAB63677471AA4C0B2EA04FABA7C42681A5AEAEF8E5530
      SHA-512:C9FC5B2F71F055D42C8501AAAAF6E6B6C290A6018CF1CFCB993735A01868850D0B3C5EAAD3A611C80D456AF9319DCF1F20CE4A8A0DB54736BA8C8D7089B54144
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................n.pQ.....$..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.777864799965059
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
      MD5:264C63861CEEF0E1A4CC72D014AA43FC
      SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
      SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
      SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):24584
      Entropy (8bit):4.855226136028372
      Encrypted:false
      SSDEEP:384:mea/zju+yZRw+F23UXN9OhTq0G5CBO76HnT:m//zju+yZRJIUXN9sqzIA6HT
      MD5:3963DA338F2B60544A36292CA418DF3D
      SHA1:80F35F5AABC530BEF03F43094B8CBC37AFF1C481
      SHA-256:BD61D131C724CC3205EF75F221F7949CD6D14D469EFA90F3C5C958676398D222
      SHA-512:37735E781842F1E6AC04A3170B8AB11DA4B2AFD09585DBBD455D346C530B753EE5A5344B2581FDB9ABAFD6385ECA6A1C2F273326157A4E771C3A298CA11140ED
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .7..............D.....7.....n.pQ....0.2.....?.-.....B.....!.8.(...(.B.....2.K.....5.G.......!.>.......!.G.(.....$.>.0.....G...G.....>...>.....?.$.>...$.0.5.>...(.?.......*.2.>.....+.?...@...,.K...........>.....2.?...>...8.?.......8.?...2...9.............M.0.>.....*.?./.>.....8.M...0.....+.>.$.G.....>...0.K.....>.,.A.2.....?.0.K.-.....A...?.......A.5.G.$.....A.5.>.......>.%.>.......A...A.......A.(.?.......A.0.?.......A.(.?.8...!.>...>.0...!.G.-.?.8...$.>...*.G...&.A.,.9.@...(.>...0.A...(.>./...G...*.G.0.?.8...+.>.0.K.....,.0.(.L.2...,.?.8.>.....,.G.2.?.....,.H.........-.>.!.A.....-.?./.(.>.....(.?.2.>.....8.M...K.....>...8.(...0.?./.>.&...2.#.M.!.(...5.>.0.8.....8.>...*.(...9.-.>.(.>...9.K.-.M.!.......?.0.>.........M...>.........M...K.,.......K.0.M.8.......M...>.(.....(.A.-.?...........K.0.&.....6.A...........!.G.2.G.!.....%.G.(.M.8.....?...>.2.@.....M./.A.0.@.....A... .,.G.......>.....>.....?.0.>.(.G.....K...?./.K...!.,.M.2.?.(...!.G.(.M.-.0...!.K...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):3.2808845065320833
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQl8tSRJcls076snlPPQu/F:Sv88cROaaF
      MD5:57D73A36C1932BCC70E095139AA27CFC
      SHA1:B1316520907CDEFBF5E2E151B759264681C555D8
      SHA-256:3DBB21BB0B9320A9ED2CC73EC1F94F96F6B39A5577F054538A21A981D1FB5F15
      SHA-512:6EE871A38C28520B3D0BA288012D0265B16A9E9B40A68F463E117562EAEE348DF04F204A869D6E38930AF57193F5F07E7F035982FA7B8013E80D0E5943A06CC2
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .o!...................o!....n.pQ......>........P........n!.`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):22216
      Entropy (8bit):4.6739069186607916
      Encrypted:false
      SSDEEP:192:b4G0SJVvFTxvKlSHtCCeQWFmXJ/fWhHUdZmK3B7gcX7sVbBolYS6qrEAS2XJ:btLvFFkSNcQImZnkHGl5gcLsVbBoIOdJ
      MD5:B04F1EB4EB42510211A541F8A719D410
      SHA1:7B45C706D51B261825AF4475810A733A74FDBC6F
      SHA-256:F4C5A3853648DD603D129293FA77A527F4CAE7D47F9259DADAA10C122FA18996
      SHA-512:30305B3D15409A41B0A7605CD59750C5675CE48127C6C08BBF69C7A718D968BE995D691FEEF06BD52BD6C263F8557537EF35CC802E876D91E991006156B97DD3
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ."..............L.....".3...n.pQ..C.a...r.o...P.r.a.a.g...W.e.n.e.n...A.t.1.r.a.w...P.a.r.i.j.s...B.e.r.l.i.j.n...F.a.e.r...e.r...I.r.k.o.e.t.s.k...K.h.a.r.t.o.e.m...S.j.a.n.g.h.a.i...{.0.}.-.t.i.j.d...A.c.r.e.-.t.i.j.d...A.p.i.a.-.t.i.j.d...D.o.e.s.j.a.n.b.e...H.o.v.d.-.t.i.j.d...O.m.s.k.-.t.i.j.d...A.q.t.a.u.-.t.i.j.d...C.a.s.e.y. .t.i.j.d...D.a.v.i.s.-.t.i.j.d...L.a.n.k.a.-.t.i.j.d...P.a.a.s.e.i.l.a.n.d...S.y.o.w.a.-.t.i.j.d...A.l.a.s.k.a.-.t.i.j.d...A.n.a.d.y.r.-.t.i.j.d...A.q.t...b.e.-.t.i.j.d...A.z.o.r.e.n.-.t.i.j.d...M.a.w.s.o.n.-.t.i.j.d...M.e.x.i.c.o.-.S.t.a.d...M.o.s.k.o.u.-.t.i.j.d...N.i.u.e.s.e. .t.i.j.d...S.a.m.a.r.a.-.t.i.j.d...T.a.i.p.e.i.-.t.i.j.d...V.o.s.t.o.k.-.t.i.j.d...A.m.a.z.o.n.e.-.t.i.j.d...B.e.l.a.u.s.e. .t.i.j.d...C.e.n.t.r.a.l.-.t.i.j.d...C.h.a.t.h.a.m.-.t.i.j.d...C.h.i.n.e.s.e. .t.i.j.d...C.h.u.u.k.s.e. .t.i.j.d...E.a.s.t.e.r.n.-.t.i.j.d...I.n.d.i.a.s.e. .t.i.j.d...I.r.a.a.n.s.e. .t.i.j.d...J.a.p.a.n.s.e. .t.i.j.d...M.a.c.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):108
      Entropy (8bit):3.3035968233312416
      Encrypted:false
      SSDEEP:3:XCbVSm/tlZeslvl/46lCbl/VEwg/1flPPQoNn:SvDPA6EBtTg/Xn
      MD5:6DCCF108C3C097C66553C7A5E07C723B
      SHA1:EC0E0B09ABADE270E9B1E8785084FC60F6AEA19C
      SHA-256:C144CCA804224B9DC92C0A89431F76EA766634E8EA822A5E9DCD76D1834F8492
      SHA-512:41FB6CFCEE21F0E3EE62E2911F90C1981988ECA2BE9A8E91F9236635224ABB36A77CCF98B627F0C85D1B3DF481C5BB0FDAC4BB530FF33022C83D910F973B9EC8
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .o!...................o!....n.pQ..S.R.T.......p!..E#...P........n!.`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.500123730064915
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/lcls8l:SBtkJ1li6gml/qa0
      MD5:4F880C5D6BDDF339F850A87F0DC7BE2D
      SHA1:90F0E7728BF802B7E962DB8434D1C562705F0613
      SHA-256:B175F94ED5CE958A83AAB63677471AA4C0B2EA04FABA7C42681A5AEAEF8E5530
      SHA-512:C9FC5B2F71F055D42C8501AAAAF6E6B6C290A6018CF1CFCB993735A01868850D0B3C5EAAD3A611C80D456AF9319DCF1F20CE4A8A0DB54736BA8C8D7089B54144
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................n.pQ.....$..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):2.981496329528674
      Encrypted:false
      SSDEEP:3:XCbVSm/tlM8l3qllMBE:SvdqsBE
      MD5:F296D3FCC79936E98F21165E870D5D2C
      SHA1:E80750375415F9D975F3B372A3926EDEE0171024
      SHA-256:C340243D5A2B7FD6DA05EBB7113DC4A516FF4F02CBAA48CAF1E7EF5ACA0BAAFA
      SHA-512:AF8D4F6D49D618CAB159DDA4E545B94CDBBE8E7E8C9C87B4CEFD9A7D8103B7F0634A06B02DBA23378A8DBC43B431E8509CE42C6FBAD15D21A0CEB639D25F3D9A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.o!...................o!....n.pQ....^%....n!
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):2.981496329528674
      Encrypted:false
      SSDEEP:3:XCbVSm/tlM8l3qllMBE:SvdqsBE
      MD5:F296D3FCC79936E98F21165E870D5D2C
      SHA1:E80750375415F9D975F3B372A3926EDEE0171024
      SHA-256:C340243D5A2B7FD6DA05EBB7113DC4A516FF4F02CBAA48CAF1E7EF5ACA0BAAFA
      SHA-512:AF8D4F6D49D618CAB159DDA4E545B94CDBBE8E7E8C9C87B4CEFD9A7D8103B7F0634A06B02DBA23378A8DBC43B431E8509CE42C6FBAD15D21A0CEB639D25F3D9A
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.o!...................o!....n.pQ....^%....n!
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):176
      Entropy (8bit):3.64308153590282
      Encrypted:false
      SSDEEP:3:XCbVSm/tlif2lnqlS2Mks9ks9ks9ksWbjkgl1IrSMbhot:SvVq0NTTTAg2Mb6t
      MD5:0314889A62D29F92898F2E84FB0D88D6
      SHA1:5E274DBBD7F357AD6D09B3B822A4B92D3109C8B4
      SHA-256:C1991718A07AEFC99FB6206F3BC6C99AFA7FF678E9F6A01B4A475DDC2B288B23
      SHA-512:04B0C28F2BA9CC19A5A89D0946050C41874617F8EC2CB3C1F268931446AF51C4B3850F4A3A627E14EB34C504435F726CC4F8B11733FCC5F2D73EF2371BACB1CD
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .o!.....$...$.........o!....n.pQ................................................................A.U........P...P...P...P..^%.......`n!.`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):176
      Entropy (8bit):3.64308153590282
      Encrypted:false
      SSDEEP:3:XCbVSm/tlif2lnqlS2Mks9ks9ks9ksWbjkgl1IrSMbhot:SvVq0NTTTAg2Mb6t
      MD5:0314889A62D29F92898F2E84FB0D88D6
      SHA1:5E274DBBD7F357AD6D09B3B822A4B92D3109C8B4
      SHA-256:C1991718A07AEFC99FB6206F3BC6C99AFA7FF678E9F6A01B4A475DDC2B288B23
      SHA-512:04B0C28F2BA9CC19A5A89D0946050C41874617F8EC2CB3C1F268931446AF51C4B3850F4A3A627E14EB34C504435F726CC4F8B11733FCC5F2D73EF2371BACB1CD
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .o!.....$...$.........o!....n.pQ................................................................A.U........P...P...P...P..^%.......`n!.`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):23516
      Entropy (8bit):4.552049322327995
      Encrypted:false
      SSDEEP:384:hpEGbjU41qS/99gByDR0ARPS4Q2wt5aCKLiBoVyY:DJH64Q2wn2Lo+
      MD5:54208A5849F9D7A1CD280C6A82C6D4FB
      SHA1:190A5142210A28B571BAE971BD8B9670E30F060D
      SHA-256:8B2F3EDF22821BAE7D5A6761E61B46929A95CC8CCBA1E05F61A3D9509F95119F
      SHA-512:9DC00FD02E2E0F6254BE04AC65D856AF661F34408F7DB369DE2D3EEF864683C372E27C0DA84A1B869DDC48721C177B2A2C1E942D2B1B93609958B008E32FA80C
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ."..............I.....".}...n.pQ..C.i.t.a...A.t.e.n.a...A.l.m.a.t.....A.t...r.a.u...B.i...k.e.k...C.a.n.a.r.e...D.a.m.a.s.c...K.u.w.e.i.t...A...g.a.b.a.t...D.u...a.n.b.e...M.o.s.c.o.v.a...P.h.e.n.i.a.n...T.a...k.e.n.t...U.j.h.o.r.o.d...O.r.a. .A.c.r.e...V.a.r...o.v.i.a...Z.a.p.o.r.o.j.e...B.u.d.a.p.e.s.t.a...G.u.a.d.e.l.u.p.a...H.o. ...i. .M.i.n...I.e.r.u.s.a.l.i.m...K.a.m.c.i.a.t.k.a...O.r.a. .C.u.b.e.i...O.r.a. .a.r.a.b.....S.f... .E.l.e.n.a...I.n.s.u.l.a. .M.a.n...O.r.a. .C.h.i.n.e.i...O.r.a. .C.o.r.e.e.i...O.r.a. .I.n.d.i.e.i...N.o.v.o.k.u.z.n.e...k...O.r.a. .d.i.n. .{.0.}...O.r.a. .A.r.m.e.n.i.e.i...O.r.a. .B.o.l.i.v.i.e.i...O.r.a. .G.e.o.r.g.i.e.i...O.r.a. .I.r.a.n.u.l.u.i...O.r.a. .J.a.p.o.n.i.e.i...O.r.a. .M.o.s.c.o.v.e.i...O.r.a. .d.i.n. .A.p.i.a...O.r.a. .d.i.n. .F.i.j.i...O.r.a. .d.i.n. .H.o.v.d...O.r.a. .d.i.n. .N.i.u.e...O.r.a. .d.i.n. .O.m.s.k...O.r.a. .d.i.n. .P.e.r.u...O.r.a. .B.r.a.s.i.l.i.e.i...O.r.a. .C.o.l.u.m.b.i.e.i...O.r.a. .N.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):14992
      Entropy (8bit):4.205931100903372
      Encrypted:false
      SSDEEP:384:rO2AQ2/BEPDnNluF7Mwv+orW27MuEAxVcTyovG:a2AQ2/BEPDNlSwwvhrr7yTyD
      MD5:305060097964078359699857BACD82C4
      SHA1:6DD6F95BEACF2940B01859877A93739C5F2DF026
      SHA-256:936A9046CBD208EDE26D0EB4CB0AFCA088985D52129F67C1BADA1DC692A5034D
      SHA-512:88A65EF7BEE1C82C89C407349310F4FFDB0925ED421C8551AB49BA3E38F317643F3A7EBD4F0A08980405DF228D3E3A0EF445922B61CE265F117F6539ED71ACC0
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ........................q...n.pQ..A.z.o.r.a.t...J.a.k.u.c.k...H.e.l.s.s.e.t...K.a.n...r.i.a...W.a.r.s.a.w.a...D.a.m.a.s.k.o.s...M.a.n.s.u.o.l.u...A.p.i.a. ...i.g.i...C.u.b.a. ...i.g.i...F.i.j.i. ...i.g.i...L.u.x.e.n.b.u.r.g...P.e.r.u. ...i.g.i...C.h.i.l.e. ...i.g.i...H.o.v.d.a. ...i.g.i...I.r.a.n.a. ...i.g.i...K.o.r.e.a. ...i.g.i...N.a.u.r.u. ...i.g.i...N.i.u.e.a. ...i.g.i...O.m.s.k.a. ...i.g.i...S.a.m.o.a. ...i.g.i...S.y.o.w.a. ...i.g.i...T.o.n.g.a. ...i.g.i...A.l.a.s.k.a. ...i.g.i...A.r...b.i.a. ...i.g.i...C.h.u.u.k.a. ...i.g.i...D.a.v.i.s.a. ...i.g.i...J.a.p...n.a. ...i.g.i...J.u.o.v.l.a.s.u.o.l.u...K.i.i.n.n... ...i.g.i...M.a.l.e.d.i.i.v.v.a.t...M.a.r.q.u.e.s.a.s.a.t...M.o.s.k.v.a. ...i.g.i...N.e.p.a.l.a. ...i.g.i...N.o.v.o.k.u.s.n.e.c.k...P.a.l.a.u.a. ...i.g.i...P.o.n.a.p.e. ...i.g.i...T.a.h.i.t.i. ...i.g.i...T.u.v.a.l.u. ...i.g.i...A.m.a.z.o.n.a. ...i.g.i...A.r.m.e.n.i.a. ...i.g.i...A.z.o.r.a.i.d. ...i.g.i...B.h.u.t.a.n.a. ...i.g.i...B.o.l.i.v.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.0064963295286735
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMnsbxl9illM96:SvOwisY
      MD5:CA8B438F4E17056EF5FCEFC231433AA5
      SHA1:344346EB61A633E5075E40206F6ABEC7EA930F4C
      SHA-256:633ABCC57CE9C650409448B097E913DBB7C0A47A7FC9ADC552B1FB9679EB64E7
      SHA-512:37996B08968548E85165343C1F664A20899B0F9EFCC1C37845BC35E9EF8D9E69DD02747D99245493E006973454FFB8C3708B4D0A439A92D5132A10750343BB0D
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.S....................S.....n.pQ....^%....R.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.777864799965059
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
      MD5:264C63861CEEF0E1A4CC72D014AA43FC
      SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
      SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
      SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):28804
      Entropy (8bit):4.8037122129403205
      Encrypted:false
      SSDEEP:384:BtaMCsiftfEWjqoB8z4x4JFbTSxua9lXzGIICMqfBOvxHp:jaMtw5qoB8zw8bTh6DGIsm03
      MD5:B0D1B01BC5142182E56BB88EFCD1792E
      SHA1:BD0CA25D62FC4101C148666E4DEB2A53CEF8C6AF
      SHA-256:59C6FE8C2D4E270CA4E8F18D5153E81CE7687FC07D66A353DCA38D8DC1FD1338
      SHA-512:1D4727B85CCAE3D002850D3792EAD55D0D9160A7674BD718DFF449017E06EEE499FE8D2EF95837308AC6F8A005F9C4AEC813A1F35C50C3871320B396AB7350E6
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..H.............E......H....n.pQ....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):21756
      Entropy (8bit):4.682056859194047
      Encrypted:false
      SSDEEP:384:4vFmDWcp+9IrHu+Uu/GuZf9o7h9mfBIaBOBNDgm:4UDebQXZfsh9UBIwqDgm
      MD5:28AF7AE04C85237773049449E01F2692
      SHA1:EB5CB4FDD13DEB69131C170160CEB8851EBB01C3
      SHA-256:EE1E1DF9FB0C5757C4ED94F40DCE1BB5F30887DB66D9155F8D692708EFCEA9B0
      SHA-512:D81B0363866B50AFCCF715F89CEFBB17BB4A5167A5C628C25E778DE8DFC2381D1A695A86163EC9A1A480FCFDBC73DD419266A60AEB9C170D1F6096C9E7774B61
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................3.. ."......7...7...G.....".....n.pQ..A.t.e.n.e...D.u.n.a.j...K.o.m.o.r.i...M.u.a.k.a.t...B.e.r.m.u.d.i...B.r.u.s.e.l.j...L.i.z.b.o.n.a...{.0.}. ...a.s...H.o.a.i.m.i.n.h...K.i.z.l.o.r.d.a...O.t.o.k. .M.a.n...B.u.k.a.r.e.a.t.a...K...b.e.n.h.a.v.n.....a.s.:. .A.p.i.a...G.o.r.s.k.i. ...a.s.....a.s.:. .D.a.v.i.s.....a.s.:. .S.y.o.w.a.....i.l.s.k.i. ...a.s...A.l.j.a.a.k.i. ...a.s...A.r.a.b.s.k.i. ...a.s...A.z.o.r.s.k.i. ...a.s...H.o.v.d.s.k.i. ...a.s...I.r.a.n.s.k.i. ...a.s...V.z.h.o.d.n.i. ...a.s...A.r.m.e.n.s.k.i. ...a.s...B.o.~.i...n.i. .o.t.o.k...B.u.t.a.n.s.k.i. ...a.s...J.a.p.o.n.s.k.i. ...a.s...K.i.t.a.j.s.k.i. ...a.s...K.o.r.e.j.s.k.i. ...a.s...K.u.b.a.n.s.k.i. ...a.s...N.e.p.a.l.s.k.i. ...a.s...N.i.u.e.j.s.k.i. ...a.s...P.a.l.a.v.s.k.i. ...a.s...P.e.r.u.j.s.k.i. ...a.s...P.o.n.a.p.s.k.i. ...a.s...S.a.m.a.r.s.k.i. ...a.s...V.o.s.t.o.a.k.i. ...a.s.....a.t.a.m.s.k.i. ...a.s...A.m.a.z.o.n.s.k.i. ...a.s...A.n.a.d.i.r.s.k.i. ...a.s...A.t.l.a.n.t.s.k.i. ...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.9849392665878645
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMWEi6E7lDJcls0:Svvt6gDOa0
      MD5:7A74FC755D1E0D6D48CD5B4C2361592B
      SHA1:F35EE9E8B2B8AD42D48265AB5F32617B664A77FE
      SHA-256:028A167D99B424B29176736EAFD35631BACF7A4F087E765C6E244CEF0D12203E
      SHA-512:BE38F81FE8D53B9FA2ADAD5D2B403DAE7E6223F6AA4438F5DDD5C3BE3B88795A720E90197A96263DC8251ABC10F96A7C5E987DBEA84A00CB88F60394278F54F6
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.J/...................J/....n.pQ.....$I/
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.9849392665878645
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMWEi6E7lDJcls0:Svvt6gDOa0
      MD5:7A74FC755D1E0D6D48CD5B4C2361592B
      SHA1:F35EE9E8B2B8AD42D48265AB5F32617B664A77FE
      SHA-256:028A167D99B424B29176736EAFD35631BACF7A4F087E765C6E244CEF0D12203E
      SHA-512:BE38F81FE8D53B9FA2ADAD5D2B403DAE7E6223F6AA4438F5DDD5C3BE3B88795A720E90197A96263DC8251ABC10F96A7C5E987DBEA84A00CB88F60394278F54F6
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.J/...................J/....n.pQ.....$I/
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.500123730064915
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/lcls8l:SBtkJ1li6gml/qa0
      MD5:4F880C5D6BDDF339F850A87F0DC7BE2D
      SHA1:90F0E7728BF802B7E962DB8434D1C562705F0613
      SHA-256:B175F94ED5CE958A83AAB63677471AA4C0B2EA04FABA7C42681A5AEAEF8E5530
      SHA-512:C9FC5B2F71F055D42C8501AAAAF6E6B6C290A6018CF1CFCB993735A01868850D0B3C5EAAD3A611C80D456AF9319DCF1F20CE4A8A0DB54736BA8C8D7089B54144
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................n.pQ.....$..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.95862347711418
      Encrypted:false
      SSDEEP:3:XCbVSm/tlM7t66E7l3lPclspK:Svk06g3lkapK
      MD5:514CBEF4886D54AED23144B3AA05EDAF
      SHA1:F442A0E8F56D355AB8522DF0BBEC1CECE89BF781
      SHA-256:96D1D9268B17D977DCB132AD277E8455A59B0C6DDAC7AB3117BC85994E4B1C97
      SHA-512:86377B2655874404E292B3F3EE869CCFBCD930002FC65CE291587A9B75D7BCF6A1F29EC5AD6264D25DEF534CB39EED0967CC8C4A87316C5C6CD3A73E4F165DF8
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P../..................../....n.pQ.....$./
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.925547915629603
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDklU8gl8l/qli16lLMA+GIPn:SBtkJYlU8g8l/qk16JAGy
      MD5:0603FC86A4027231623B2CBDBF29364E
      SHA1:AB307EB3EA3DE97CF414C2F262431D6D8891196B
      SHA-256:06B72F72F727D3340FBCB8E5B1016B5F8D49B84A78BFF39A95B4F0E7BFE1BFB4
      SHA-512:97555480587963BCF964D37048A7E388C6885726565F966159474846E9B8560B449509783637AACF290472C85C39A70B86E6C1F6A35BC494DCCAFE533490B355
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................n.pQ..s.r._.L.a.t.n._.M.E......$....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.9849392665878645
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMWEi6E7lDJcls0:Svvt6gDOa0
      MD5:7A74FC755D1E0D6D48CD5B4C2361592B
      SHA1:F35EE9E8B2B8AD42D48265AB5F32617B664A77FE
      SHA-256:028A167D99B424B29176736EAFD35631BACF7A4F087E765C6E244CEF0D12203E
      SHA-512:BE38F81FE8D53B9FA2ADAD5D2B403DAE7E6223F6AA4438F5DDD5C3BE3B88795A720E90197A96263DC8251ABC10F96A7C5E987DBEA84A00CB88F60394278F54F6
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.J/...................J/....n.pQ.....$I/
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.9849392665878645
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMWEi6E7lDJcls0:Svvt6gDOa0
      MD5:7A74FC755D1E0D6D48CD5B4C2361592B
      SHA1:F35EE9E8B2B8AD42D48265AB5F32617B664A77FE
      SHA-256:028A167D99B424B29176736EAFD35631BACF7A4F087E765C6E244CEF0D12203E
      SHA-512:BE38F81FE8D53B9FA2ADAD5D2B403DAE7E6223F6AA4438F5DDD5C3BE3B88795A720E90197A96263DC8251ABC10F96A7C5E987DBEA84A00CB88F60394278F54F6
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.J/...................J/....n.pQ.....$I/
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):19576
      Entropy (8bit):4.816887587208837
      Encrypted:false
      SSDEEP:384:LebdlpyruH/MtVTcYXmHxvfy/wxdrYRmxi62Q3Qzc7sBo33zR:LebdTsufMtVA1xv32zmii1
      MD5:47F8199400ABE079A5E142835EE078CC
      SHA1:2A405F29574126B2D977933EE9B9E22824BF1D6F
      SHA-256:243E93F98403EF1220E25D26978C812B8BDE2DCAD9F23A6A488C5C4D553750D9
      SHA-512:AD86AA297663821A6AF615C0834D1ACCFDFF61455A0604B94CB04A3224CF02FA07F55C61EB7C16868616A28A48493EE00E6D48880344707B06B709F8A245C431
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ."..............R.....".....n.pQ..S...u.l...C.h.o.v.d...J.u.l...n...T.j.i.t.a...P...s.k...n...{.0.}.t.i.d...A.p.i.a.t.i.d...B.r.y.s.s.e.l...F.i.j.i.t.i.d...G.u.a.m.t.i.d...N.i.u.e.t.i.d...O.m.s.k.t.i.d...A.q.t.a.u.t.i.d...A.z.o.r.e.r.n.a...C.a.s.e.y.t.i.d...C.h.o.v.d.t.i.d...C.h.u.u.k.t.i.d...D.a.v.i.s.t.i.d...E.l.-.A.a.i...n...M.a.c.a.o.t.i.d...N.a.u.r.u.t.i.d...P.a.l.a.u.t.i.d...P...s.k...t.i.d...S.y.o.w.a.t.i.d...T.o.n.g.a.t.i.d...T.o.r.s.h.a.m.n...W.a.l.l.i.s...n...2...1...4.8...9.0...A.l.a.s.k.a.t.i.d...A.l.m.a.t.y.t.i.d...A.n.a.d.y.r.t.i.d...A.q.t...b.e.t.i.d...B.r.u.n.e.i.t.i.d...K.o.m.o.r.e.r.n.a...K.o.s.r.a.e.t.i.d...K...p.e.n.h.a.m.n...M.a.w.s.o.n.t.i.d...M.o.s.k.v.a.t.i.d...P.o.n.a.p.e.t.i.d...S.:.t. .J.o.h.n.s...S.:.t. .K.i.t.t.s...S.:.t. .L.u.c.i.a...S.a.m.a.r.a.t.i.d...T.a.h.i.t.i.t.i.d...T.a.i.p.e.i.t.i.d...T.u.v.a.l.u.t.i.d...V.a.t.i.k.a.n.e.n...V.o.s.t.o.k.t.i.d...C.h.a.t.h.a.m.t.i.d...G.a.m.b.i.e.r.t.i.d...I.r.k.u.t.s.k.t.i.d...J.a.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.777864799965059
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
      MD5:264C63861CEEF0E1A4CC72D014AA43FC
      SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
      SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
      SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):30388
      Entropy (8bit):4.72273812066149
      Encrypted:false
      SSDEEP:384:ekS9UdNG5fJgz+F/byKWtBOWLdBwSBo+9:WegbyrLUYJ9
      MD5:234FBFF3A0EEC012EE900974B4511D6B
      SHA1:B5F228C08CFC8882F3C773722719493F0EA052AE
      SHA-256:0D9A840AAAB51E4377F959157536A056500A3D72F81AD2E5750227C346ADC4F6
      SHA-512:715E2C9B244ACD22C4110DEEA0DCFA3E84A8F495B3CB5FB36452BBF24BC3A4FE6BE8AB4CF30B673743056E1095FBC215BC61B4ACF93336F198A8EE896C63A196
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .4..............J.....4.1...n.pQ....0.9.O.....V.;.V.....0.W.@.....8.W.2.....V.<.0.....C.0.<.....D.V.=.8.....0.=...V.....5.;.V.7.....V.A.0.C.....2.:.;.0.....0.@.@.V.....5.9.A.V.....V.@.>.2.....0...>.A.....<.A.L.:...!.>.D.V.O...!.L.>.2.0...!.V.B.:.0...".>.:.V.>...".C.=.V.A...&.N.@.V.E...'.0...>.A.../.=...>.=.....@.5.2.0.=.....=.C.2.V.:.....5.@.;.V.=.....>...>.B.0.....V.4.5.=.L.....>.1.0.@.B.....0.@.2.V.=.....6.5.@.A.V.....C.1.;.V.=.....0...@.5.1.....0.@.0.G.V.....0.T.=.=.0.....>.<.>.@.8.....C.G.V.=.......V.3.0.;.V.....0.=.V.;.0.....0.@.V...>.....5.@.V.4.0.....5.E.V.:.>.....V.4.2.5.9.....V.=.A.L.:.....V.0.<.5.9... .5.A.V.D.V...!.:.>.?...T...!.B.5.=.;.V...!.V.4.=.5.9...".0.9.1.5.9...".>.<.A.L.:...#.>.;.;.V.A...#.@.C.<.G.V...$.V.=.V.:.A...'.V.:.0...>...'.V.C.0.C.0.....0.9.0.=.0.....5.@.=.A.V.....:.0.;.C.W.B.....1.V.4.6.0.=.....=.B.8...C.0.....=...V.;.L.O.....H.3.0.1.0.B.....0.=...:.>.:.....5.;...@.0.4.....5.@.<.C.4.8.....@.V.A.1.5.=.....V.;.L.=.N.A.....V.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):24288
      Entropy (8bit):4.554695048412468
      Encrypted:false
      SSDEEP:384:RT8tBfUI7LLNfYyVPlRAJ3hNT3o2jauVEtE256UGpQTKin2gYFs40lplr5FKwyE+:lIfUI7fNfYyVPlRAJ3hNT3o+a5tE256z
      MD5:D46047BA9245966FC8B99F2632FC2977
      SHA1:80F44E7EE033540E67131B6F2AE1F412C3D43DD2
      SHA-256:C837DEA1D261BF66F36487B31E5361FA764415ED567C9B9F55C979C47C0DCF15
      SHA-512:969173DF74EECDA597607BD686D0AA0D94435B5E1577029091BBF7944F42400986B85F5667CB40B57CCAFB94D294CD9867B8F177CBD1349E5389863114CF31B8
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ._..............D....._.E...n.pQ..M.a.e...A.d.a.n...B.o.k.u...J.u.n.o...V.e.n.a...X.o.v.d...A.f.i.n.a...A.m.m.o.n...B.a.i.y.a...E.v.k.l.a...G.. a.z.o...J.e.r.s.i...K.e.r.r.i...K.e.y.s.i...K.i.y.e.v...O.q.t.o.v...P.a.r.i.j...Q.o.b.u.l...S.y.o.v.a...B.a.y.r.u.t...B.r.u.n.e.y...D.e.y.v.i.s...G.a.v.a.n.a...G.a.y.a.n.a...G.e.r.n.s.i...G.o.t.x.o.b...J.a.y.p.u.r...J.a.z.o.i.r...K.u.y.a.b.a...L.a.-.P.a.s...M.a.p.u.t.u...M.a.s.e.y.o...O.k.l.e.n.d...Q.o.h.i.r.a...Q.u.d.d.u.s...Q.u.v.a.y.t...S.a.y.p.a.n...S.k.o.p.y.e...S.y.u.r.i.x...T.a.y.p.e.y...T.e.h.r.o.n...V.a.d.u.t.s...X.a.r.a.r.e...X.a.r.t.u.m...X.e.v.r.o.n...X.o.b.a.r.t...A.l.-.A.y.u.n...A.n.g.i.l.y.a...A.n.k.o.r.i.j...A.s.u.n.s.o.n...B.a.g.. d.o.d...B.a.h.r.a.y.n...B.r.i.s.b.e.n...C.h.i.k.a.g.o...D.a.m.a.s.h.q...D.e.t.r.o.y.t...G.o.n.k.o.n.g...G.u.s.-.B.e.y...J.o.n.s.t.o.n...K.a.y.e.n.n.a...L.o.n.g.y.i.r...M.a.y.o.r.k.a...N.a.y.r.o.b.i...N.o.r.o.n.y.a...O.q.t.o.. b.a...O.x.i.n.a.g.a...P.n.o.m.p.e.n...P.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):104
      Entropy (8bit):3.3096875248934543
      Encrypted:false
      SSDEEP:3:XCbVSm/tlQnsFNcS/3VclsytndhAMkSfeF:Svie6a4diDF
      MD5:EE47D260BC9D7EF4556B22C5AD88ADAB
      SHA1:9986347E802739F9B794338B3B92CCBB028ADA68
      SHA-256:9695AD90BB6D18EDE15FA97709E722D3486D655B0D08EFC1AA3E96DB6DD40D22
      SHA-512:4BBF77654E4FAD49310DA385BC895CCD410242677A0736198F2FDC7E9AA10BF0D7489BC83FE73D29E546A15F3F949C72EDBC51D809D4C3B2AD965668F83E9B64
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .S....................S.....n.pQ....#.}........P..^%.......`R..`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.777864799965059
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMn6E7l2RJcls/LEn:Svm6g2ROa/w
      MD5:CBF1E43602D294E22F60CDEFFFBE1133
      SHA1:E9B337C3EE0C3FE63B741FAA70A51FB5A8475970
      SHA-256:968F1197DF1B8B6F2FF8113B28253086818EA2C8E21C049509DC10D50ADEB7F8
      SHA-512:66979D342BEBA1C32521F3797499C19FA3895E8EFE74AE6E50CAAC65AA72B282180BB3BE55AD6B4A479C393E992F88F0F12B4D2B5429FEFD5681076D519041EB
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.o!...................o!....n.pQ......n!
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):100
      Entropy (8bit):2.945547915629603
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlDklU8gl8l/qlwfglwl3l/yPn:SBtkJYlU8g8l/q+fgK/c
      MD5:ED70BEABDBA235CE58329F8207310ACA
      SHA1:5CA4DD0342660519C47EA266536E2B25490F394F
      SHA-256:BDD363B832BC4A953FF0EB4889AE2CC4E15BFBC941B9B6867B33AC5B004249F0
      SHA-512:944FD804B9FE6D5639B55FE67478B9332F2518F1624278E59D4190C019F210AE1004466ED861E65014A0B51D988A5BA507671D5FC105E07049F7571DD301DD0B
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................n.pQ..u.z._.L.a.t.n._.U.Z......$....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.500123730064915
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/lcls8l:SBtkJ1li6gml/qa0
      MD5:4F880C5D6BDDF339F850A87F0DC7BE2D
      SHA1:90F0E7728BF802B7E962DB8434D1C562705F0613
      SHA-256:B175F94ED5CE958A83AAB63677471AA4C0B2EA04FABA7C42681A5AEAEF8E5530
      SHA-512:C9FC5B2F71F055D42C8501AAAAF6E6B6C290A6018CF1CFCB993735A01868850D0B3C5EAAD3A611C80D456AF9319DCF1F20CE4A8A0DB54736BA8C8D7089B54144
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................n.pQ.....$..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):1564
      Entropy (8bit):4.555311598702862
      Encrypted:false
      SSDEEP:48:EJhy5pG0kRHp5uKu5wyu5Guhu5zF2u02uFjh2u0jhjPkHHBXgsKs:uhyZkBp565wf5GuU5zgu9u18uWRPknpB
      MD5:C3FD8EEAD516A6FDCBC4F005EDDFAAF9
      SHA1:F857BABC9B5922075AEE7D53E3B4A1DBFC67D5C3
      SHA-256:4C974E2311222AC517CFE86D7F3573E1726563868CCEB02B2869B905527F68CF
      SHA-512:2BF54B5D8A3B0C24AEBC6591CB8173660DAAE9B80870C89E08F98C1E2E72A6E388C17BED95DF2BD36D27D159E056D9499CA61F0416E8AD29617F372FC61E4840
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................{.. ................-.......7...n.pQ..R.e.v.a.l...T.i.r.a.n...Z...r.i.....L.a.i.b.a.....S.i.d.n.e.i...W.a.r.a.a.u...D.a.i.b.u.t.i...H.a.w.a.n.n.a...{.0.}. .z.i.t...B.u.d.a.p.e.a.t...B.u.k.a.r.e.a.t...K.o.p.e.h.a.g.e...M.o.n.s.e.r.a.t...R.i.k.j.a.w.i.k...A.m.a.t.e.r.d.a.m...K...n.i.g.s.b...r.g...K.a.i.m.a.n.i.n.s.l.a...A.t.l.a.n.t.i.a.i. .Z.i.t...K.o.n.a.t.a.n.t.i.n.o.p.e.l...O.a.t.e.u.r.o.p...i.a.i. .Z.i.t...U.n.b.e.k.a.n.n.t.i. .S.t.a.d.t...W.e.a.t.e.u.r.o.p...i.a.i. .Z.i.t...A.t.l.a.n.t.i.a.i. .S.u.m.m.e.r.z.i.t...M.i.t.t.e.l.e.u.r.o.p...i.a.i. .Z.i.t...A.t.l.a.n.t.i.a.i. .S.t.a.n.d.a.r.d.z.i.t...O.a.t.e.u.r.o.p...i.a.i. .S.u.m.m.e.r.z.i.t...W.e.a.t.e.u.r.o.p...i.a.i. .S.u.m.m.e.r.z.i.t...O.a.t.e.u.r.o.p...i.a.i. .S.t.a.n.d.a.r.d.z.i.t...M.i.t.t.e.l.e.u.r.o.p...i.a.i. .S.u.m.m.e.r.z.i.t...W.e.a.t.e.u.r.o.p...i.a.i. .S.t.a.n.d.a.r.d.z.i.t...M.i.t.t.e.l.e.u.r.o.p...i.a.i. .S.t.a.n.d.a.r.d.z.i.t.....#.....#.....#.....#."...#.....#.j...#.....#.n...#.|...#.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):1888
      Entropy (8bit):4.031767224099958
      Encrypted:false
      SSDEEP:48:9fMHKzH51PKEwdevOMuZNMEEggv5JkKFXyErIKFcKjM1KF5Q8gKMEg1auVaEEg1Q:xMqzZ1PKEw4mM8NMEEggxJkeyErIZEMI
      MD5:B0F769E5129E8F6FB422F06F87C3AB4D
      SHA1:11D9DE49352A932DCEEDC8ED3ED62FFE3A62FB29
      SHA-256:26070309EABA6283EE84AD1F10AA40C6BB36939720490D305094EC411AAEEE88
      SHA-512:1C46E0CAC402A344BF65B3F7295C36475D5A9792F3C94A7341AB5F91DC0B44E7BDB04B039CE119625CD209428AF308FBE7EF1204760D9AAB7ADC614B45F91B6E
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .lG...................lG....n.pQ..2...1...4.7...8.4...D...k.k. .b.u... .x.a.m.u.l...E.T. .w.a.x.t.u. .p.e.n.k.u...M.T. .(.w.a.x.t.u. .t.u.n.d.u.)...P.T. .(.w.a.x.t.u. .p.a.s.i.f.i.k.)...A.T. .(.w.a.x.t.u. .a.t.l...n.t.i.k.)...C.T. .(.w.a.x.t.u. .s...n.t.a.r.a.l.)...G.M.T. .(.w.a.x.t.u. .G.r.e.e.n.w.i.c.h.)...E.D.T. .(.w.a.x.t.u. .b...c.c...g.u. .p.e.n.k.u.)...E.E.T. .(.w.a.x.t.u. ...r.o.o.p. .u. .p.e.n.k.u.)...M.D.T. .(.w.a.x.t.u. .b...c.c...g.u. .t.u.n.d.u.)...C.T.E. .(.w.a.x.t.u. ...r.o.o.p. .s...n.t.a.r.a.a.l.)...P.D.T. .(.w.a.x.t.u. .b...c.c...g.u. .p.a.s.i.f.i.k.)...A.D.T. .(.w.a.x.t.u. .b...c.c...g.u. .a.t.l...n.t.i.k.)...A.S.T. .(.w.a.x.t.u. .e.s.t...n.d.a.a.r.u. .p.e.n.k.u.)...C.D.T. .(.w.a.x.t.u. .b...c.c...g.u. .s...n.t.a.r.a.a.l...E.S.T. .(.w.a.x.t.u. .e.s.t...n.d.a.a.r.u. .p.e.n.k.u.)...M.S.T. .(.w.a.x.t.u. .e.s.t...n.d.a.a.r.u. .t.u.n.d.u.)...W.E.T. .(.w.a.x.t.u. ...r.o.o.p. .u. .s.o.w.w.u.-.j.a.n.t...P.S.T. .(.w.a.x.t.u. .e.s.t...n.d.a.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):308
      Entropy (8bit):4.212503743247875
      Encrypted:false
      SSDEEP:6:SvMppagg8z9sk141A6YEgFW4g9VFig9zwi4uyNOlwl+oD:bpReVYJkPVFh6NOKEC
      MD5:3912F22AB65F8E1F7A473ACCCD9CAC9C
      SHA1:E770D84AAF2CEA9CEF79D6B1224C37FEB7FCCF00
      SHA-256:186E5766A194471B751F5F6A9AB765C4AD018BE5B8C614A18AE55A3E9F55F77B
      SHA-512:2C10C046FC16DCB6C8ED8DFDA415F32459C3B2D8129628A08753A90AEDCBE64D4CF12E3E33AB0BB36381836727D23438F8BB9F1ACFFE4C7CE837B2D3A907C6DC
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................A.. .S......E...E.........S.7...n.pQ.............................................................................. ....... ....... ....................................... ...............#.m...#.c...#.T...#.Z...#.x...#.......U...(.......J..PM..PP..PS..PV..PY..P........R..`7..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.777864799965059
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMn6E7l2RJcls/LEn:Svm6g2ROa/w
      MD5:CBF1E43602D294E22F60CDEFFFBE1133
      SHA1:E9B337C3EE0C3FE63B741FAA70A51FB5A8475970
      SHA-256:968F1197DF1B8B6F2FF8113B28253086818EA2C8E21C049509DC10D50ADEB7F8
      SHA-512:66979D342BEBA1C32521F3797499C19FA3895E8EFE74AE6E50CAAC65AA72B282180BB3BE55AD6B4A479C393E992F88F0F12B4D2B5429FEFD5681076D519041EB
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.o!...................o!....n.pQ......n!
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.500123730064915
      Encrypted:false
      SSDEEP:3:XCbVTtkJtlMeli6E7lml/lcls8l:SBtkJ1li6gml/qa0
      MD5:4F880C5D6BDDF339F850A87F0DC7BE2D
      SHA1:90F0E7728BF802B7E962DB8434D1C562705F0613
      SHA-256:B175F94ED5CE958A83AAB63677471AA4C0B2EA04FABA7C42681A5AEAEF8E5530
      SHA-512:C9FC5B2F71F055D42C8501AAAAF6E6B6C290A6018CF1CFCB993735A01868850D0B3C5EAAD3A611C80D456AF9319DCF1F20CE4A8A0DB54736BA8C8D7089B54144
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P............................n.pQ.....$..
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):16120
      Entropy (8bit):6.334477949772806
      Encrypted:false
      SSDEEP:384:Q9fhn8/bDuVja1f3SLmACG+NsIN53YOJiBoIT/O19e5:Yfh8GVwCpCII3/odqne5
      MD5:9AACAB1B7BC93CE38E27EDFE0A9FC386
      SHA1:CDDF34A9738E2C73A904CDC7FD2C44920EEB9994
      SHA-256:016EF8A44579E8BDA42A0E2F6B65A7D44F0C8BDB1E270273DA4A2F7FFDB047B3
      SHA-512:F393371C49DA797435867E406AE26DC5FACD040F13A5696BF1F8DB5AF354509F0562C18A0E4EDA3B7125F2EEC2516076E94766310E2468BE13770F86E5D900FA
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ..S.............R......S6...n.pQ...Na....N.N..9N[O...N.N...NIQ...O....&Ofe..sQ.\..)Rl....R.l...RKQ..NS.l..aS^X..aS.[...SKf...V.R..NW.f..dW8u...W....TX.g..^X.s...ZKQ...[.f...].^...].g...]....^.R...^.R..s^.X...^)R...^.^..._.f..._W....`<\...b.....e.....eNm..-f.T...f.\...f7...1g.]..1g.....k.~...lW....m.....o....s.e...s.T..Yt.....~.W...~.~..W.l......h.....Y....&O..d.TX....aS....b..S..h....R........xQ.....\..../n..-N...\..LN.b.\..TN.]q\...N~g.h../O)RyQ..[O._...pQ.N~n...QW..k...Q.Q.W..)R.._..QReh~n...R..)R...R..?...ZS.O....aSTX.\..aS.bGY..bS.h!X..bS(.aS...S.e~n...S.S.e...T.^.c...U.^.\...V.^.f..#W.OW...#W.W(...#WTX&O..#W.Y....#W.[..#W..\..-W.N.....W..KQ...W.)n..TX.^.c...X.\,g...Y&O.Y..'YNWnf..'YyrKQ..8Y>..g..GY.t.t..eYKQpQ..eY.eF....[-W.b...[.c.t...[S..\...[KQ....<\.N....<\.v!....].O.N...].bl....]<h.....]l..y...^/O&O...^..\...^.N.]...^.b"}...^[..W..._.fe..._.pQ..4b.~.e...b.T.e..id.~.T...efW)R...e.m.U...g.R!...\g.\+R...gTX.Y..9h...\..Qh._.....h
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):76
      Entropy (8bit):2.777864799965059
      Encrypted:false
      SSDEEP:3:XCbVSm/tlMn6E7l2RJcls/LEn:Svm6g2ROa/w
      MD5:CBF1E43602D294E22F60CDEFFFBE1133
      SHA1:E9B337C3EE0C3FE63B741FAA70A51FB5A8475970
      SHA-256:968F1197DF1B8B6F2FF8113B28253086818EA2C8E21C049509DC10D50ADEB7F8
      SHA-512:66979D342BEBA1C32521F3797499C19FA3895E8EFE74AE6E50CAAC65AA72B282180BB3BE55AD6B4A479C393E992F88F0F12B4D2B5429FEFD5681076D519041EB
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P.o!...................o!....n.pQ......n!
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):140
      Entropy (8bit):3.846510265593906
      Encrypted:false
      SSDEEP:3:XCbVSm/tlyFzqlbVqg+UrlasJGtsh/tflPPQ3N:Svmzq7L+ptHN
      MD5:222797C3BC9CF426918973066ED97CF1
      SHA1:10E18BD3F6029EAC17B0DD5B464F4646034C6570
      SHA-256:D14FBFD89AF2619B58720CED7B01BDE205CD5B1C04495A95A96FD03C97CCC448
      SHA-512:10050C82FE674441513BF118927D0AB733AAEF7E4048696294221453F3286E450F10FE188D0CD99F16F62A008D364A0E396B68C03EF47DF8CA7FE06C6B1AE654
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... .o!...................o!....n.pQ...e...e/O~g._....#.p!....;.....K........ .#...P...P...P........n!.`...
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):80
      Entropy (8bit):3.065932423305717
      Encrypted:false
      SSDEEP:3:XCbVSm/tlM4lRd6llMKH:SvTssc
      MD5:0675F9EF282F3CDA710A1C06B1959D24
      SHA1:F2DE1CCCB927527A4CADFC1057AC9D021967F8AD
      SHA-256:001397A5D0FF3FBBDCABE1B278FD3EB55FA7917791730164515589F0409D7758
      SHA-512:CFFA1AA55ED0A9ED3AAF597B3ECA4A6F4AF6B9D0A6ADA8D1CAB2227D4112B92BF2DBA0305FEE835AABEA897A21E61770F27CAADD8A38A711ADC8D34BE041501E
      Malicious:false
      Reputation:low
      Preview: ..'........ResB...................P..3....................3....n.pQ....^%...3T"
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):154192
      Entropy (8bit):6.466773952608882
      Encrypted:false
      SSDEEP:1536:Dblc9Zh0cUdDFuMkqIlipBpcfNPSHjgdWhUSfyczLKuHsGUZvj1qheERDWF3JXDN:Dhc9Zh0cUdZqvEB8PbdWJFzeNzA2Ya
      MD5:0D76CB4C8F700A77AC63BD55D73C9456
      SHA1:6F9AB1F986329C147AD64B5CF6174F794F9D9358
      SHA-256:A25FE98CAB0C7F01D79E008C5DEF18B330A1B7ECC4D72B067EFD37D4C1EF3320
      SHA-512:FDA7B80D502AEC658524AFCBB01E80985ACA0185C4DB47FDA87FFC393C409A654B6F8B9737834BB9C44733E73E0C9C21C71E67A616D2568CC3ACBF1895A9C824
      Malicious:false
      Reputation:low
      Preview: ..'........ResB................... ....P...................v...TZVersion.Zones.trans.typeOffsets.typeMap.links.transPre32.finalRule.finalRaw.finalYear.transPost32.Names.Rules.AN.AS.AT.AV.Brazil.C-Eur.Canada.Chatham.Chile.Cuba.EU.EUAsia.Fiji.Haiti.Iran.Jordan.LH.Lebanon.Mexico.Moldova.NZ.Palestine.Para.Syria.SystemV.Thule.Troll.US.WS.Zion.Regions......U.S...E.U...C.A...R.U...A.U...B.R...A.R...M.X...A.Q...C.N...N.Z...K.Z...F.M...A.S...C.L...G.B...I.D...G.L...M.N...P.T...U.A...B.D...C.Y...E.G...E.S...I.L...J.P...K.I...M.H...P.F...T.R...U.M...V.N...W.S...A.M...B.T...C.D...C.I...C.U...D.E...E.C...E.R...F.O...F.R...H.K...I.E...I.R...I.S...J.M...K.E...K.R...L.Y...M.D...M.M...M.O...M.Y...M.Z...N.O...N.P...P.G...P.K...P.L...P.R...P.S...S.B...S.G...T.M...T.W...U.Z...A.D...A.E...A.F...A.G...A.I...A.L...A.N...A.O...A.V...A.W...A.X...A.Z...B.A...B.B...B.E...B.F...B.G...B.H...B.I...B.J...B.L...B.M...B.N...B.O...B.Q...B.S...B.W...B.Y...B.Z...C.C...C.F...C.G...C.H...C.K...C.M...C.O...C.R...C.V...C.W.
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2999
      Entropy (8bit):7.872676574137398
      Encrypted:false
      SSDEEP:48:27/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODaH1Ri:27SDZ/I09Da01l+gmkyTt6Hk8nTaHS
      MD5:0050F2B87610533FB835211CE7768C38
      SHA1:10FF8C5A57BC95928CB4ECECB3615F3F21CE3E53
      SHA-256:A266EB60C4E5D978C0B3AB1BBED3504C9F7724D9B876439F4E96790B029C1090
      SHA-512:BEA5FD1E21AB2B12F0455395B151A7F9CD2D40CC352A32702D15293D5BF01F7D7910377D0D4D3EE667D2D9908D1C4AE2A8C48C380188ED2E5467816D1D2A9A6E
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR... ... .....szz.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2995
      Entropy (8bit):7.87233812759291
      Encrypted:false
      SSDEEP:48:27/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcOD4zubbRr:27SDZ/I09Da01l+gmkyTt6Hk8nT4zQN
      MD5:BBB18E318B9373027B899F3BBD043F63
      SHA1:38763D53BB5CDF5DD864661D1FFECC6C6985D6FC
      SHA-256:C1AD63A5E2E7FF765FF5E1614C7AF90ABDB04558E13AAD1CCFAC456A701FB870
      SHA-512:924463FC68F1D338FF918E8C8652535709C01D0E2FB84D5B2573A7D5B5F665B29A733C1A19F366EE6AFC1CE105D5E30B7810F61B7896C2E2C1BF5583AB497C3A
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR... ... .....szz.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2930
      Entropy (8bit):7.88291600595306
      Encrypted:false
      SSDEEP:48:kocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcOD+/6LdrOp:kZ/I09Da01l+gmkyTt6Hk8nT+SLF+
      MD5:D89B1D1B0B8D55FDCFA1896DBF7CBADD
      SHA1:C4822D8D605AD956841C48C18A093921795D6859
      SHA-256:840B1AB3934616994BF1B4B6A0BD543C4BD64C153A5FE985321231FEF037E666
      SHA-512:4C1647AC06F03646D7A30EEBD3A0C035E4FCCF57803F2C84707B1630D81D6E83A3B183B37E6B4A97D65B53B761E474F2C44A667E387016FB35C28AA326646632
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR................a...OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9., +.....3...!.[..b@q
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2837
      Entropy (8bit):7.853233109337811
      Encrypted:false
      SSDEEP:48:27/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODWnB:27SDZ/I09Da01l+gmkyTt6Hk8nTs
      MD5:EA84112CCCC50942A97F8803EDDCAEA5
      SHA1:3032DD08E256410ED5C3A1A4A570EC947907102B
      SHA-256:2F4E4424324F44CB153161DE9BCCEF6A0891780C08EC5582D5A1CF5D15FB15B6
      SHA-512:F05F9A83E64C619452644D1892B644B4308F480B0B2A06203916D2094781E495E3311000E03BD0155445B5FFE199A866430AE55C39884A70C67A9F3A274585EA
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR... ... .....szz.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):15599
      Entropy (8bit):1.800599730119888
      Encrypted:false
      SSDEEP:48:b/6NpKlYk29WJsEvPg5lzwuB4BLJBLSMZxN+Y9rNGw3Gvsc5IY7XW9K:bSLQYkEWmsghxCxNXrNGkGvsc5lmK
      MD5:180C749967F129693CE9CE6D25825077
      SHA1:F87B56EDD6A46ECA3D2B77859A073C892B074FDA
      SHA-256:35708367FAF8E3BBDFC528744D57A0C3285B77E3E640035DB7F593D8EE1BB66F
      SHA-512:DA13F6D970A02D4B78E412204DB62D2F21D569CB85B78EE23CDBB6B5AFFFDF0C4BC210A538ED18B1F0B292C36F5CD23EAC02A34D4A6CFECF27AFDD39F57FA069
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR................a....pHYs...............<.iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?>.<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.5-c021 79.154911, 2013/10/29-11:47:16 ">. <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">. <rdf:Description rdf:about="". xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/". xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#". xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#". xmlns:xmp="http://ns.adobe.com/xap/1.0/". xmlns:dc="http://purl.org/dc/elements/1.1/". xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/". xmlns:tiff="http://ns.adobe.com/tiff/1.0/". xmlns:exif="http://ns.adobe.com/exif/1.0/">. <xmpMM:DocumentID>xmp.did:5C2DE4146B9111E49893B4FB72F1608B</xmpMM:DocumentID>. <xmpMM:InstanceID>xmp.iid:f4150d88-d661-8e40-ae0b-446d398644
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):468
      Entropy (8bit):7.089121604480162
      Encrypted:false
      SSDEEP:12:6v/78kFmDSKN9DDDqEvwtnMkBvC4z2r/ofgR2yc:f2aJDuEvwKIvxijugAyc
      MD5:0BBDC2B8F75B6BEE90997226456EF876
      SHA1:0F5C013BB5F76D4EE57DF167DB8A911FB1B0FFC6
      SHA-256:0FEE50B7CFB08A5B7E308935558A826AB00A685F8876C7D6CAA4585799ADA048
      SHA-512:AD211658C7BF7CB75E2BC0514B2895DD52AF98866DF936A3394DD0B73A0FA8C16C59E37D02C1F67B14B69FD8A3312AECB7CE7647B33D1B6C15D94D3C88AA3900
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR................a....gAMA......a.....pHYs..........(J.....tEXtSoftware.Paint.NET v3.5.6..Z...QIDAT8Oc`@.[.%7.)...Q.\*.`...I......1#.>.m..J..UN.QP.O.o.S.Y&"n.4.......5.#..Y~...].6u .a..(..<......../e.au.....=r..g...4@...o}.. E .n.6q.n......kd.........N..@.,.V.(.......dl.....`.....Px....3...^.(r..a...Rb...2....c..J`,.R$..&9.#...y..w.......1...4..(.......A.<.}.....V.*.>w .e.0`.bE v.......A.FB..s...eO.!.@,...@.....A. u ...C`.t.LyL....IEND.B`.
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2876
      Entropy (8bit):7.869300876573546
      Encrypted:false
      SSDEEP:48:b/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODwAiU:bSDZ/I09Da01l+gmkyTt6Hk8nTl
      MD5:490AA5F7B6E477DCD469250ECF087363
      SHA1:8CEE767E4E593036A33348B2766013B7CAD750C8
      SHA-256:200B77FD30AEC8BD908FBF8F706480E87FA76ABDB3A9A29F34878CA8E31F9295
      SHA-512:01B7A0721D3060EBDCAA17749F39BCE49FE7B39150C6AE34DDC852FB4A563B76FB3CBD9EA770CF8DD39AF79302DAE2335B417D2CA1E0F4C1D6F591DAF95D636E
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR................a....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2784
      Entropy (8bit):7.898125953959213
      Encrypted:false
      SSDEEP:48:2ldHE8+JjpMNNa3OjboViS4nXsAYdPd3F58ZpiU54SN775OBf/6A:2XHt+JcNgOSiS4XsAYNpf2ESNwSA
      MD5:BCEF878CE6891793C22F6CC4D421F329
      SHA1:A3962106D5E5173A038999C8AA8F5CA4BF47379C
      SHA-256:894CDB8AE6C3BFB799075E4810F3971ACE713BF89BC5AB083CE958080CAFED70
      SHA-512:180533A000945F8392D91A3E31205E74A9B0F099C433BCD604ED0D404A789403D8DECCB9C292E02BCA1413A0083A8F744ECA6116D71C1042DF89D3C7FD1AEFAC
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR................a...9iCCPPhotoshop ICC profile..H..wTT....wz..0.R.....{.^Ea..`(..34.!...ED."HP..P$VD...T..$.(1.ET,oF.........o......Z..../...K......<....Qt.....`.).LVF._.{......!r._...zX..p..3.N....Y.|......9.,...8%K.......,f.%f.(A..9a..>.,....<...9..S.b...L!G....3..,....F.0.+.7..T.3...Il.pX."6.1...."....H._q.W,.d..rIK..s...t......A..d.p....&+..g.].R.......Y2...EE.4...4432..P.u.oJ..Ez...g.........`.j..-....-....b.8....o....M</..A...qVV....2.....O.....g$>...]9.La.....+-%M.g.3Y.......u..A.x....E.....K.......i<:...............Pc...u*@~..(.. ...]..o..0 ~y.*..s..7.g...%...9.%(....3........H.*...@...C`...-p.n.......V..H.....@....A1....jP..A3h..A'8..K....n..`.L.g`......a!2D..!.H... .d..A.P....B....By.f..*...z....:....@..]h...~....L.............C.Up.......p%....;...5.6<.?.........."....G..x...G.....iE..>.&2.. oQ...EG..lQ..P......U..F.Fu.zQ7Qc.Y.G4....G......t...].nB../.o.'.1.......xb"1I.....>L...f.3...b..X}..........*.Q.Y..v...G...p.(..........
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 8 x 8, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2802
      Entropy (8bit):7.86003370085237
      Encrypted:false
      SSDEEP:48:b/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcOD8rFl:bSDZ/I09Da01l+gmkyTt6Hk8nTEl
      MD5:36342E24BCA76F23721C920C97DC753B
      SHA1:04577788148D0955D9E4714142A3F25F714DAC90
      SHA-256:22067EA4CA01CE5C8C655CA6956F10480257250E06BABD1FACC32B095F78D1C1
      SHA-512:E01FFB2D86CAC026414D6F3E142A953CE02D1B740182176B73397107B11C5E5C1038B7F53D64C70A892B167FAC66DB069D24E90E87BDB21ED0230B2392BA1C10
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR.....................pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2838
      Entropy (8bit):7.867554233620986
      Encrypted:false
      SSDEEP:48:2/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODpFMr9:2SDZ/I09Da01l+gmkyTt6Hk8nTpKh
      MD5:053C99C0861AFA9F1818B917E52DEE42
      SHA1:B7495D17E30C80046E8C28A89D60E27A98DC9127
      SHA-256:C4424B85591917D64739F32B2AD98CF7B517A64AC63F5A2E0CDEC82B2EC24B83
      SHA-512:4F7B92675532CA18935EB5CE185AC1955F79DE5F2A052FE1DC13BFFFC005F4BA0B68A22E8573D13EDAB005270E6C19851300DE6A989BDD7806ABB2522033F17C
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR..............H-.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2836
      Entropy (8bit):7.865935447689982
      Encrypted:false
      SSDEEP:48:2/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODDLsN:2SDZ/I09Da01l+gmkyTt6Hk8nTDLe
      MD5:DB8437A8F2BC6FF9756AEDAFFE55122E
      SHA1:DA7ADE552ECB7FF2D5EACC5DE4818CA62AB8946E
      SHA-256:AA7D5A698596D06194515329C39767F7219162C1B2B8DB8CCD4311A16A0CA16B
      SHA-512:A5BEB564397C270EDC72A72C77B0E0EC096EBF1A5CCBE074A71B83587D4D538C5D073B02FE47416FE635A30B7F83650DC827C1CFCF99B25EFA6AB4BF8320D13A
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR..............H-.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 8 x 4, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2811
      Entropy (8bit):7.874236433479311
      Encrypted:false
      SSDEEP:48:0VocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcOD+/6u8:UZ/I09Da01l+gmkyTt6Hk8nT+SJ
      MD5:FAF4ED201C26BAE9E687DD4FF5456041
      SHA1:979627FEF736DE553C5AA0169720B04F85150111
      SHA-256:4BF8DEBD83FC146673F09E846BF62A2D6934D43E1D231BEB16E854652E2D7A94
      SHA-512:BDF7B5B41A50C378A689A0506FE91E7121738E877250CCF1F0A94E18C88E6F0FFC76D56E6FE7CAEDF13E83C75AC36BE53342E2B8922496BB878C5D616C2E655D
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR...............~....OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9., +.....3...!.[..b@q
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 8 x 4, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2808
      Entropy (8bit):7.8765574063891295
      Encrypted:false
      SSDEEP:48:0VocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcOD+/6TgQ:UZ/I09Da01l+gmkyTt6Hk8nT+S0Q
      MD5:24C86B20F3A1850116F0C4052490DB59
      SHA1:D61178F5C4875A7E4039FC3680204FBF26E1C815
      SHA-256:1909A2B9421ACE6C4610C8A967F6E477529132ACBC7474CA0ADBB0F7CEF1BB74
      SHA-512:69A79870610B6350A9AD5F2DB6BD073F7B0C62E790681C17F8AC6268594349698F09231D159394BEBC5C2FAC80A9F5259E4BF5D108984860A718D5D45EEFE485
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR...............~....OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9., +.....3...!.[..b@q
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):3171
      Entropy (8bit):7.899498876019361
      Encrypted:false
      SSDEEP:48:CldHE8+JjpMNNa3OjboViS4nXsAYdPd3F58ZpiU54SN775OBDVRDrLmt1UG7:CXHt+JcNgOSiS4XsAYNpf2ESNgLMUG7
      MD5:32466EAF2EE705725C4372710A5A3484
      SHA1:63DF604C3788457CB7DB6DDE90999F20C1B29B4C
      SHA-256:5D1A57C140142E3466D97B7CD17D364F6908A22C670E9DE7FAD93BDD90B5210D
      SHA-512:7B25063E9F92758A383BAF4A412AAAA5ACB9E5872A2C3B216079E22122781294256C59619463B90848C24CD4E71366C22B20094AE09B5A9C836D87E0F6FE70DC
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR................a....gAMA....|.Q.... cHRM...........R...@..}y.....<.....s<.w...9iCCPPhotoshop ICC profile..H..wTT....wz..0.R.....{.^Ea..`(..34.!...ED."HP..P$VD...T..$.(1.ET,oF.........o......Z..../...K......<....Qt.....`.).LVF._.{......!r._...zX..p..3.N....Y.|......9.,...8%K.......,f.%f.(A..9a..>.,....<...9..S.b...L!G....3..,....F.0.+.7..T.3...Il.pX."6.1...."....H._q.W,.d..rIK..s...t......A..d.p....&+..g.].R.......Y2...EE.4...4432..P.u.oJ..Ez...g.........`.j..-....-....b.8....o....M</..A...qVV....2.....O.....g$>...]9.La.....+-%M.g.3Y.......u..A.x....E.....K.......i<:...............Pc...u*@~..(.. ...]..o..0 ~y.*..s..7.g...%...9.%(....3........H.*...@...C`...-p.n.......V..H.....@....A1....jP..A3h..A'8..K....n..`.L.g`......a!2D..!.H... .d..A.P....B....By.f..*...z....:....@..]h...~....L.............C.Up.......p%....;...5.6<.?.........."....G..x...G.....iE..>.&2.. oQ...EG..lQ..P......U..F.Fu.zQ7Qc.Y.G4....G......t...].nB../.o.'.1.......xb"1I.
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 8 x 8, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2802
      Entropy (8bit):7.861531898056138
      Encrypted:false
      SSDEEP:48:b/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODQ:bSDZ/I09Da01l+gmkyTt6Hk8nTQ
      MD5:9DD1092BA0D5B0AA805FF78728052FD5
      SHA1:799E9FE238D3D3B62D34B3F21F2C5F0F275999DA
      SHA-256:910A084AC16C65AA71E79AAE4884BA010EEE5DE6E9E8ED671E080DE335400421
      SHA-512:076FD1AF94F67AB359AC2FD6F8978A1B9D515F4A2791515530271141846BD84D1F8E726A972EC84962471C760143D010A5ECBD3F32E23CDAA57CD3BBF8FAAF29
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR.....................pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 32 x 32, 8-bit/color RGB, non-interlaced
      Category:dropped
      Size (bytes):320
      Entropy (8bit):6.988275403142871
      Encrypted:false
      SSDEEP:6:6v/lhP12/6TSlQE7EelEQ1Zsr9n9xhyhY8yjhjvegmjniSVdwup:6v/792/6TeQUSr9n9Llhjtv/UiSAc
      MD5:1BEB398B37A81C6F743A7BCD8076477D
      SHA1:3F60B75477D49793B0B91746C519D28CBA8D9EBD
      SHA-256:E2CFF5756D4C0496BF6864EB36436D9426849CF2CAB678B8B2F360607DA8110C
      SHA-512:309EDD39FEB63270CBDD6FA06D0E4AEE86C580476DBAA4A58307D780CB357C151375397903091B91B3109974DA5EDAA9ABEF3C4953ACEEDD17151B5072C5DDA5
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR... ... ............pHYs.................IDATx..V...0.........L+{.k...l.M6;...P@^.u.&.......Hp..f&..8.y..e1..7.......E....y.w.....E".ZD.z...w.6tPk..|....|.....tP......K.]w.R..W.n.........c,9....ZD.2P..z........u.p.%.....<...(K...F9.q]N...,.....*/.6Z;E...F....m..G7.m.1....2.o.......IEND.B`.
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 8 x 8, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2827
      Entropy (8bit):7.867316892820178
      Encrypted:false
      SSDEEP:48:b/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODy+paUW:bSDZ/I09Da01l+gmkyTt6Hk8nTJW
      MD5:5B6EC4EEBF6FDF67C3C6FBD673A46370
      SHA1:53181029FBEA06AED2E663392654737696F5B4CB
      SHA-256:8F6C088620C842670EC544DFC4B0313795D8E52C4203472848CF9558D06D1597
      SHA-512:3A9478F764F5AA6FDD239B4217DD9A60AD600CD0F06F108AD23F9F2BFDC71387457F35DCEC3B66F497C00A838BF7940A6E3C9AF718B3FBCB73ADF0A212395A0F
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR.....................pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 8 x 8, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2843
      Entropy (8bit):7.868357699094754
      Encrypted:false
      SSDEEP:48:b/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODOzF:bSDZ/I09Da01l+gmkyTt6Hk8nTOZ
      MD5:212B43546F774BEB2ABB9D7A1B7B5076
      SHA1:78AF6E84B7DD56CEED551580D6634FF40D0B9ACA
      SHA-256:0E3C193F90CA6E0109584D51036DB71EFF5EE8E5A2D17994EFFC379A94893DD3
      SHA-512:638E4414A7B24234C03811C0C638C62A89090E9FE8A5909D3CA82F6B3940F81C6381128664787B44CBDAFAAB44D583A0BD1572E2BBCB454CF4718CB8F769A5A6
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR.....................pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2871
      Entropy (8bit):7.870767548972718
      Encrypted:false
      SSDEEP:48:b/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODcF:bSDZ/I09Da01l+gmkyTt6Hk8nTcF
      MD5:C988D0BC16B46F5D878944FBF953132C
      SHA1:C0B39AC1FE4476E016C5A450B4479905BCAC11C5
      SHA-256:5E9D32D1168A13BF9C112D3696968F2A6B4ADC3FCCA0C4970AFF07B3F105DF1B
      SHA-512:FDE833EDE566D846E1C9898E0B5EAF01A52E03AA71C91790547CF41CC2EAA72F07DA2EEBEF5301FE346DB08943F80B7A36D5CF304C7CAAEC0E07162E2D8CB0CF
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR................a....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2877
      Entropy (8bit):7.8734940498364185
      Encrypted:false
      SSDEEP:48:b/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODXM:bSDZ/I09Da01l+gmkyTt6Hk8nTc
      MD5:9F6B685443F0035E01BBC75B8D0368E2
      SHA1:37CCDA24A3B031E4D17558EE5FB5F5EBB52A7CF9
      SHA-256:3D58D6E3496AD46DF8D450C07F3ED38CD5EA2BC39399634A7F8D28AF85D6F36D
      SHA-512:0B73CC057D5EA8FD2BBB6EA2D664FA23948B294FD9D9100DC563820DD54EC15D0DCF618C36CF0399818ED13B50D9BCA435FB79DEFC73EB610ACD7A044A4047E5
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR................a....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2975
      Entropy (8bit):7.8649855935944375
      Encrypted:false
      SSDEEP:48:27/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcOD/AV:27SDZ/I09Da01l+gmkyTt6Hk8nT/AV
      MD5:C0AD6235DA2F86747861A36538AC70F9
      SHA1:7A171C42FA927323189647D7BEECA7349623C615
      SHA-256:F93F51EA88F7636BF442F963A944105C984D89266AB4FC7258389578348F9692
      SHA-512:752E24A4A24289440D5682D850B450E277AB3CC8A914FA6BD851EE71B85D71D70E03BC6F257728A61EA87FC65EA2F330E821F8871395CACF1050AA55794ECE22
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR... ... .....szz.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 10 x 10, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2830
      Entropy (8bit):7.862535708330178
      Encrypted:false
      SSDEEP:48:8/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODc:8SDZ/I09Da01l+gmkyTt6Hk8nTc
      MD5:21064FD5CAC8F583FBA95AA6953111F3
      SHA1:158A51FC11058CFB003E8CB45545E66D2E7FD81F
      SHA-256:DE9246A393815B14492002F3CC4D859F56FBC1CF9C49E06E075F4691D7CA021C
      SHA-512:10A3196D8BFA2F343740C2DD8B3CE8F326CE275DEF5B361E79AC838C2F6CC2836C90184BBE5E17F10AF1161BBD8AA5FA6789F057CF378E3906ECDE494B2CDF6F
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR..............2.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 10 x 10, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2837
      Entropy (8bit):7.8661845192086775
      Encrypted:false
      SSDEEP:48:8/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODWiYh:8SDZ/I09Da01l+gmkyTt6Hk8nTvYh
      MD5:74EA6C1EC3302A30AC47AAEA7BA3AFD5
      SHA1:7E3DE37638F605228D702FBF9AE275B2FFA2467D
      SHA-256:26BAC352EEACB2139C645948DAF380FD54154B6E3473BAD6517412C736E47220
      SHA-512:84C5C545CE6A8DF0FE228ECD4262AD3FCFDBD0CCF10327982E785C7A30B9A6274367B1078046890BF5470BBA531641F14B4E46E44F7A08BF281AD83AE89CCE0F
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR..............2.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):3098
      Entropy (8bit):7.882667962977238
      Encrypted:false
      SSDEEP:96:bSDZ/I09Da01l+gmkyTt6Hk8nTAC5Beq2K:bSDS0tKg9E05Tb5wqR
      MD5:C0F38553BDFD691A26D624AC3FEC0D1C
      SHA1:50CFA6315550065669BD48912EC5CA34E837EFD8
      SHA-256:2A18CABADF86772481B7A59F157255DF469494A50DDBEC37AE69F73A3B54C132
      SHA-512:F8A78AE47FEF7C762E061E9B5D450AA201A85B0F50375F844A5174CE9BF1793E70AA27C3FD948BC1F564E272ED59FF31074055388A6C33BE13F97D383BFA93DB
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR................a....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 23 x 18, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):394
      Entropy (8bit):7.193650253140461
      Encrypted:false
      SSDEEP:6:6v/lhP4InDs1iXVul/QOLh+0LrKVISIs2fsenV5P8jImCWRagC2J0xOJngZbzxGm:6v/7QHEXM1QWjDVVZ7WJ0cJObAE9
      MD5:EA3D34758ABB1A8D437DF38A005A371B
      SHA1:67F6881C0542FA2BF316396984045F670CB36350
      SHA-256:A9FA831F1A4BA646AE08DC38FC3F8E0C87AD5B5D2F60E83795FE4A3D33DD7B3F
      SHA-512:2A97913834864DCE58C78CD84D9A82454CDFE1F329976FE8583EEF2B01423F04F462BBA2B737FFC516FB3F8C4927EBDE693F7AA98296802EC649708BD4C76875
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR...............E.....tEXtSoftware.Adobe ImageReadyq.e<...,IDATx..=..0....b.....3.7.[X...{.K.. ......6....h#.n.....N...D..%....B_.4.I{E.....q..M...UUE?x.....].-I../..8..$...,+r].r{.u...EA..8>..s..1(n../.u.....b.......0..8.Y.,[.....B.4.9.A.m...c..m......8.....w4?.......a..Mg..-UU.M.2.sQ.#EQ<.l.e9b.0.o..i.......'........0..~...^P...........o...o.....$1....IEND.B`.
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 27 x 18, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):3076
      Entropy (8bit):7.877665076819138
      Encrypted:false
      SSDEEP:48:x/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcOD6CpzYGCZN:xSDZ/I09Da01l+gmkyTt6Hk8nTBpzC
      MD5:63EC748BA3EE9D5878A13517FC057B8E
      SHA1:34433D0E95BF119F57AB9A4D655733F8B9979764
      SHA-256:74C028A7D741885103571D493D69B1362083AD225957607EC8FE3473C9D9C6A3
      SHA-512:5B86C7EA5BB33121433C41F72625D30E5FAC4E66858C49C59618B07BDFFF8DC37EE71AB80B260740317340F23B5AFDE63800FF0B7C57206F8AFE8F241EBE481C
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR....................pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 23 x 18, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):480
      Entropy (8bit):7.3467258325775875
      Encrypted:false
      SSDEEP:12:6v/7QHHwMobOEQkkcoJHw55TQaTsybKLU0MlgFLciT:6BuDHwLdbKtMiHT
      MD5:350CFCEC86B83D85A4A60C62D0B97F0D
      SHA1:CDB19CE66B2C09BF3704DEE19B76090F251578B4
      SHA-256:054A094D3D73DDDAAA46F2194000D5EE514D1F824EC554214BBBC4643E126718
      SHA-512:8679F9EBEDBC995AEEB3F9C25A5F0399120C7B471C79CDF81B07F881DFDDD99873BDD601EB7AE040791E1A340D1955A5B3391D94240A8CC04952281D0314F401
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR...............E.....tEXtSoftware.Adobe ImageReadyq.e<....IDATx.....@......,...1..br&..o..X.....K.@z..{..+Z.!....@...."...eA..$..v...fg...R.4....=.F..O..&..oZ.d2.[.%.Q....\...o.v.e......Uh.............\.... .ey.8....>.E.B..!.$.....t:W....I.E......x.$%}..=..8F...&a.{.bI=0+...x..adY....v.....p.u+.~.l6[......bI..<...d.,._..0|.........4-+.>p..o..w..k...........-.... .J8....q...j..R.O...[.s+{RW..z..j.z.....%.&...._..5/..^h..........a.....IEND.B`.
      Process:C:\Windows\System32\msiexec.exe
      File Type:TrueType Font data, digitally signed, 19 tables, 1st "DSIG", 23 names, Macintosh, Font data copyright Google 2011RobotoItalicGoogle:Roboto:2011Roboto ItalicVersion 1.00000; 2011R
      Category:dropped
      Size (bytes):160736
      Entropy (8bit):6.406235756728495
      Encrypted:false
      SSDEEP:3072:rPfJaXF3u4IV+ejFFT5Y+E75LOiH6LuVZmxAHoShcZX/oV/B:rPBaXFhdx6LuHNIqcw5
      MD5:93B13A58DEDEEBE519846555A543523B
      SHA1:2A5AD885C7E58322832E6E651156FFC131E27F2E
      SHA-256:470123C6FB5D6C0005431C0F5390742497C55087361A7636B7E82EB35635DED7
      SHA-512:A0552548C6C0986EBB7B245AD0D4C147A6BD73FEFDCCB095DEA59423D203CF57556F33175984BD30E3F815504F2D581B31955D98B3D70773F88543B592A43C98
      Malicious:false
      Reputation:low
      Preview:...........0DSIG......s.....GDEF.`.a...<...HGPOS.*`.........GSUB.&.....$....OS/2..)........`cmap..N4........cvt .T.q..j<..."fpgm...R..j`...%gasp......j4....glyf.e........cXhead......L...6hhea...4.......$hmtxn..........4kernwal}......0.loca.Mm...:.....maxp.4.~..C.... name7.&&..C,...4post..b...F`..#.prep.....s....M.........................4...$./...H.H...O.P...R.R...h.j.........................,..DFLT................kern....................K.T.p...w........<.B.H.............>.`.f.......&.L.r.x.b.h...................8.R.`.~...........j...N.`.v.............@.f......... .F.L.R.X.^.....,.J.h.................".D.f.........L.....N.l.~...............2.8.N.T.j.p.............6.X.^.......6.d...........8.Z...............................f.....8.Z.|.........................J.`.........:........ . B L!6!.!."0"6"X".".#.#.#B#X#r#.#.#.#.#.$.$.$.$P$f$|$.%p%.%.%.%.&.&(&v&.&.'X'z'.(J(x(.(.).)()v).).).*.*(*:+$+r+.+.,.,J,p,.,.,.,.,.,.,.-.-.- -6-X-r-.-.-.-......@.b.|............../ /B/././.0.0@0^0x1>1H2.2p2v
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 24 x 24, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):1489
      Entropy (8bit):6.937783205392521
      Encrypted:false
      SSDEEP:24:k1hpunQWwh82lYSKwg5F6KrVnT3ZyJ3VV5FPg5/G1DJkzRimgVO4nz7tpZugNG2Z:qitvnLJb/t0J37bIhQg4/VOgpbx
      MD5:9B48C0BFDD449F486856313661EA6B65
      SHA1:441EFA7E9CA9C297244C2755039A89ABC1461786
      SHA-256:4D225F27C9976D1D83B81F6CE3A0BF5636715F7A48539E4CE730EF1AF7AD4D41
      SHA-512:F2CA6CF4BA86A28AEAE3F5874D46AEBB1DF698F52B4E3516C0282E7B8EDCC5CFD7B54C94A1710876FCBAFF648C6E8E954B6B2157B265902CDADE82BF19B4C42E
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR..............w=.....tEXtSoftware.Adobe ImageReadyq.e<...diTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:751DC2B63460E211AC65BF1B98CD7C88" xmpMM:DocumentID="xmp.did:B31057CD603711E2AE60E3892217AA0B" xmpMM:InstanceID="xmp.iid:B31057CC603711E2AE60E3892217AA0B" xmp:CreatorTool="Adobe Photoshop CS5 Windows"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:771DC2B63460E211AC65BF1B98CD7C88" stRef:documentID="xmp.did:751DC2B63460E211AC65BF1B98CD7C88"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>..+.....IDATx..=,CQ...kK.T........X$.:X.b0...*F....I.
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2812
      Entropy (8bit):7.86184881742406
      Encrypted:false
      SSDEEP:48:b/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODna:bSDZ/I09Da01l+gmkyTt6Hk8nTa
      MD5:92BED1361E9D9153A03FC511E53200F5
      SHA1:68A026D12742851DDBCC7857A299F9EAA311326E
      SHA-256:66078DD3E9027C1C1B2806B5E61ECEA4C94FFA2443319FD57C946BAD6E100BD8
      SHA-512:4934258571A8729AC839F792D1E83448DE876D71852883A92453A88EA49DDAE55890E3F1E17087632F23A4D9B1124C5A977D60E96806FE4348DC191F6A9BA802
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR................a....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 1 x 1, 8-bit/color RGB, non-interlaced
      Category:dropped
      Size (bytes):2791
      Entropy (8bit):7.8621000348376775
      Encrypted:false
      SSDEEP:48:+s/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODM:+sSDZ/I09Da01l+gmkyTt6Hk8nTM
      MD5:0EF0B9F99CF01B5651916855B573CA40
      SHA1:836D500234DC72C3E1597C9FCC20FFA6874E4A38
      SHA-256:C92F44352266051BC2F319BC3D1211646E71E88D00212C91933D6D441B00BE7F
      SHA-512:097006D890983016B58D1E6F0BD0A899DA2E41BC73960D6B4A63F9938B9D2153DC72AD6CDADC3297FCA5BA30DD8CA546BCBE13A6C0416C1658209220922EFFFD
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR..............wS.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
      Process:C:\Windows\System32\msiexec.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):1053
      Entropy (8bit):4.955264747326076
      Encrypted:false
      SSDEEP:24:CWsX+Y0Xe9EAcXBUVV/A4NVnY9ybrxIl8H9fD8Gv6vq0t:A66EAcXBUVV/A4NVKGH9fppo
      MD5:2A3C034D75002CA9AD566D6BDE453A09
      SHA1:CCAA60817A2C30C93A6EA94666AB69F2E6F0FD3A
      SHA-256:0FCDBDAE1432456BF0B00B008BC716A5275E4A3006E9B50A3DF291463FA8B3A2
      SHA-512:EA9A4640144CD76F3DF66B0EC042CFB93DCF6E7D82FC18D9B9B69E9F9C1373B09E369154C446B79F713B6B7C2D3F6C663D43A9944666420A6C57C5195F7081EA
      Malicious:false
      Reputation:low
      Preview:{..."FileVersion" : 3,..."Version" : 1,..."VersionName" : "1.0",..."FriendlyName" : "UDP Messaging",..."Description" : "Adds a UDP based transport and tunneling layer to the messaging sub-system for sending and receiving messages between networked computers and devices.",..."Category" : "Messaging",..."CreatedBy" : "Epic Games, Inc.",..."CreatedByURL" : "http://epicgames.com",..."DocsURL" : "",..."MarketplaceURL" : "",..."SupportURL" : "",..."EnabledByDefault" : true,..."CanContainContent" : false,..."IsBetaVersion" : false,..."Installed" : false,..."SupportedPrograms" : ...[...."UnrealFrontend",...."UnrealMultiUserServer",...."UnrealRecoverySvc",...."UnrealLightmass",...."CrashReportClientEditor"...],..."Modules" :...[....{....."Name" : "UdpMessaging",....."Type" : "RuntimeAndProgram",....."LoadingPhase" : "PreDefault",....."BlacklistPlatforms" :.....[.....],....."WhitelistPrograms": [......"UnrealFrontend",......"UnrealMultiUserServer",......"UnrealRecoverySvc",......"UnrealLightmass
      Process:C:\Windows\System32\msiexec.exe
      File Type:C source, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):7130
      Entropy (8bit):5.426756168912859
      Encrypted:false
      SSDEEP:192:zL4AqyUsMOuVYtz01RK3aaAO11jE5rk3mj:zL4phDVYteREaaAO38rk+
      MD5:D208B31651C247CFEB156BC99B67C75D
      SHA1:333DBD45D79179E7DA82598CE5E4CC8F94F1AFE8
      SHA-256:A4E6AF7300AAC34098B68B4A0A2798221BF77E68941D1DB4D732351159486122
      SHA-512:8BE8FAF775650B4942483BA2E7210BBDE04B90198F588E78CFBC9FA031BE26A2EAC8549B34F0B8183740D57F28F9AE82721F2A47E17F9DD2285EACFFF3585948
      Malicious:false
      Reputation:low
      Preview:// Copyright Epic Games, Inc. All Rights Reserved.....// handle differences between ES and full GL shaders..#if PLATFORM_USES_GLES..precision highp float;..#else..// #version 120 at the beginning is added in FSlateOpenGLShader::CompileShader()..#extension GL_EXT_gpu_shader4 : enable..#endif....#ifndef USE_709..#define USE_709 0..#endif // USE_709....// Shader types..#define ST_Default...0..#define ST_Border...1..#define ST_GrayscaleFont.2..#define ST_ColorFont..3..#define ST_Line....4..../** Display gamma x:gamma curve adjustment, y:inverse gamma (1/GEngine->DisplayGamma) */..uniform vec2 GammaValues = vec2(1, 1/2.2);....// Draw effects..uniform bool EffectsDisabled;..uniform bool IgnoreTextureAlpha;....uniform vec4 MarginUVs;..uniform int ShaderType;..uniform sampler2D ElementTexture;....#if PLATFORM_MAC..// GL_TEXTURE_RECTANGLE_ARB support, used by the web surface on macOS..uniform bool UseTextureRectangle;..uniform sampler2DRect ElementRectTexture;..uniform vec2 Size;..#endif....var
      Process:C:\Windows\System32\msiexec.exe
      File Type:C source, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):247
      Entropy (8bit):4.772084734516376
      Encrypted:false
      SSDEEP:6:4xMgm9LCpxDZhysjf0A/FBFTAVI2z6x4MjpOe6LS:4xMgmpCrys/TAKhmZegS
      MD5:57CDB5700C86980027AEECBB438CF921
      SHA1:68F34555F22616D10AA8D1444B363E6959D7D96D
      SHA-256:56420086CE3D8A813F1F01C9A026AAFB46FB461B5BE0CBE2A826BB905A05B18D
      SHA-512:494317BB8D2002387E67BEB77E269DD9BA441C8EAFE1314CA1312C4B14806858E50219A25B207686FCEEDFBDC58EB08B4C004ACC62A253502F48CCEA356F9733
      Malicious:false
      Reputation:low
      Preview:attribute vec2 InPosition;....varying vec2 textureCoordinate;....void main() ..{...// We do not need texture coordinates. We calculate using position....textureCoordinate = InPosition * 0.5 + 0.5;.....gl_Position = vec4(InPosition, 0.0, 1.0);....}
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):24814032
      Entropy (8bit):6.61377507951845
      Encrypted:false
      SSDEEP:393216:zOXVPufF3cxFp83+M4LAYaPEfCnxUQvXX//fHYU7vIFGvAtTMJL7zX3ZU7d:aJuWxFi+M4pWnxnn/3l71gT4Xod
      MD5:52D1E3FA3C64EB023B5E2D0A14C582AC
      SHA1:57B21E64028A7ABC9EC0939E0BE4A483B95C865F
      SHA-256:FB5935F713A90F44E36268E7845233EEE431BF9D993B71369CAD0FF7B0118C30
      SHA-512:CB100EEA7A4FDCD73D2B0CC02AEBDB228EA506637F6C6E9F164B76FF90A272F4E18D8F1C48F0F67B0D67E749DCFF29FB72532052F35B0C45071388168CCC8005
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...................................p...........!..L.!This program cannot be run in DOS mode....$.......R.4...ZP..ZP..ZP...P..ZPM._Q..ZP.Z.P..ZP.^Q..ZP.YQ..ZP.[Q..ZPM.^Q..ZPM.\Q..ZP._Q..ZPy..P..ZP..P..ZPM.[Q:.ZP.._Q_.ZPG.^Q..ZPy..P..ZPy.\Q..ZPz.^Q..ZP..[P..ZPy.[Q..ZP..^Q".ZP.._QN.ZP..^Q..ZP.._Q..ZP..ZQ..ZP...P..ZP..XQ..ZPRich..ZP........PE..L...z38e.........."......v....m...................@.................................m.{...@...........................W.......W.p.....|..............hz..9....}.0....]U.T....................]U.....8UQ.@...............,.....W.@....................text...J........................... ..`.uedbg..=n... ...p.................. ..`.rdata....;.......;..z..............@..@.data...`$%..`W......FW.............@..._RDATA...'....|..(...Dn.............@..@.rsrc.........|......ln.............@..@.reloc..0.....}......xo.............@..B........................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):17872
      Entropy (8bit):7.153735246661642
      Encrypted:false
      SSDEEP:384:mbWfhW7+Y3DGk8ZpH3GCJErK9LsS+Y3DGUGq8JN77hhcy:/+DGkiRBEYLsmDGt3hey
      MD5:4B91D0429B73A1264196D33E68E34590
      SHA1:3797ADBC0A7FA69C93E92F365A6C2752EB3159DA
      SHA-256:8741EF421E17186E20EED219AE1C38999BD57BF655C69828C751ECC866F3C366
      SHA-512:3EB4E8327587A3B9897B245C57EADEC72DF0A06564ECA6F3DD032289081B12E55EA3C8F29A1284FCD03A870F60BB9EAA55DDBB8EE41DD2F306B48A29C3EBD095
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L...g..............!......................... ...............................0......e.....@.......................................... ...................9..............T............................................................................text............................... ..`.rsrc........ ......................@..@....g...........;...T...T.......g...........d...............g.......................RSDSi?...e.t[l.W.Y.....api-ms-win-core-console-l1-2-0.pdb..........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02....................g.......................(...l...........&...I...k...................[...................,...Z...................=...^...................I...v...................K...r.........................................api-ms-win-core-consol
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):17360
      Entropy (8bit):7.148717476886636
      Encrypted:false
      SSDEEP:384:mXQWfhWPe+Y3DGk8ZpH3GCJEFxJo7+Y3DGEM98JN77hhuV:eBIaDGkiRBEaDG83hwV
      MD5:8153A83C61B397EC05126E100C1EBC43
      SHA1:44FDAD765281C9EFF2956A77AAE2F4918EC6D365
      SHA-256:076B0C0FC207608E2866383A2E37EE8E876AFDD067B4CD2BDB32250764218835
      SHA-512:920945108097B4B758AFD7A21BDEF58B6075B19F192C387C1885484F3FFCBA8F2F799395952AA6555574DE8E520E0C53135F2125C6EE8A8C5255080F24EB84A1
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L.....1............!......................... ...............................0............@.......................................... ...................9..............T............................................................................text............................... ..`.rsrc........ ......................@..@......1.........<...T...T.........1.........d.................1.....................RSDS..gi...R....7.....api-ms-win-core-datetime-l1-1-0.pdb.........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02......................1.....P...............(...8...H...................t.......................api-ms-win-core-datetime-l1-1-0.dll.GetDateFormatA.kernel32.GetDateFormatA.GetDateFormatW.kernel32.GetDateFormatW.GetTimeFormatA.kernel32.GetTimeFormatA
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):17360
      Entropy (8bit):7.224137599556334
      Encrypted:false
      SSDEEP:384:mPWfhWG+Y3DGk8ZpH3GCJEFxaD+Y3DGELOFG8JN77hh22:PtDGkiRBEyDGbFh3hA2
      MD5:7C4F941EABFA3285C56B812C190D5A48
      SHA1:1E316D51EEEF1467FD7DDF4BE55504A78239A148
      SHA-256:78347E7862ADC452CDF178B06D1CCF7401162838D320BD74C6CE34FF1804EB95
      SHA-512:DF3C343A252C44492DFD1F1DC9D048140788B4BE912A0792354EB37F5CE0188E5B5DDE63C4658B358F98005D98F93F6A8D6698FB7C8997F8D20B3BACCD4D2711
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L.................!......................... ...............................0............@.......................................... ...................9..............T............................................................................text...}........................... ..`.rsrc........ ......................@..@...............8...T...T..................d......................................RSDSD..H]F..$.JN..=....api-ms-win-core-file-l2-1-0.pdb.........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02...................................D...p...............#...P...................;...g...................<...m...............%...Z.........................api-ms-win-core-file-l2-1-0.dll.CopyFile2.kernel32.CopyFile2.CopyFileExW.kernel32.CopyFileExW.Crea
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):16848
      Entropy (8bit):7.247430853810146
      Encrypted:false
      SSDEEP:384:m4rGpWfhW8+Y3DGk8ZpH3GCJEFx5v394qxq+Y3DGEY8JN77hhelG:xGeXDGkiRBE9vN4q4DGu3hQlG
      MD5:4AB8150E796F0CA19F4AD2FB64150646
      SHA1:FF15AAEFF3DBC40129C467A135DDA60BF3117735
      SHA-256:BB37792496D6BA917BEB211D3976A82D4F9DCCB6F6B9FB87F9491E0CA82BF947
      SHA-512:5EF0EED7E6FEA932336C953D3A571091E73DA4D61C73B05380B2180C70E16D8DD34AF8E5D289B89CED43389E547C6CDB5693DB40CF76FCA22A094E15FE0EB381
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L....6.............!......................... ...............................0.......v....@.......................................... ...................9..............T............................................................................text............................... ..`.rsrc........ ......................@..@.....6..........>...T...T........6..........d................6......................RSDS.E._).(.*R..&.......api-ms-win-core-rtlsupport-l1-1-0.pdb...........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02.................6......F...............(...4...@...~...........l.................api-ms-win-core-rtlsupport-l1-1-0.dll.RtlCaptureContext.ntdll.RtlCaptureContext.RtlCaptureStackBackTrace.ntdll.RtlCaptureStackBackTrace.RtlUnwind.ntdll.RtlUnwind.
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):18384
      Entropy (8bit):7.103823239247684
      Encrypted:false
      SSDEEP:384:m6Y3eRWfhWFI+Y3DGk8ZpH3GCJErS2B+Y3DGU8J8JN77hhAAB:pGCcDGkiRBExDGQ3hK6
      MD5:4A643A9B6C4A6DC39C9BE0FED6792FAC
      SHA1:00B071365192D22067C9A31E41F69B15B0DC1E64
      SHA-256:C737F548852321F30520ABC558546CD62AB35AB101903D109CD369C49682ABDD
      SHA-512:D9556388B146371F2E576205214AB640E81A5E98B6701C24A8A29C45B06A98DB4EB3613AE28826A1B022B2ECB4C2F7D7E87C1C6B6818C3D9E07B71B8CEBA50DC
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L....-.............!......................... ...............................0.......x....@.......................................... ...................9..............T............................................................................text............................... ..`.rsrc........ ......................@..@v....................-..........7...d...d........-..........d................-......................RSDS..y....o.e(.........api-ms-win-crt-heap-l1-1-0.pdb..........d....rdata..d........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02.........-......6...............(...........c...................S.......................1...V...y.......................<...c...........................U...z...............:...u...................&...E...p.......................,...U...
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):23504
      Entropy (8bit):6.900379472394773
      Encrypted:false
      SSDEEP:384:miZpFVhXWfhWS+Y3DGk8ZpH3GCJEr658R+Y3DGU+8JN77hhW2:b+NDGkiRBERPDGa3h82
      MD5:E864FFC0D71C3EFBEA0BEC283BC0921E
      SHA1:4D4BB35EC424DE6C54E20B94D2AE81F0A132525F
      SHA-256:0FA1970365DE9B681A2025E33FB4A18EE509286FA6288EFD3265FC2F2AB98BBF
      SHA-512:6A68749F8C5E8D60D127C19DF225AC3813199F7D45BEDA6256BB51756E4205A22F6DA27994BB485B8E6F5203998C0322905F7C3975B59A0390493F4DE3C21F14
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L...1.............!.........................0...............................@............@.............................a............0..............."...9..............T............................................................................text...a........................... ..`.rsrc........0......................@..@v...................1..........8...d...d.......1..........d...............1......................RSDS....i..y.FBW.}.....api-ms-win-crt-stdio-l1-1-0.pdb.........d....rdata..d........rdata$zzzdbg.......a....edata...0..`....rsrc$01....`0.......rsrc$02........1......^...............(....... ...................<...y...........)...h........... ...]...............H...............)...D...^...v...............................T...u.......................9...Z...{...................0...Q...
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):23504
      Entropy (8bit):6.886972961049936
      Encrypted:false
      SSDEEP:384:mEiFMx0C5yguNvZ5VQgx3SbwA7yMVIkFGlTWfhWK+Y3DGk8ZpH3GCJEr96/reYrW:z6S5yguNvZ5VQgx3SbwA71IkFD1DGkiw
      MD5:18422C38DEF645AD0486C1314BC0D5AA
      SHA1:36CC7176357C418F01CC3AA9829E0C61AC4ECA7F
      SHA-256:A5ED1A22EB5E3AC01780A50ABE4C6EAC33A13D07D9863CBDFB549EBD55CB18F1
      SHA-512:52CF57B22ADAA77DBFF77ABB9C56C76346F429D1A268E286E149B3FE64236901B0DDCF9003AC3D41BDC7C5D7C991216D2F6F659FBB25DAC6FF2DCB6F4D9FDF5D
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L...#............!.........................0...............................@.......6....@..........................................0..............."...9..............T............................................................................text............................... ..`.rsrc........0......................@..@v...................#.........9...d...d.......#.........d...............#.....................RSDS.Hx..iz.u..X..+)....api-ms-win-crt-string-l1-1-0.pdb............d....rdata..d........rdata$zzzdbg............edata...0..`....rsrc$01....`0.......rsrc$02....................#.....,...............8...........W...s.......................#...B...a...........................<...[...z.......................;...[...{................... ...A...b...........................<...X...r.......
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):248272
      Entropy (8bit):6.687157681428619
      Encrypted:false
      SSDEEP:6144:Y2y3hhQZpA2C/VFuGEcL6hmDCYfM1+/e7VR8AocazlBQdSkIuVxRYy12z/VszBRA:At+zsM1+WkzRuVxRYPzS/o
      MD5:8C5B8534B0C109DB8A5A5AB87D12694D
      SHA1:EA90974A783DBED4A75C21B99B41D5CBB654F76F
      SHA-256:CEA5D28EF647C7E92B7A2D4079467E7B398DD2657D661CCFFBA22E1E644FE7D1
      SHA-512:85933C706FA19ABF1B5A8E373F8D9D41DD7281791A2C62EEFF56D46FD8C1DD9D00824EA762D3A3455F9024065AB6E8AF4DAE0AC56329FE3A3F51D9215D4DC588
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........HD...D...D..../..F...M.~.N.......A...D..........O.......C...............E.......E.......E...RichD...........PE..L....h.].........."!.........x...............0......................................p.....@A.............................K..<r...........................9.......+...;..8............................<..@............p..8............................text............................... ..`.data....4...0...2..................@....idata.......p.......N..............@..@.rsrc................`..............@..@.reloc...+.......,...d..............@..B........................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):171472
      Entropy (8bit):6.8632776689309605
      Encrypted:false
      SSDEEP:3072:CZBtkzIR4IBNvjmKJ7VDoeRLaauW4OIU7bhI/D:CZjNvjmKAeRuauW4OIk+D
      MD5:05963BB57765610B241F909C61222B54
      SHA1:C8BE433CAEB7B40F43A293F0080ADAF361EC9CDA
      SHA-256:3B8D61A4A9B13C073623D17E423763C89F76B76623818F22BD5CFC678717DEB2
      SHA-512:E8B59F0672CF1E7D0E4ECFA109114672202DCC94D31CDA6D2E9A308E2E50B833AB827D80DB043889599E77F74DED66E7D54700BC96A6D1FC147A062C33E195A2
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......[..,.............p........g.......~......~........{.....~......~......~.............~....Rich............................PE..L....h.].........."!.....(...<...............@......................................w.....@A........................p1..@....Q.......`...............d...9...p..H....\..8............................\..@............P...............................text....'.......(.................. ..`.data... ....@.......,..............@....idata..`....P.......4..............@..@.rsrc........`.......B..............@..@.reloc..H....p.......F..............@..B........................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):267216
      Entropy (8bit):6.588374771004298
      Encrypted:false
      SSDEEP:3072:bELZACU+1yBQ3lC9GDBKUW4m0CuQKD2gyZ2KMHWyKMvCyyOaHJ:b43sJZduQKDfKxjJ
      MD5:8B0AC8B28ACFF4A4D2E73C81D1B87C07
      SHA1:9D6F157A80F956AA2C1F4D56C8B639E64BEAF78E
      SHA-256:C213D8F19D6E3646F89F57B35A117CD817D45E475DAE24022B1AA0A9A00500A2
      SHA-512:43171085B51F974CEAA9F68CA8BCD91AE3017798857A9F104DF883359F2D8D68F802505AE2341AC4938BA25CD0C33E09ADAF3F2DF163D7C827E5F9F5749C67CF
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............n.W.n.W.n.W..YW.n.WJ..V.n.WJ..V.n.WJ..V.n.WJ..V.n.W+.%W.n.W.n.W.n.WJ..V.n.WJ..V.n.WJ.5W.n.WJ..V.n.WRich.n.W................PE..L...$k.].........."!................................................................4)....@A.............................=...............................9.......T..pJ..8............................J..@............................................text............................... ..`.data....p.......n..................@....idata...............p..............@..@.rsrc...............................@..@.reloc...T.......V..................@..B........................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:Generic INItialization configuration [GatherTextStep0]
      Category:dropped
      Size (bytes):2536
      Entropy (8bit):4.843153305065177
      Encrypted:false
      SSDEEP:48:rB5TP7ZzQf1v1Y9aVfXwdwuPjRa+c1GYmTp1mTccXd:1dP9IduYGYmTpUTcct
      MD5:182B94417A7CC0873EB923A6184106F7
      SHA1:E9A2EEF7949931BD90D60577537EB6183E6EC3FD
      SHA-256:D8EB752E6BBF0481025F1ABDEC7005775F12E0AF645350C9888ADD89E02D8D47
      SHA-512:2E48184F21DDA5E3CB9CF64D6179B232AD3C3AE85C8B8AF486777300B95C63799B4F6BC36ED3C18A2D4B3AC1039F4FDF075A8088831855DABA0E7D6BD2ED02A6
      Malicious:false
      Reputation:low
      Preview:;Gather text from source code..[CommonSettings]..SourcePath=../Portal/Content/Localization/App..DestinationPath=../Portal/Content/Localization/App..ManifestName=App.manifest..ArchiveName=App.archive..PortableObjectName=App.po..NativeCulture=en..CulturesToGenerate=en..CulturesToGenerate=ko..CulturesToGenerate=ja..CulturesToGenerate=zh-Hans..CulturesToGenerate=zh-Hant..CulturesToGenerate=de..CulturesToGenerate=fr..CulturesToGenerate=es..CulturesToGenerate=es-ES..CulturesToGenerate=es-MX..CulturesToGenerate=it..CulturesToGenerate=ru..CulturesToGenerate=ar..CulturesToGenerate=pt-BR..CulturesToGenerate=pl..CulturesToGenerate=tr..CulturesToGenerate=th....[GatherTextStep0]..CommandletClass=GatherTextFromSource..SearchDirectoryPaths=../Portal/Source/..SearchDirectoryPaths=../Portal/Plugins/Online/..SearchDirectoryPaths=../Portal/Plugins/Social/Source/..SearchDirectoryPaths=./Source/Runtime/Online/BuildPatchServices/..SearchDirectoryPaths=./Source/Runtime/SlateCore/Private/Fonts/..SearchDirecto
      Process:C:\Windows\System32\msiexec.exe
      File Type:Generic INItialization configuration [GatherTextStep0]
      Category:dropped
      Size (bytes):406
      Entropy (8bit):4.8682639760409465
      Encrypted:false
      SSDEEP:6:RYvafvWG/uyKFyxNW9tVkuAMrH1Cv/ly8CJd+oUuFuXo8uHMWuA6:avafuGGyeyxmRAMTcvNyV/Uy8o8sjuv
      MD5:96EC04DB88ACDE6C03534BB21DC33C4F
      SHA1:98802454B7954AA314AA31104157783CC4E188B5
      SHA-256:48733147980A8C27DE86F56B8C08A8B4002D61911A45EC26BB3719418FB07BC6
      SHA-512:92F58E034A7BFD88846DEBC107FDFB7C99E00298283A355AD72D0B75979623ABF4B061FD6EC003A1C53BE6A122AB9DCC807E34A073B69755BBC6914B70EE0A2D
      Malicious:false
      Reputation:low
      Preview:[CommonSettings]..DestinationPath=\\epicgames.net\root\UE3\Localization\WordCounts....;Write Text Localization Report for Launcher App..[GatherTextStep0]..CommandletClass=GenerateTextLocalizationReport..bWordCountReport=true..SourcePath=../Portal/Content/Localization/App..ManifestName=App.manifest..CulturesToGenerate=ko..CulturesToGenerate=zh..CulturesToGenerate=ja..WordCountReportName=LauncherApp.csv..
      Process:C:\Windows\System32\msiexec.exe
      File Type:OpenType font data
      Category:dropped
      Size (bytes):77068
      Entropy (8bit):5.564962637120109
      Encrypted:false
      SSDEEP:1536:/xUQ7Pceijik1wQwVnJlxY7eA1qqjRNa:/x/rceijik1S1YKAtna
      MD5:AFF3816458DB70AB4F77058C0E1C95E1
      SHA1:3AE85C92BEE209D20076244DEEC96B837D40C25A
      SHA-256:316E61D5DCAE18705AA4EA45544701D62F71B90C06D28124DD8D27E54362D3D2
      SHA-512:8482574D9894951371AD015FD6A0A737B00F772A53405131C6E187C7F845EA6F1719DC9314ECD57560F3FA16F7B30760F8521853968223121DF065F65FED858C
      Malicious:false
      Reputation:low
      Preview:OTTO.......0CFF .dQf........GPOS.Z.v...p..o.GSUBlF.........NOS/28......L...`cmap K[w.......Phead...........6hhea.......4...$hmtx.olM...X....maxp..P.........name>..~........post...2..,.... .........BrutalType....+...................\.....L......."......................$.+.1.7.=.C.I.O.V.].g.q.x............................................... .'.-.:.G.M.S._.f.l.r.x.~......................................... .'.0.9.@.G.N.U.\.c.j.q.x............................................... .'...5.<.C.J.Q.X._.f.m.t.{...............................................#.*.1.8.?.F.M.T.[.b.i.p.w.~.............................................'.3.:.E.N.V.^.h.q.z.................................).8.G.U.a.m.y................................. .,.8.>.I.T.d.o.}.........................O.Znbspaceuni00ADAmacronamacronAogonekaogonekCacutecacuteCcaronccaronDcarondcaronEmacronemacronEdotaccentedotaccentEogonekeogonekEcaronecaronuni0122uni0123ImacronimacronIogonekiogonekuni0136uni0137Lacutelacuteuni013Buni013CLcaronlcaronN
      Process:C:\Windows\System32\msiexec.exe
      File Type:OpenType font data
      Category:dropped
      Size (bytes):723096
      Entropy (8bit):7.28772273600336
      Encrypted:false
      SSDEEP:12288:XOHfqa8iGiJGkjvy3FUZXtzmYOoAHhkdrUHBXkSAQwV6Y2ZzFn+xTlVglPPBWNzv:eHia8iLJGkbh9mPhHWABXBBy6bZzkhsI
      MD5:2B82C13AB4F8EF1C66D960592507EB91
      SHA1:C43D1DBAEFCE1AAE358F101D10A27DE06168B4C3
      SHA-256:98C59A80695784CD71611161802AF0E660B14611B27B6FCFC4E45249CD18FD5F
      SHA-512:6544A616554FEF81431B65DDC9DC5D3E26233D789CF1D26C1576BC0500D62F9A12784FFCBF4413270D56C4C8F88CA75F1A5344A532C3B0A1E9E7730A61491E69
      Malicious:false
      Reputation:low
      Preview:OTTO........CFF ..........r.OS/2..l.... ...`cmapI,.....L..Klhead..wZ.......6hhea.U.........$hmtx.~....]...84maxp..P.........name...........post...2....... ..........j3_.<.................%@A.........................p................................P................2.................................X...K...X...^.2.E..................h.........otmn... ...p.......M`.............. .....'...........[.y...........J...........Z.........*.B...........J...................................J.........*.l.........#.............l.....................2...........8.p........./.F...........J...........Z.........../...........8...........X.........T.(...........8...........8.........T...........F.........................b.........d...........p...........^.............8...........X.....................$.............X.........$...........N.|.......................X.C.o.p.y.r.i.g.h.t. ... .2.0.1.4. .A.d.o.b.e. .S.y.s.t.e.m.s. .I.n.c.o.r.p.o.r.a.t.e.d.....L.i.c.e.n.s.e.d. .u.n.d.e.r. .t.h.e. .A.p.a.c.h.e.
      Process:C:\Windows\System32\msiexec.exe
      File Type:OpenType font data
      Category:dropped
      Size (bytes):5598136
      Entropy (8bit):7.43855846663227
      Encrypted:false
      SSDEEP:98304:k8e8gk6xZdQ7eCjC7S5Jy+MAwAkX5nFCSSrdP9JR7jUKINnUpcV3QSIZdtyV4tvQ:k8Zgk6xZ+POYJy+uFENx9P7jpG9B5Cd6
      MD5:48C0572B995C73023FA5126531875F27
      SHA1:53D84407546EAF3750E29C615BE922A635CDB34D
      SHA-256:FD53D8A66A876179A3EC64C877253BC95F38676AA733A3AD8B102507AD2198D9
      SHA-512:D25676FCA1B1774430D2C0706F093AD0D86C1B5ED5731AE069EBDF9E95C44C2C10C79668171D0BF07B3E8921CCA9D8D921FBE86BA4D7057704F83B092DCA48AE
      Malicious:false
      Reputation:low
      Preview:OTTO.......`CFF .........P..GPOS....S_x....GSUB.....T....%.OS/2.....Q....`VORG4....T%.....cmap.....Q....y9head..`t.P.....6hhea..Z..Q....$hmtx.J..P....D.maxpQ*P.........name..Z..Q......post...2.S_X... vhea..g..Uk....$vmtx3....T)...B...P.Q*...........NotoSansTC-Light....V....................*...w......q.................O........"....Q.......%..K...$................y.............$.<.V.n...............6.V.y..AdobeIdentityCopyright 2014, 2015 Adobe Systems Incorporated (http://www.adobe.com/). Noto is a trademark of Google Inc.Noto Sans TC LightNoto Sans TCNotoSansTC-Light-AlphabeticNotoSansTC-Light-AlphabeticDigitsNotoSansTC-Light-BopomofoNotoSansTC-Light-DingbatsNotoSansTC-Light-DingbatsDigitsNotoSansTC-Light-GenericNotoSansTC-Light-HDingbatsNotoSansTC-Light-HHangulNotoSansTC-Light-HKanaNotoSansTC-Light-HWidthNotoSansTC-Light-HWidthCJKNotoSansTC-Light-HWidthDigitsNotoSansTC-Light-HangulNotoSansTC-Light-IdeographsNotoSansTC-Light-KanaNotoSansTC-Light-ProportionalNotoSansTC-Light-Propor
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):184
      Entropy (8bit):3.838633147388876
      Encrypted:false
      SSDEEP:3:wq/AVBukKcIliWLo5/lAW07llzXlSL1SERoll/mVllAlm+SJWljt/ItELitldIt2:wKeVKlM5/lAbhl5EEbm+PmtEG6tE/
      MD5:AE9ACD1FB33FC98E55DA1A9F92D9665D
      SHA1:05BEFC38F6A42FA9F6020A083FB484AA6CC7C3DD
      SHA-256:238C69B3A1C30530DBA8C1E9A9A9E44B99D41CAD2E1F4E26B660A59C881E4EDE
      SHA-512:9846199C8E2FE67A1163D96A4AB0EA50B8EB070013B7E061269CBEB73739777C4D2B16D9EC1DC91938978EAEA8009975DABB6C9A4C537EB9A0E0D34C7994BB70
      Malicious:false
      Reputation:low
      Preview:O.L.hHU.lLF.p.P|.....en.....en/App.locres.........ar.....de.....en.....es.....es-ES.....es-MX.....fr.....it.....ja.....ko.....pl.....pt-BR.....ru.....th.....tr.....zh-Hans.....zh-Hant.
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):119333
      Entropy (8bit):4.88211447225401
      Encrypted:false
      SSDEEP:1536:AQmafDGWrpfZp5WR5mRQGnAVIUFS58U0Y01EasWcyRZGEQ0x87XQtd9gs:FmafDVXp5o5mRQLVIUlpG74ZGE8qv
      MD5:81DE46A9B58C43129003132F36004C35
      SHA1:20E73629EB4AF646D37240B10BBC382B43A4B755
      SHA-256:CB551780F80744B5D4F4F64C98B2539DB390253E912B0A94F7722D1ACA85E168
      SHA-512:7B5779401CE831FCE66A92FD7EEEA32380C47FF87D0FFA0AFD4D25F45CBB0059FB62CB013C6F6A7A89535B08E58380091905463F4F06B018F8116DF9E38AB21A
      Malicious:false
      Reputation:low
      Preview:..tugJ..J....7..........&...=............k......h....FriendToastAlreadyRequestedFmt..R.............FriendToastPlayerBlockedFmt.........b.......DownloadComponent_Required............)...SystemRequirement_ProcessorCoreCount_One..^X.....4...(...SystemRequirement_HddAmount_Recommended.@s.g....`wW.'...SystemRequirement_MemoryAmount_Sixteen..W.Z.....D.#...SystemRequirement_MemoryAmount_One.F.......E..^)...SystemRequirement_ProcessorCoreCount_Two.~.'T.......$...SystemRequirement_HddAmount_Minimum..Fo.......x.....LocKey2DAssets.............#...SystemRequirement_MemoryAmount_Two..5.......s.Z*...SystemRequirement_ProcessorCoreCount_Four.0..Q......+.$...SystemRequirement_MemoryAmount_Four.V..~....?9..+...SystemRequirement_ProcessorCoreCount_Eight....Z....v..%...SystemRequirement_MemoryAmount_Eight...{....W?tE....CabinedMode_MessageLink..{........l.,...RunningWithMissingSystemRequirementsWarning.N.=.....;C......ProjectFilePathTooLong...R.......Q&...FriendRequestNotification_Description....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):121870
      Entropy (8bit):4.89970118059248
      Encrypted:false
      SSDEEP:1536:2QlYqCMWiQRv1dF19AiMXG9yeCBWVXCK+AHtKfArb/ixOsVJT:rlYD7RvXF19T9y4RUAnIr
      MD5:C403A2BDE9FDCFA5C331031EDD65C2A5
      SHA1:80A28C1CFD60F121B17FC6E39CB541B19BAEAA53
      SHA-256:D57FABF9D27001EB040D171232AC7CF7CA6A02E033F23B1723B58C191C82D4DA
      SHA-512:06AEF3C80E4B9F89FFCA0D594515BA546042E4AE2A92DB4070302C27ECFCFEA0CE85BFA29DAF3F112692C12DC26419D686635766E91A8DD030D7DCD34EFB9320
      Malicious:false
      Reputation:low
      Preview:..tugJ..J....7...".......A...>...................h....FriendToastAlreadyRequestedFmt..R.............FriendToastPlayerBlockedFmt.........b.......DownloadComponent_Required............)...SystemRequirement_ProcessorCoreCount_One..^X.....4...(...SystemRequirement_HddAmount_Recommended.@s.g....`wW.'...SystemRequirement_MemoryAmount_Sixteen..W.Z.....D.#...SystemRequirement_MemoryAmount_One.F.......E..^)...SystemRequirement_ProcessorCoreCount_Two.~.'T.......$...SystemRequirement_HddAmount_Minimum..Fo.......x.....LocKey2DAssets.............#...SystemRequirement_MemoryAmount_Two..5.......s.Z*...SystemRequirement_ProcessorCoreCount_Four.0..Q......+.$...SystemRequirement_MemoryAmount_Four.V..~....?9..+...SystemRequirement_ProcessorCoreCount_Eight....Z....v..%...SystemRequirement_MemoryAmount_Eight...{....W?tE....CabinedMode_MessageLink..{........l.,...RunningWithMissingSystemRequirementsWarning.N.=.....;C......ProjectFilePathTooLong...R.......Q&...FriendRequestNotification_Description....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):92529
      Entropy (8bit):6.182706569771407
      Encrypted:false
      SSDEEP:1536:3vxBPg7imb9TFqZurLiY2xIIM4E+vxW+rCqmmkaheuVBFS5XFb1N:jPKP9po8LifbEpBmtheuVBFS5XFbH
      MD5:59D496A88AAC240DFD07EBA428BB81F6
      SHA1:E86A5BE876415E46B910986B4B9BE79BF1203596
      SHA-256:68131D7805655542AAC873CE3563968F1531163216C267025AC0BA9738E1A4C3
      SHA-512:8D29AEED681E49A76AEFB43C202588E97043269453916E8547E1CEF6D3C4EB22BC7965BADEFA30397EF00C8DBD165D3FEFFA99600E9CC3A710DF6050A71E983D
      Malicious:false
      Reputation:low
      Preview:..tugJ..J....7..........+...<............f......h....FriendToastAlreadyRequestedFmt..R.............FriendToastPlayerBlockedFmt.........b.......DownloadComponent_Required............)...SystemRequirement_ProcessorCoreCount_One..^X.....E..^)...SystemRequirement_ProcessorCoreCount_Two.~.'T......x.....LocKey2DAssets..........s.Z*...SystemRequirement_ProcessorCoreCount_Four.0..Q....?9..+...SystemRequirement_ProcessorCoreCount_Eight....Z....W?tE....CabinedMode_MessageLink..{........l.,...RunningWithMissingSystemRequirementsWarning.N.=.....;C......ProjectFilePathTooLong...R.......Q&...FriendRequestNotification_Description..........WC"...SelfUpdateNotificationDescription..*vP....!.~."...NewEngineNotification_Description.io..........%...VaultNewItemNotification_Description.........%.......ProjectPathTooLong..g......z...&...LibraryMyProjectsTutorial_Description....".....$..#...RealIdVerification_VerifyIdCommand.........8.......RealIdVerification_Title..}.......|.%....AcceptEulaUserCommand_N
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):127055
      Entropy (8bit):5.417477440001432
      Encrypted:false
      SSDEEP:1536:8SAaPqDPrGIuxlYqSGuYQVIP9KYuS39DoMXZqLGoeL8gXB:JAayDqIclYqLQVIP9hNDRpqLPeL8gXB
      MD5:130C021FF0CD4E1FC3F75205078EAA90
      SHA1:1B66E0B940F54F91D7B774B2D27348500FDC6814
      SHA-256:AE737ADEE34C768E933C6830496B90CBA482F51110A7F3D98E74F5054ABDD298
      SHA-512:5C1AF0FD3DFA66DFA91B4D5FFDB82503866A5F680EC0933D1291377FBA3FF6B852007E04D9208E9C7B57B73A8A20F7E7171DB777DC1BFBE645C011A8B9FB0943
      Malicious:false
      Reputation:low
      Preview:..tugJ..J....7...........:...:............r......h....FriendToastAlreadyRequestedFmt..R.............FriendToastPlayerBlockedFmt.........b.......DownloadComponent_Required............)...SystemRequirement_ProcessorCoreCount_One..^X.....4...(...SystemRequirement_HddAmount_Recommended.@s.g....`wW.'...SystemRequirement_MemoryAmount_Sixteen..W.Z.....D.#...SystemRequirement_MemoryAmount_One.F.......E..^)...SystemRequirement_ProcessorCoreCount_Two.~.'T.......$...SystemRequirement_HddAmount_Minimum..Fo.......x.....LocKey2DAssets.............#...SystemRequirement_MemoryAmount_Two..5.......s.Z*...SystemRequirement_ProcessorCoreCount_Four.0..Q......+.$...SystemRequirement_MemoryAmount_Four.V..~....?9..+...SystemRequirement_ProcessorCoreCount_Eight....Z....v..%...SystemRequirement_MemoryAmount_Eight...{....W?tE....CabinedMode_MessageLink..{........l.,...RunningWithMissingSystemRequirementsWarning.N.=.....;C......ProjectFilePathTooLong...R.......Q&...FriendRequestNotification_Description....
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):119457
      Entropy (8bit):4.8400705953091085
      Encrypted:false
      SSDEEP:3072:9a3oweT5TU24z73qnokLB6Hs2pHheUnafDVQFb:9a3of424fqnBKsQYi
      MD5:B79BE4CFB5AC286876995C832210F30B
      SHA1:69FEC01EF80E5D8916C25F9CD56A6472D7340853
      SHA-256:537BBC99405DAF3533EF491BEAC34A9955F80085F3BFA036DC22EE0D0EE11649
      SHA-512:FC0C5B38CD8B2DDEBE8B5732674EA8A93DF64FACEB983F27001B8FB0E70472B763CD7D08F52A28AEC52A2549DFF19528217FB5AC24C36A445CDFC630D5F0C134
      Malicious:false
      Reputation:low
      Preview:..tugJ..J....7....R......N...............S.C.l.o.u.d.S.a.v.e.C.o.n.f.l.i.c.t.R.e.s.o.l.u.t.i.o.n.I.m.p.l._.T.i.m.e...G..........S.t.a.t.u.s.S.t.r.i.n.g.F.o.r.m.a.t...G..........F.r.i.e.n.d.T.o.a.s.t.A.l.r.e.a.d.y.R.e.q.u.e.s.t.e.d.F.m.t....R..........F.r.i.e.n.d.T.o.a.s.t.P.l.a.y.e.r.B.l.o.c.k.e.d.F.m.t...............P.r.o.d.u.c.t.N.o.t.i.f.i.c.a.t.i.o.n.B.a.d.g.e.0...G..9........D.o.w.n.l.o.a.d.C.o.m.p.o.n.e.n.t._.R.e.q.u.i.r.e.d...............A.s.s.e.t.V.e.r.s.i.o.n.S.e.l.e.c.t.o.r._.N.o.V.e.r.s.i.o.n.S.e.l.e.c.t.e.d......s........N.o.t.i.f.i.c.a.t.i.o.n.B.a.d.g.e....@.i........O.n.e.C.h.a.r.a.c.t.e.r.O.v.e.r.L.i.m.i.t.F.m.t...$..........S.y.s.t.e.m.R.e.q.u.i.r.e.m.e.n.t._.P.r.o.c.e.s.s.o.r.C.o.r.e.C.o.u.n.t._.O.n.e....^X.........F.r.i.e.n.d.P.l.a.y.i.n.g.....R........S.y.s.t.e.m.R.e.q.u.i.r.e.m.e.n.t._.H.d.d.A.m.o.u.n.t._.R.e.c.o.m.m.e.n.d.e.d...@s.g........S.y.s.t.e.m.R.e.q.u.i.r.e.m.e.n.t._.M.e.m.o.r.y.A.m.o.u.n.t._.S.i.x.t.e.e.n....W.Z........S.y.s.t.e.m.R.e.q.u.i.r.e.m.e.n.t
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):84403
      Entropy (8bit):6.163657449592362
      Encrypted:false
      SSDEEP:1536:wvAGLKHjLubVLugV4uBj2iIVxUsuyIBfR3DLWm8m:PGL8+b5us4qLIVxUsuDR3DLWm8m
      MD5:3C92003E50D2B24B4A9A627B2F47E9FB
      SHA1:17FD18C4FAD3C83C872E93A63D85E0D6DC67EA10
      SHA-256:1EBE495E88B2B897EB5F84CD2E10598761F80803C4033CEDCDC86EA7C30B9223
      SHA-512:5D5D017B9BD5E8869CD6ACA08C32FC188F37EDCCF00BAF9952532BD2E60E6E94DC5D93F4923D9D47CF8582578EA3FF95EFA3A319DEF4B05EF9698B93FFFC6F0F
      Malicious:false
      Reputation:low
      Preview:..tugJ..J....7...L.......?...A............}......h....FriendToastAlreadyRequestedFmt..R.............FriendToastPlayerBlockedFmt.........b.......DownloadComponent_Required............)...SystemRequirement_ProcessorCoreCount_One..^X.....E..^)...SystemRequirement_ProcessorCoreCount_Two.~.'T......x.....LocKey2DAssets..........s.Z*...SystemRequirement_ProcessorCoreCount_Four.0..Q....?9..+...SystemRequirement_ProcessorCoreCount_Eight....Z....W?tE....CabinedMode_MessageLink..{........l.,...RunningWithMissingSystemRequirementsWarning.N.=.....;C......ProjectFilePathTooLong...R.......Q&...FriendRequestNotification_Description..........WC"...SelfUpdateNotificationDescription..*vP....!.~."...NewEngineNotification_Description.io..........%...VaultNewItemNotification_Description.........%.......ProjectPathTooLong..g......z...&...LibraryMyProjectsTutorial_Description....".....$..#...RealIdVerification_VerifyIdCommand.........8.......RealIdVerification_Title..}.......|.%....AcceptEulaUserCommand_N
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 25 x 42, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):1308
      Entropy (8bit):6.852237502717288
      Encrypted:false
      SSDEEP:24:e/1hpunQWwjx82lY2T32HEVRzDZzLyJ3VuCzq3nz8GtT+8YxwEhraTSoH2:eNitNn2V/ZGJ3wwS8EY+qaXH2
      MD5:4612417B04BD2AD36428505187C670B9
      SHA1:ABFAD8FF9C2AC5B0CCC7891C3BD593C7C28918F1
      SHA-256:8A2A175258525E35F3938F621342D6B3F0B6D4F4AD181C428C50D8F832F8A161
      SHA-512:3BFC0A9B7F7C2A95966431E4E03AC6419F76D207C74AE412775CACC2F8B15E54DEF22CC2BFF5FC6FF9FD120774233E8FC77709D0BAB517093BD3457635441639
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR.......*.....F..`....tEXtSoftware.Adobe ImageReadyq.e<... iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS5 Windows" xmpMM:InstanceID="xmp.iid:7D505AAE216D11E4A91EE223E65513C3" xmpMM:DocumentID="xmp.did:7D505AAF216D11E4A91EE223E65513C3"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:7D505AAC216D11E4A91EE223E65513C3" stRef:documentID="xmp.did:7D505AAD216D11E4A91EE223E65513C3"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>........IDATx...GCQ....=......=..$z.!.S.Co...#..........}.1J).%..f.0.....9.....s...>v.....1&...(+...rI...0.!U.._/
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):1200
      Entropy (8bit):6.522679056200555
      Encrypted:false
      SSDEEP:24:b1hpunQWwjx82lY2T32HEV+bKdPLyJ3VOZiKnSbGHxpp2t7OCaFKhax:BitNn2VYQeJ3MZzkazMt46ax
      MD5:15340F70A977D657E6254C6D459B558C
      SHA1:6AD8615CF148BBE43E3777869A9861DA05FA2313
      SHA-256:7F3E73F1EB832E8D2F0B6DFE1C284C62B979ADF1CAA3EBA518B5C75A718248CD
      SHA-512:54ED8B528EABCB718CB67BF69803292377379A88A15BD8161187F8A61E7610257C92BD5852C5D958E91FEF3DB3387A19DAC8BD4F6E8D552FDE224987390D8E7C
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR... ... .....szz.....tEXtSoftware.Adobe ImageReadyq.e<... iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS5 Windows" xmpMM:InstanceID="xmp.iid:B8C02CED643011E4AD80B6C79874A8A2" xmpMM:DocumentID="xmp.did:B8C02CEE643011E4AD80B6C79874A8A2"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:B8C02CEB643011E4AD80B6C79874A8A2" stRef:documentID="xmp.did:B8C02CEC643011E4AD80B6C79874A8A2"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>......&IDATx.b...?.@.&......u.....q..1..d/#..e.f..@.....s....`..f.......O.p...A..a. .HG...,...:...@.....b......ak .DC.
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 21 x 21, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):1147
      Entropy (8bit):6.441055684423205
      Encrypted:false
      SSDEEP:24:+Ny1he91Wwjx82lY2T3ouVv6qyJ3VoPbNGFvrFESm59PZVcXomB:+NwqQNn2xeJ3+uRbmPPgXR
      MD5:7885B14CE0D508431FD97F70FF163E19
      SHA1:07BA0210373A4DAA9C9F48824434420280EE78AC
      SHA-256:B0383F31C5E936A65B5BC9B319653183FF2FCE4D73EFC41AAB1A3CFBF42E4A99
      SHA-512:3B2888E552ECB0591A0AE5E0AD774F1C4B92B38A2159CCDD9C9614856920FB2E66EEAD2DAFB189CC95460180E8F3F368DD825CB73B2681290F8EB667B363ADD0
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR.....................tEXtSoftware.Adobe ImageReadyq.e<..."iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS6 (Windows)" xmpMM:InstanceID="xmp.iid:724E60DBDCA311E8985EB71D4E896818" xmpMM:DocumentID="xmp.did:724E60DCDCA311E8985EB71D4E896818"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:724E60D9DCA311E8985EB71D4E896818" stRef:documentID="xmp.did:724E60DADCA311E8985EB71D4E896818"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>S.......IDATx.b....,......T. ....T4.......W(0..cdC/.......c01...:C......j... ..bAj.j.........{J.u..@|.....5....`,..@
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 41 x 41, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):229
      Entropy (8bit):6.527961559934967
      Encrypted:false
      SSDEEP:6:6v/lhPyWwX6Z6jYt11TnBvj1bx+TKlbllbp:6v/7EVYtbTnBvhbx+TKlBz
      MD5:8A41D73F05DBFD9C896AD205B9FA3BD0
      SHA1:8E331B99A4002DA9A90D3FD4DAEDF1E590CC2D46
      SHA-256:C20DC130A6BF7B81EE61FA5DE42A811C65450B7B62DD4DD7A4A63F4AD8666BC3
      SHA-512:46EB19D23B8196D8C8E98271B06836CADF4473CF5040EFF60EE1FE229A69BBACA75CBE681899E76D6514C1B44DDC078DAA79CE69642804BF6A1F91DBA1DA9CE6
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR...)...)......`......gAMA......a.....IDATX.....0.EQ.J.....I.}<O....7.n...Q...6.>...}}<.Z&...9Z.W?......c..9^.P...d.I(dDR.2.$.2")..G.......#...HJ@.BF$% .HB!#...y$...I..<.P...d...u.Qyy....i.d..m.....IEND.B`.
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):230
      Entropy (8bit):5.613616744686092
      Encrypted:false
      SSDEEP:6:6v/lhPKwMDlM9RBNSZg7FJeFVD1rm4bbp:6v/7iwM5+BEcze1Pb1
      MD5:F553CF85D9C29DAF80FCCA53A43C5AAE
      SHA1:5936DE26F656CF3A44560215F7D4C7DC175E512D
      SHA-256:F583EAA3F6579C19D0DE91DCCAB376324EA0BE5AB9DA5FDE5CDC303873338075
      SHA-512:06E1B4187D70F71969C7E3EB23C13E5A9EAB980BDD2DF70F3B9961D1C40D2AF8FA223414E0295F16456BDC0BCE361CD8578F11EB4A927B45C374BAE2CB8BBA57
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR... ... .....szz.....gAMA....|.Q.... cHRM...........R...@..}y.....<.....s<.w....pHYs.................tEXtSoftware.paint.net 4.0.9l3~N...8IDATXG..1..0....`{m.o........$.I?PUw......................)n|N......IEND.B`.
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 60 x 60, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):6262
      Entropy (8bit):5.889952628677394
      Encrypted:false
      SSDEEP:96:Yald1dRXtmgkrQR5a1jf6Ok0ISrwx4at2FiSaeg:Yk/Xtm7ooTkPLZSaeg
      MD5:325118DE442B5F74B2345063434E9A96
      SHA1:E14435404EC45ABC9DCED55681B819E7A4CA48EE
      SHA-256:C934856C3B8C401C7CE6CE51AF18B789045CB7697D2A6DF012EF357F8D27BEB4
      SHA-512:95567A22871E909045B772EA545C77BD8931535517B2EF7B40CC77D7B2DB042CA0B31B5FB4CB4DFE8B93519F3A86FFD7684C0AF065B7BD0B51300BA0C02D3297
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR...<...<.....:..r...(zTXtRaw profile type exif..x..X[.#+..g.....@..y..........>..,'.$.........|.Y.YJUS..d..:5^.v...........!.......8=.\MCO>... ..,...tk..y......z@..vm+...q.}].......o.........`.Ni1q.=q..`.R....N\11rE...]oa..3.....;+..}1.F..;....`..t..m.....v.X.e\.mUo .w.Y....]..H...c+......yMq.|..r..U....|..;.AF..l.4..u.A.*.RA...Q>V.$K.a.../..........MO].kg.A..O..D.Fx#.....KA{.......z%w.......@......q...W..r`..`....n.r;.C4c...|....".-P...D%.R.%.B..+.i.T.4....I.Z....9....w...I.5...".....3......)....d.Q)R.)kVQ...Z..-..b.U..J.Zj..j.d..(.V..YkX.Ar....Z.s.]...k....g.!CG.5..m...qb.,.N.m.)..d.*..[m..6.e...n..........F...a.'.'kx.....p"...K..xq.`..9..rN..s.%x.$h)N.$g...EI6=...s/.......`.8u.....}...}...p7"...........T.'.o..W_.+.?&h..%c.e.4...xpB....I5.;.!.T....J2..oB..{..7\D3.}Ju#..V..p.,..:.......5By.Z.^esFD..O.D.k..x,...^N...66..H..+!#..3.9{..@)...).ge.................Q,|...*..T.....v.EC..kl..}..{.]Pj...x.pF..,..@....6....
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 14 x 21, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):1061
      Entropy (8bit):6.266755375918276
      Encrypted:false
      SSDEEP:24:K1hpunQWwjx82lY2T32HEVm5Y06yJ3VRQhm/GEJq/4A2:oitNn2V2rBJ3YM/S/u
      MD5:140D150202BC33B3353A233A5DFC6950
      SHA1:E8353A4C3FD5F36BFE45023E2E1DC194A3EB0771
      SHA-256:0BF3ACA3A64423B475B2A6FF1CAAC44E842E5122303A391F5E4EA2106DEDBD4C
      SHA-512:91A348DF2CD684E3839B2F06767F26D3892A00A1AEDE12C3A828A6499D51619BC90D6F5D5388C863A047E18965AE5249F8E7D0959FF107E27D819D6D9B194A8E
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR.............vY.....tEXtSoftware.Adobe ImageReadyq.e<... iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS5 Windows" xmpMM:InstanceID="xmp.iid:8543B8555E2411E4B6B68E73DD3D623E" xmpMM:DocumentID="xmp.did:8543B8565E2411E4B6B68E73DD3D623E"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:8543B8535E2411E4B6B68E73DD3D623E" stRef:documentID="xmp.did:8543B8545E2411E4B6B68E73DD3D623E"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.%'I....IDATx.b....8.3..A..T......1.9.A`/....n...9.A...[....~.q.9.a..\. ..=......X... p..9A.......8....yD...[-R.x..o.j\
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2775
      Entropy (8bit):7.898602525619176
      Encrypted:false
      SSDEEP:48:2ldHE8+JjpMNNa3OjboViS4nXsAYdPd3F58ZpiU54SN775OBf/6I8:2XHt+JcNgOSiS4XsAYNpf2ESNwSI8
      MD5:D6DA7897790EA93A092E333368EB0247
      SHA1:EA7EC2E57641A207D7A86EFFA8F724E9F8B3342A
      SHA-256:6AEBBE8C5B9B75FA909E82C916FABD64BB6E815A3938C58D9BC74440F8F784C7
      SHA-512:88F67FEEB53A74A4D7ADEA649E22E24DD67A35C43FF1FAC43F98BBFB1C67E1A8AFA81F6BCB00CA89A6C1E093747DD3096107D22CF87899A3915AA6D0DC0BBC35
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR................a...9iCCPPhotoshop ICC profile..H..wTT....wz..0.R.....{.^Ea..`(..34.!...ED."HP..P$VD...T..$.(1.ET,oF.........o......Z..../...K......<....Qt.....`.).LVF._.{......!r._...zX..p..3.N....Y.|......9.,...8%K.......,f.%f.(A..9a..>.,....<...9..S.b...L!G....3..,....F.0.+.7..T.3...Il.pX."6.1...."....H._q.W,.d..rIK..s...t......A..d.p....&+..g.].R.......Y2...EE.4...4432..P.u.oJ..Ez...g.........`.j..-....-....b.8....o....M</..A...qVV....2.....O.....g$>...]9.La.....+-%M.g.3Y.......u..A.x....E.....K.......i<:...............Pc...u*@~..(.. ...]..o..0 ~y.*..s..7.g...%...9.%(....3........H.*...@...C`...-p.n.......V..H.....@....A1....jP..A3h..A'8..K....n..`.L.g`......a!2D..!.H... .d..A.P....B....By.f..*...z....:....@..]h...~....L.............C.Up.......p%....;...5.6<.?.........."....G..x...G.....iE..>.&2.. oQ...EG..lQ..P......U..F.Fu.zQ7Qc.Y.G4....G......t...].nB../.o.'.1.......xb"1I.....>L...f.3...b..X}..........*.Q.Y..v...G...p.(..........
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):1470
      Entropy (8bit):7.021929820030502
      Encrypted:false
      SSDEEP:24:b1hpunQWwjx82lY2T32HEVh706ynyJ3VhJ0wMzAG9YbCB7zyKmrpCx+uJdGXSC38:BitNn2Vr7iyJ3rJ5OArFA4uJdIpu5
      MD5:F22AE42B558FE179842B476FA6253FDD
      SHA1:6682961EE769C50D28D0C8BD4AE6FE969F1BB566
      SHA-256:EF078450D1673A559D16016EF68C01A1DFDBFFF5D7414A1CD69B01F9D675BB68
      SHA-512:0FFE68CB85E164BC22E6134673C49845C4F0B0C5FD4E36A40C9872A62269780DC34FCB462D079A2062AA269E3E86B50CBD7956D01C668D5DE6B4B0D26FE6647E
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR... ... .....szz.....tEXtSoftware.Adobe ImageReadyq.e<... iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS5 Windows" xmpMM:InstanceID="xmp.iid:1E46F869B62A11E49DFA9DEA806E1BF9" xmpMM:DocumentID="xmp.did:1E46F86AB62A11E49DFA9DEA806E1BF9"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:1E46F867B62A11E49DFA9DEA806E1BF9" stRef:documentID="xmp.did:1E46F868B62A11E49DFA9DEA806E1BF9"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>..^....4IDATx....KTQ....J.C..G.EAd-l!H."n...E......]B....;....\....!-LJ.A..7b..?.5...^8...;.M....G.s....w.3.y^.<#.9..4
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 54 x 58, 8-bit/color RGBA, interlaced
      Category:dropped
      Size (bytes):1595
      Entropy (8bit):7.857832835145131
      Encrypted:false
      SSDEEP:48:5EITRneJp7WkNY6N1CWRxRoAAM+xyyQa5:LTku6N1CWxnq4yJ5
      MD5:9AFA3988952640A2B3B8FB76D67D316B
      SHA1:5E5C351DE9DBFCD4F3C353EFA31207D7BA3DE1BC
      SHA-256:54C817007F95EEF76F0AD04F439A45BC4D390DC6D7E81F9F85476247C5FAE0AC
      SHA-512:D30BA91B287945AA7B783DF0DACE8B54D1FFDC5361D8673E1828814CA371C98306AA0FEBA627019A562A976B13FD2B123B7F8022B9EAB3B62B662B945F3C6B6C
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR...6...:........0....gAMA......a.....IDATh..k..U....|..v..$..D.(E*.......=.p.....(H......I.%..B.....Z .`.A...V...<....>g.=3{..x6,...._k.3{.....i.F.!..=.>....(.N..K..G..`(.4.DL.!...1.lZ..U.....X.)....B..6.oY6....c{p.q......7h...!......c.H...-..8.C.N.])i.o5..B..X..EFv.H. ...D....g..brgX.F..t.s.....j&. ..$...u....s...t"...(..R0MB.74n...^A..).......$[:........c.t.-S.(.}.<..qR."V.Xf.B.A+`..)..z9.L.v.`...6u.;...:h.=.}!.A6.......N|H4....`.8.3..<....U...Em;.C...lh....D..ek4.....^[".n....>.d.6...-.(......S..B..Y.h.j..UN...8.p........s.5....0.>.l6.z.K,.a.56...h.......+.3.*..Y}.K8.x2)JJj.......$|[.-...*.lj...:.......x..k...../.%;.h...T..........f<..`;..}.h.n...;K7+.%G..k.P^...8.....J}PD.G..~.9K@.k.0.......o.H.=..~VL....=6.C.Bk...N..GzXo.../.f..Pd...0..".>[.k..m.'/".c.....`z...T...(.=rm.m......k.-..v..g[.-.1G.....[.#.....2^h.....z..^....6.y...R....m..S..l...c"...P....D..T.<\L.UyUE...X.z..i...s.4..m].`..i.....:.Qq...p^2....-..eT.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 94 x 19, 8-bit/color RGBA, interlaced
      Category:dropped
      Size (bytes):1676
      Entropy (8bit):7.848625343220426
      Encrypted:false
      SSDEEP:24:nZWHX5qIjr++shQUQ6mLiGJEiAAy0VqPm4SW8Rme9apoaN1/o6Y/ktJr2HyzJLp4:ZOs+sWUxxGJEHxz0megp1g6RnSHOJvx0
      MD5:5A3AA6D5FD9C8C443E826359E816ADC1
      SHA1:0F4F3D89372A577C11BF1342A29B3C214F5C9F6F
      SHA-256:56938F614AE3F54A4525DEE3FC5C0CFA0FEE4EF362E051FA0CBDE164AD27CCA8
      SHA-512:962871E2853FBE60310CA5E99FD8717EBAD68BB09D5E115921B2DB464A9DECD3672186727AA5FDFC647C1AEBA5F9BC2653A116997ABAC6BA5EA4156DBE65185E
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR...^.........n..J....gAMA......a....CIDATX..[.UU..=j.%HiE>T.......`.L....T....EX!i=.......B!.b&.F^(H2..HS.Q....c.W.?...=.\..c...c.1...c.5.........o..xZQ.7...O..Fz..G.<WZ......dl.z.C.wR..!.x.?,...RW...c.&<a1MI..P.q.$........_`.............Ne..((....l.pr.\v...G..._qP.7.n....d....Vs.;T....q..1|N..g...h..a...6.n..b........uAl........t.4Q.]...L;.b..Ic}..].,.=6.FAwB.dp..?..G.u..H.........t..%...5*.GNy.&..[..Pg&.7..5.$./&o.V..5..uu.e..Qk..[.....:.i.q.f..%..&.u/.....O.z$...~I@U].0A..g.w..Z.o .U>..E.$..o..2>..[.".L..."z.0n...r.uK..q=..y....Ekp.8.]`=:...?.G.-.m-.Y..dg.;q......;Z..'uzZSX?.]..~3......\..u9g.juy..sM....|E:.... B...&......#..<.^Q.J..p.#i....nOI.!.,...TkK\..v.E].i......V...<.(,.^..P."F.w...R?.8...r..4.w2.K...);p.F..G.:.!z....}.q=.;M{..'YlmJ.....@..G'|..q....??....n.s6.ol.i.O......j.......7.@.Zbx.W...V....h_.d~...@...M.....[/.y.os..>....I8@.M.....>....ZE.x...S.!.6j.2.X.......&;.M..9.qC..+.x]N.7...\.vz...
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 8 x 8, 8-bit/color RGB, non-interlaced
      Category:dropped
      Size (bytes):15605
      Entropy (8bit):1.8831790296550144
      Encrypted:false
      SSDEEP:96:mSZEZkIt+WsNXrNXpdns6l2sc5GvqRtmLvI:mSmkd5CRtmLI
      MD5:FC5FA847162FC6C31CFC24BB049BA84A
      SHA1:DB6D23032621FD0CBC63BCD5ECD87268A7E77332
      SHA-256:4A8A8525313022197A961D3B7A5950AEE6CC414EA1D8DCD7DA8508ED714DD740
      SHA-512:86A699D552C8CC132952A12DF3E3CCCA8D734C4660015882C36DE1D9C563DA6F8B86D5A64D254094ED2398281AC54436150FACA786768926684B0E5F957848B1
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR.............Km).....sRGB.........pHYs.................tIME.....3..,:a....tEXtFile Name.White.png4}.<..<.iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?>.<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 4.2.2-c063 53.352624, 2008/07/30-18:12:18 ">. <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">. <rdf:Description rdf:about="". xmlns:xmp="http://ns.adobe.com/xap/1.0/">. <xmp:CreatorTool>Adobe Photoshop CS4 Windows</xmp:CreatorTool>. <xmp:CreateDate>2014-02-21T18:19:21-05:00</xmp:CreateDate>. <xmp:ModifyDate>2014-03-01T14:51:08-05:00</xmp:ModifyDate>. <xmp:MetadataDate>2014-03-01T14:51:08-05:00</xmp:MetadataDate>. </rdf:Description>. <rdf:Description rdf:about="". xmlns:dc="http://purl.org/dc/elements/1.1/">. <dc:format>image/png</dc:format>. </rdf:Description>. <rdf:Description rdf:about="". xmlns:photoshop
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 100 x 100, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):1458
      Entropy (8bit):6.951576515675073
      Encrypted:false
      SSDEEP:24:D/1hpunQWwjx82lY2T32HEVfaEyJ3VZbGenjZwxp1/BL0SppYJrgi65:hitNn2VAJ3rxnjGb1/Rorgia
      MD5:F5AE6ED4F6477623346760A551C76F9B
      SHA1:59A3650F3646F76B5208EABC90659EE430FEFAEB
      SHA-256:E816E9578481D8AEF3B1E2AE31C90ACD079CF3E72D1664F65E52078AE09A581D
      SHA-512:5105246489A77C24D55480E9742E47757767E3D8A08436DEF391EBBE47A1F067B98A61CBBA74495E48B83CFA594C6AA2571D173ED4724EA2578B620A9002795E
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR...d...d.....p.T....tEXtSoftware.Adobe ImageReadyq.e<... iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS5 Windows" xmpMM:InstanceID="xmp.iid:D0176B67855D11E49C40B2CFB7253C4C" xmpMM:DocumentID="xmp.did:D0176B68855D11E49C40B2CFB7253C4C"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:D0176B65855D11E49C40B2CFB7253C4C" stRef:documentID="xmp.did:D0176B66855D11E49C40B2CFB7253C4C"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.#)....(IDATx...j.Q...{u..bcaa.+../`..m.......y..e+.46..@j....a.;73..FL.........V..?....:..I)e.`].Q.Q.Q.Q..........5.|
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 79 x 92, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2930
      Entropy (8bit):7.894013269883458
      Encrypted:false
      SSDEEP:48:SjhaZ1LxErX1lq2Eu2cCjQV7rxrCzwNKf1D9OXJyD85sN7frZpLBCDDI3Gfix3VV:GEZ1LxErl8O2caEAzz1OyD1Rd3Gaxd/d
      MD5:7CE7ECD66E505D97AA06DE25E065FD03
      SHA1:E6EEB2A1AF70189C6D0D082CC85E4B356C2C6A49
      SHA-256:F17427E900568571D18373B9BA80B7492F08A98F2D26F551CE670378B8A4C29E
      SHA-512:0D1E9C4DE8A484D58DB820261F86648743C61F5773E87FF70E9F86173F5A50FD59A86281F6939B596E00010874F01B03025898F6BE0E6D81B859E1E5E03E7F5E
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR...O...\...../v.....sRGB.........gAMA......a.....pHYs..........o.d....tEXtSoftware.paint.net 4.0.9l3~N....IDATx^.yTU...is.G.s........(.+.....[\R!Q\..T..*.'..b..1Q.K.V..5*....Q......qWx...;.;.e.].{*...|X..f..;3w.wg...v...~.....z/q.xL....+.....7.1..dO..U........La..y........+.A.^....(..)3P8...."..K...TW..xe.@.-..)...*.!.J.d..gH..x!....%^....*+...v..M..;wX..'.w.g.........u.....eHm4....RS..iS...v..'O.y..k.X.!]....};K.<...6a..6`........86rd:;z.%..<....Y.z.wMvv.....]j..?v...w.!..s.X.z$%.lP...m..F........pC...tHH.MLK.x..Zl........q......T..$..z.6.-6n.4.]...^.x..y......7nd..I..4..;w.%...Dsq..G...Q....&Mb..l0""^.fM..2v........qe.....(....o.....5...$..;-.h.....6..`.......;;"".......7k.L..W_m..F>|...;..y.&K8..O.?.6......._2..Q..+,.o...B..N.m../Kx...fk6.vy...._R..P.).x...x.Q.=....22.Z..TogG...UUqO..}.$^$..x...o.N..".W.'.......n...K....F..oFV...b...O......8q.J<....C.Q+.C.$C...U.%K..4j.x..U..(.;..s.[}..+./...x.c[.h..z..;f.......6l.
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 32 x 37, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2676
      Entropy (8bit):7.660170969036157
      Encrypted:false
      SSDEEP:48:NccNn2yHNeJ3nJ42kg4UohoVoGMHM1K1VQQJCyGZMN8XS3KhHq2y:qk2CMJ42kg49hoCHIK1VQQJJDuX22y
      MD5:B8CFEAA877203C1CC390786ABCD22452
      SHA1:06BB5673D5C91EFEA71A291CA67E237B51E3711C
      SHA-256:3BD7790E029BEFE06EA7FFC09F5914D8040E5DC8334AE1BEA0042C8A96351AB9
      SHA-512:5052F9C409F59E1952F8E66FBA2360DEDA3C8F04A5602CB10981EE2C01A657B29CE0041374B0C88D1CE071E56134BFF948EBD9AB111E1F310E0496887C0CEAE4
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR... ...%.....#..G....tEXtSoftware.Adobe ImageReadyq.e<...&iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c014 79.156797, 2014/08/20-09:53:02 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CC 2014 (Windows)" xmpMM:InstanceID="xmp.iid:8F7C94E368AF11E79E4FB3067E1DA3FD" xmpMM:DocumentID="xmp.did:8F7C94E468AF11E79E4FB3067E1DA3FD"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:8F7C94E168AF11E79E4FB3067E1DA3FD" stRef:documentID="xmp.did:8F7C94E268AF11E79E4FB3067E1DA3FD"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>..x....IDATx..WiLTW..f...a...d..T.M.iR.Q.-DZM......&X5U.T....V...[.RKj..VP...i.T.b,K-e.....,.....3<d.4........Y.L0
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 22 x 30, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):1099
      Entropy (8bit):6.358430554429135
      Encrypted:false
      SSDEEP:24:Z1hpunQWwjx82lY2T32HEVy8CiyJ3V9j5GI4F1006Bhd/sq:nitNn2VEJ3X5Q0lBhf
      MD5:3BA7A8430C74F454FA4EBAAA9677EC93
      SHA1:A75BD23C71BAFC60A0E579F964409E527A39BE93
      SHA-256:D5B2EDCD835D6CC7FCD584249ECDBFD49DD9DA12EB3F58A440AEFD1B0F3BF991
      SHA-512:1BF6D8663B64BDD555F85C91CD0CBE4F3BB40D82D8F8B74B23D3D27C86F42451ADB08EEDCBBBAE77AA5DD24016391895E6B82C5D002DFBE38C4F610FC7273650
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR.............(..V....tEXtSoftware.Adobe ImageReadyq.e<... iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS5 Windows" xmpMM:InstanceID="xmp.iid:2E7F084A5AF611E4BC4491B51F92CE1D" xmpMM:DocumentID="xmp.did:2E7F084B5AF611E4BC4491B51F92CE1D"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:2E7F08485AF611E4BC4491B51F92CE1D" stRef:documentID="xmp.did:2E7F08495AF611E4BC4491B51F92CE1D"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>>.......IDATx.b....[...@|.....JF.......ie..Z.....6.-.....$.P. Fh.x... ..c.*&..P...i.w....c.....&*..i ...i.AN.q..r.rZ...V
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 15 x 15, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):1091
      Entropy (8bit):6.337161164733769
      Encrypted:false
      SSDEEP:24:C1he91Wwjx82lY2T3o5VrTmHaikyJ3V4Pg9GDt9avM:AqQNn2q1mrXJ3KI9KPavM
      MD5:4512DB0BD5BFE6B3F2ABEEB72A9308A9
      SHA1:F90E36F57CD93EEDA1E644EFB6D985DAAE230B12
      SHA-256:F829592A3039EB2D4F8C88881BA2595FD3BC13B44CB7B34E862CDBFC194E4968
      SHA-512:E8B72F5A7DE7B145036CD36A8F90BE6507EA9D76CA9C736EC67048BF00AB95A0CBD4E04E1135686355B8C58D62285E876846D9313685AD42BF9FADE49FB00E0D
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR.............;.J....tEXtSoftware.Adobe ImageReadyq.e<...$iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS6 (Macintosh)" xmpMM:InstanceID="xmp.iid:95E501AE0B1311E6A5CA9034D96D6F9C" xmpMM:DocumentID="xmp.did:95E501AF0B1311E6A5CA9034D96D6F9C"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:95E501AC0B1311E6A5CA9034D96D6F9C" stRef:documentID="xmp.did:95E501AD0B1311E6A5CA9034D96D6F9C"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>6..]....IDATx..... .....;..x.1F.#(x(.'.2.m.6...I..zD.y;.....RJi#.j....A.8^p.}V .}!B.....S..\.H`c...x..1.'..... ...
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 25 x 25, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):341
      Entropy (8bit):6.932688186850299
      Encrypted:false
      SSDEEP:6:6v/lhPfiCCCtdoRg7NStAkIdh7mBkCuTQdn5qJ0T9nFysXrvEp:6v/7xjtSUVieCumn5/9n82C
      MD5:716B15F76294EE5D320BA95F66246340
      SHA1:DB1098FE9B1E13C7339F35F3BC646907F1B21A63
      SHA-256:6FB23EC5112544188534C03191DA2A5F7148D574FEE3DFEB353AC28EE176A7DC
      SHA-512:0811F5EE3AF9FCCF8110A32A440A2170984597A98657C06AEB42C011B4A69BF9F2FE82F5384B2FDE78C1292FF2172D23762571E986D70AC22B23E56E7A50C5FC
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR...............c....gAMA......a.....pHYs...........k.....tEXtSoftware.paint.net 4.0.134.[z....IDATHK..M..0..9....p...3.y...a......X.....m...-.iB....8.....I.v....)6..N.&~..._4{k.[q...8.YE..].x....v.!..y..0..XS.s.L..B.&....O"o.I..v.0..zL..l....UXi..\n_.2'....:qY.`.w......I..dL............{Wh...>..a.....IEND.B`.
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 25 x 25, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):404
      Entropy (8bit):7.129516318048457
      Encrypted:false
      SSDEEP:12:6v/7xjtSUmm5bJarDxRprObP/JnfCD/hZZJX8UA7/7:LUmm4pabP/ZfCRJXBAT7
      MD5:C18550E54ED02DEE988F2DE8DD6C89B9
      SHA1:28F406C9F407355D7283A69C9FE670569DEBB980
      SHA-256:8A0E652F20FDC33EA57510243A09E1BE1F9B815721D698D03C50385AC0311A43
      SHA-512:5849732BE1CF0FDEDB8798A50C5A72783C61AEA989DEDA6578377BF8B5EDF2CD401FDF9C85E29050846353F48374BB34F84DDA7DE750DB18E67CE3D1E6050306
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR...............c....gAMA......a.....pHYs...........k.....tEXtSoftware.paint.net 4.0.134.[z....IDATHK..1..0....L....\=.&N....g/..\..x..eR.......h..$...{.'..TU...X..8.Rpp..N...zC.((.....:.8W....#..fo....X...A...Q....8.QM.........$.5.....?...c..m.-..g..wbm..._s.T.D..#.....V.&...F.fV...9.B....|..,.n&.....k.'...I...(_W.y.e.C......|?q......x.c..o..E-.....U.._...8....IEND.B`.
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 11 x 11, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):226
      Entropy (8bit):6.332146371456583
      Encrypted:false
      SSDEEP:6:6v/lhP8AMtCCtdo1qZg7FJemT053Wmw3jKmt403zuk9qIup:6v/7kAMtjtS1qczemTC3Wmw3jPR36WS
      MD5:EF97004AEB78915DF8FC2509655D9B40
      SHA1:2FDEF07F5D0623E2F48EAA18805665B9A220E939
      SHA-256:DC016C4E75500448FC20A3BD80134B940C9E916817A8B224ABF3ED84A6826009
      SHA-512:CB42527F0D7DBB22E31FA7F88ACEE696DE8A9206928C0C81D453E5835B2AE8B906455D1B9F18F926D23F7058FCFCCB0FFB0E2484C460ADDC13800C2F233E2963
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR...............w&....gAMA......a.....pHYs...........k.....tEXtSoftware.paint.net 4.0.9l3~N...`IDAT(S.....0.......1..1.;..-......r..u.H7.t.H7.......'\.C...,..w|.;..S.........e.=...^....p.\-.x.X....IEND.B`.
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 232 x 80, 8-bit/color RGBA, interlaced
      Category:dropped
      Size (bytes):9638
      Entropy (8bit):7.97984865518991
      Encrypted:false
      SSDEEP:192:q00fpcg1tIjiNXtqdkZ84SGZsvLG9MuA9rTklsVIq1QY:qjOogWfsvLG9hA9rej2n
      MD5:B65E130901B97F54980D8055E9DCFF71
      SHA1:E97E74874E177DCF8475B26187AF99D6708E1266
      SHA-256:B8F3E5291052D9B2B898B4174D1712D89A94CE05179EBC6792CDE1F64BF28B1A
      SHA-512:C52D3B9156207B826CA5466180F90568CF81FDF3B2A7DF62625660B707822242D1B22EB2D8FA1E7102D6BE2D0A81EE54C7BB5F3845CF7CE9E942E018D4D0AD57
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR.......P.....d7......gAMA......a...%]IDATx..]......nF....2$Q.&1..58.....&...1.1...\ r.o..;..0........lL4..c n....c"...TT.............g....tU..{......Q....]Ck..j_....1Y....U.m....;.NfM....Bk.M.w....".........+.&..Q.>.1....M.KZ.......j.E..1H...-..kL...j....s}..V&...8Z.:..g..r....s.k...i.k,my.X..p..1.......%..C5.w._.|...[@.....].n..F.....=....H......@......5.e.<.......'..z.....f...0..E...YF.3..*.X....L...?/U.....IsV.7.L..T.+<..g..t.._C.LV.^i7.u....PTM..>.T#.A..6...L....i......S).6B.W...I.o.....r|.\..].QM..5.]..~w........{...)Z....L...dL....n..ud..l...o~.."..>._5.V.....*..hIK.I;u....{.....V....o..*kX....=..6..!......@.waeO...7...o.Lf..To...k..je.W.4.h..S+p.^ip....q..z.yu..c.j....H.D3 B3..MU9R^4k.....*./..t.EaE...*f.........,b......^I.KY.%..7).....H@.....N..E..8?+...UE7b.r..g....b...~.1+.J+...2.0*8..r.....X.$.(.C5R.....W]..[.x]..N..G.'.4....:H..h....R...{.o.....[~W5..V..xZZ.ll.9."...........m..%L.l..E...|.{..K..q..U.GFUy.
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 40 x 56, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):1796
      Entropy (8bit):7.2909105950211135
      Encrypted:false
      SSDEEP:48:HccNn2yIJJ3AYbHf01zb6ccKosNc/iZeFiGSS:8k2RQYz0posNCgfS
      MD5:06667BC5035AB4BD576F2AA987059C93
      SHA1:2D461E6A63550AF494893B3E15E4CDCE30982F26
      SHA-256:9D997C1CC41716A8B51327469E916911FF9230F25792F9ACD1304B7092A4045E
      SHA-512:0DB20F85F64A995BDC37B44B2435566141F8C58988DC2094732D599164DAE17C23811915A20180F1D3902E767491558911999FB44861B0FC03E75F91F963267A
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR...(...8......(......tEXtSoftware.Adobe ImageReadyq.e<...&iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c014 79.156797, 2014/08/20-09:53:02 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CC 2014 (Windows)" xmpMM:InstanceID="xmp.iid:D48E426597F511E7875EEE6D51C54119" xmpMM:DocumentID="xmp.did:D48E426697F511E7875EEE6D51C54119"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:D48E426397F511E7875EEE6D51C54119" stRef:documentID="xmp.did:D48E426497F511E7875EEE6D51C54119"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.......tIDATx..Mh.A..g'$i.c.l6i.~!*.(b.[... TQ{.x.7....*..<.....k.......E(~P.MR.X.i>.....%.l......L6..~....7..5i.
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 25 x 42, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):1301
      Entropy (8bit):6.818805785142685
      Encrypted:false
      SSDEEP:24:e/1hpunQWwjx82lY2T32HEVbdasTyJ3VbGcsiGxq57M4QvkZZszWCd17a:eNitNn2V7uJ31OqRM4RsiCd1O
      MD5:61A07C61B0A7F5D8856627004FE5AFD9
      SHA1:3CA74E975FBF1C973FDDB40CE4DFD46001AB96A3
      SHA-256:3CC78C47AC81B5C11440A0CD59DB42AAFC8426247FA891250FA3DE35EDB4B330
      SHA-512:A030F0C14A74A11D0E2B4B8EAA9E628E707BCB05E8B361E7C18A8092C4D06A036F4181B515EBC83D1AB419A187A5F0D69021F3067877F51B85357F162D1FFAA5
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR.......*.....F..`....tEXtSoftware.Adobe ImageReadyq.e<... iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS5 Windows" xmpMM:InstanceID="xmp.iid:683151C6216D11E49CF79C9CE451AAB7" xmpMM:DocumentID="xmp.did:683151C7216D11E49CF79C9CE451AAB7"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:683151C4216D11E49CF79C9CE451AAB7" stRef:documentID="xmp.did:683151C5216D11E49CF79C9CE451AAB7"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.DZ.....IDATx...G.Q...v#".e.N.bY..?.-.K..5:..K,KD.@DD.(E...#.t-R.D........3........;...{;..cF\.#sH.. ...^.Af.'3X.H....
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 170 x 50, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2023
      Entropy (8bit):7.834061182418166
      Encrypted:false
      SSDEEP:48:M/692kQRqvL0hBxYK72hJuljpeznCfJFhlyFyYTipBfbO3OFaq7B:MS92krLgB6K72AgnoFaFPipBTO3C1
      MD5:71AEA71E6562718453676AE12E76A216
      SHA1:FD5B6EEC17E7F88C8CBAA7E0C81875BEF6F8BF4D
      SHA-256:FC88BB54D0C35C746AC948FAB79FEFA948D50B120F02DD2B486495E7954397F0
      SHA-512:3E95F77E81E9F5E1314A9CFDC321B4E244D4CCB9580926A5F2FC5D579E93F95B70C80E71AFD0AAF0B14457F99BD44F298E1335D54C085202F9C19F0B5473E589
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR.......2......C@.....bKGD..............pHYs.................tIME......2...S....iTXtComment.....Created with GIMPd.e....KIDATx..]..E.....J"h...........z..Y..E.9z.-...!.....=H..C.BP<h..uM.Dw.}..<...~..s>^.n.`yo.kz.....US3..T.....p..)....BBc.;..|..o..[C......'...GO>vz...^{.d....$.J.T....._......\&....{..........A..C.(.F...= .....%.........^...E.prkkr....g.~..[.0...%.........$......|...../.{...../....Y........).OZ^...^8.....E.'.>..75V..J._`...s.}..B.@..{.4..q..o...lm.Hk`g'...d..WJ..} .x..vYK4..Szn.~....M...*.42......qLj..`f.Z.(.......>.40\x>.(3......~y.s.X%.......PO..*.63C..W...|..k..@.%......."......,kN)`.... .#.^c..p.......P...u..D-.....%.......;V*...D...h...TNw.|.........7O;3.....*0...%..ic.]@k......~r.\.N....e.ASl.K....8:......K..5..5...U...B.v...#.V.B2k.7...0a..@....4.q.).r....bY..|.s.RG.....\g...YA..N....-:....]......`....e+.".@......c.....`-.]g.c.F....!...pf..jW&k2cx.A....X..#7V...X.......g@)...$.h{a.....z....4.l]..<....TGA.t.FDKvz..6...%s.
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 14 x 21, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):1265
      Entropy (8bit):6.6923871242246245
      Encrypted:false
      SSDEEP:24:K1hpunQWwjx82lY2T32HEViKM2yJ3VhKSRGKVy1ay3U2yiqvOz:oitNn2VqtJ3zRZVCprqE
      MD5:B516A54C270BCB33D7B4CC9964D0BFE1
      SHA1:F61C2C2F0D53F14FA0918D3A8177004669C2A08A
      SHA-256:37CC7014F8EB6EA19EB50F341D201B6942F7BE6A7DD124059B25C02374EAD7CF
      SHA-512:1DA4B4472CC0555B676D981DD7E5AC29CF4987A70709F61FDF16517DBEFCD767EF3B4E61AF20E8B6F87DF582A18DA6FB71384513ADB102182652F06136C28A61
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR.............vY.....tEXtSoftware.Adobe ImageReadyq.e<... iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS5 Windows" xmpMM:InstanceID="xmp.iid:B32C2196E1FA11E38320E0B36410DCA1" xmpMM:DocumentID="xmp.did:B32C2197E1FA11E38320E0B36410DCA1"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:B32C2194E1FA11E38320E0B36410DCA1" stRef:documentID="xmp.did:B32C2195E1FA11E38320E0B36410DCA1"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>/......gIDATx.b.}{%.......1..31...........@...@.L.F.8x..%!!.p......1.Q.A........N..bV f$...^.x.....(e...@.U..,..O.
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 21 x 14, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):16219
      Entropy (8bit):2.1042793888679574
      Encrypted:false
      SSDEEP:96:WSAvZkIt2sc5GhUq3tmtY+WsNXrNXpDu53:WSCkg3tmv5fe
      MD5:AF79FE5D16459D24C7550C43C2A408ED
      SHA1:30762B9758AD3421409710E7A573B98AD86C85BA
      SHA-256:EE9D8DD0AE1F8042B4676BA6170F6E22BD401E5C2FDD43B9B96BFCE235EABDDC
      SHA-512:D66F47DA6EE0116FF52D5C032942544CDBBB66845A56A02F4F8948661C3A77E3945EDF424298CF0D4D11F91506B4DBE68361D34A0EAA032601A940458DE52303
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR...............W.....sRGB.........gAMA......a.....pHYs.................tIME.....)..p......tEXtFile Name.Untitled-9.{I=..=.iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?>.<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 4.2.2-c063 53.352624, 2008/07/30-18:12:18 ">. <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">. <rdf:Description rdf:about="". xmlns:xmp="http://ns.adobe.com/xap/1.0/">. <xmp:CreatorTool>Adobe Photoshop CS4 Windows</xmp:CreatorTool>. <xmp:MetadataDate>2014-02-19T19:41:01-05:00</xmp:MetadataDate>. <xmp:ModifyDate>2014-02-19T19:41:01-05:00</xmp:ModifyDate>. <xmp:CreateDate>2014-02-19T19:41:01-05:00</xmp:CreateDate>. </rdf:Description>. <rdf:Description rdf:about="". xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/". xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#">. <xmpMM:InstanceID>xmp.iid:8
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2993
      Entropy (8bit):7.8772256764796005
      Encrypted:false
      SSDEEP:48:b/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODlV6woaD:bSDZ/I09Da01l+gmkyTt6Hk8nTX8K
      MD5:8499A79EF6AE4A4141EFB1EDD8B817B4
      SHA1:912DB9D9FCDBB8D9DE42C6E5D7F6589154B57733
      SHA-256:C41F3C8D6E3209C94FC5E1F810F3C2F70F4865419D521BA45EBE3136C237E936
      SHA-512:BAA4E39B0A473B1549740905E8CFF0FDFF2058D1A1CF5D7E5474D77A9719F638DF216C70689394072965D25459003A9768039D08B980A3F727C17B683FE263F7
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR................a....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2994
      Entropy (8bit):7.875356862974214
      Encrypted:false
      SSDEEP:48:b/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcOD1NpBe:bSDZ/I09Da01l+gmkyTt6Hk8nT1NC
      MD5:71F2DF5FE99973C6C439F4294D83A649
      SHA1:22E22248D76017A72D35AD555E474FE3CC6873BA
      SHA-256:20541025FA64693A6C0B5A239CAAC07750EA725801F04D5C7CAFC2338C23428B
      SHA-512:B8C4B08B286E7A70CE3B1F0BAB67BC7E6DA9EF031244F6EC4E07A8FBA9B1D1F9C4AC7E06EF1C26F831DB9A4AA3381E9E56E0BBD7279D02798070952561B49EF0
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR................a....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2863
      Entropy (8bit):7.864822850364644
      Encrypted:false
      SSDEEP:48:b/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODvk61z:bSDZ/I09Da01l+gmkyTt6Hk8nTHz
      MD5:26CE126750DDF2E232D02BF82E55F712
      SHA1:199DE9CA76A8B3A658BFD11A30A67FB4C7DD3F53
      SHA-256:68F82DA5DABDA6C5A1CFD4A65891A474B47D9F6D4D85DA0462591DA6499FD0FB
      SHA-512:48D9926C119E6EDC5992D9B8957D3AFF8C4B686D56AD89B033F86C3AFE223541BB8E9853B14ABD541D64BC93176C14B3D773C94CC75A94EF4CB17387A9780E1D
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR................a....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 75 x 82, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):8388
      Entropy (8bit):7.951991915149804
      Encrypted:false
      SSDEEP:192:vSDS0tKg9E05Tbry8xUDmJ91Zgg08BvMR0FI0h:aJXE05e8xUDA91ZgwERWI0h
      MD5:61326F602C5CC055EFBEC7959827DC54
      SHA1:A65D8C517EED8A336C2401F855BF4CFEA361D093
      SHA-256:6D9A0BB61108D6D0D2FB6435E65755291B66FF3B00A122DB113600A2BF2263C3
      SHA-512:691AF215EB05794D7B6FCE07DCFCD60A5CA54AD6CA67F71B44AD59A4D612099A838919B595B7BBB240C1D36F6D3BEC38E054FEA69C594E524E5AFCCCEC34782C
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR...K...R.......).....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 6 x 6, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):16078
      Entropy (8bit):2.0132983735678143
      Encrypted:false
      SSDEEP:96:oS7QZkIt2sc5GPqFtmD+WsNXrNXpvu1Fz:oSYkVFtm25ruD
      MD5:C4BD0AAB6788955E3F24F3DBBDA38221
      SHA1:ACEB88345153DFC1A3E90DF261CDB42DEB3ADB37
      SHA-256:B9BCCB151679EECD9E797F8E948580BF915A5365CE1EE1669802A3C18BAA37D5
      SHA-512:AA08ABCBFF38119862D73A6FD4E7A8ACB7B6F293ABDF25A4EF32D31BC01F9415C11F4210CFF3460A3ACAF9B84F829483FA0120E7455A404F514135671D4EE90A
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR................H....sRGB.........pHYs.................tIME.......w-.T....tEXtFile Name.Untitled-1......=.iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?>.<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 4.2.2-c063 53.352624, 2008/07/30-18:12:18 ">. <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">. <rdf:Description rdf:about="". xmlns:xmp="http://ns.adobe.com/xap/1.0/">. <xmp:CreatorTool>Adobe Photoshop CS4 Windows</xmp:CreatorTool>. <xmp:MetadataDate>2014-02-07T13:24:05-05:00</xmp:MetadataDate>. <xmp:ModifyDate>2014-02-07T13:24:05-05:00</xmp:ModifyDate>. <xmp:CreateDate>2014-02-07T13:24:05-05:00</xmp:CreateDate>. </rdf:Description>. <rdf:Description rdf:about="". xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/". xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#">. <xmpMM:InstanceID>xmp.iid:1E82D5062590E311A
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):1553
      Entropy (8bit):7.047413266797472
      Encrypted:false
      SSDEEP:24:t1he91Wwh82lYSKwVo4RjVx2R4T3cyJ3VKRVPGPesT+quUcBww3DDhbxXidO0s2T:TqQvnL8tNrJ3QfPW7ydl3xT0N
      MD5:C07B05FB66B8B1145CEB5AC5588B61A5
      SHA1:C0D875E10C20E9A0ACEAB4F012FBC58A7F01BA88
      SHA-256:8F0FDB24AAECA8B9C174A7DC4240E13D675B85F91BB2FD3FCEC98650AF304B5B
      SHA-512:E187885AD1B817E2F184BA6D8218DD1BA81F69D7F28399BD21092363768056BFBAC3EC31715F9317F9E5EEE38D9A634D72C9F4D76CC2D5EDCE9CC8AE7D1C3778
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR...(...(........m....tEXtSoftware.Adobe ImageReadyq.e<...diTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:50864549699EE311B092B6E4A26229C8" xmpMM:DocumentID="xmp.did:58D53F481AA911E69AB8D7F29C951D96" xmpMM:InstanceID="xmp.iid:58D53F471AA911E69AB8D7F29C951D96" xmp:CreatorTool="Adobe Photoshop CS4 Windows"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:50864549699EE311B092B6E4A26229C8" stRef:documentID="xmp.did:50864549699EE311B092B6E4A26229C8"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.......CIDATx...+DQ......#....`!.?"...Y..+.....B
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 44 x 96, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):309
      Entropy (8bit):6.054343807264034
      Encrypted:false
      SSDEEP:6:6v/lhPgXOudn+Hgvd+qgv5m9p+qgv5m9p+qgv5m9p+qgv5m9p+qgv5m9p+fdZdp:6v/7ADWgcv5KAv5KAv5KAv5KAv5K6dZz
      MD5:E03F1F2D51299D73D9502ADDE9BD807A
      SHA1:86671DB9619755E2D54165DAF1A7929354A73AF9
      SHA-256:32D88811543A4EBEB4ACDACCF2349C4EC68993A803E7AA4925B59FFAF2166E2D
      SHA-512:937EAFB8E21AF9FF662510449A71182397931433C331668744D8B4C589E8705042FAA2E49C1273F05CC1775C17F5A91BF474A9855CFDCF63789B2E2694A4C9FF
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR...,...`.....f.......gAMA......a.....IDATx...1..0..Q......c.0v.|.....}...A.~.v../.p.........L. z&..b0a..N.....g.:)........L. z&..b0a..N.....g.:)........L. z&..b0a..N.....g.:)........L. z&..b0a..N.....g.:)........L. z&..b0a..N.....g.:)........L. z&..bp...J..9.`......IEND.B`.
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 48 x 96, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):1322
      Entropy (8bit):7.704908908918472
      Encrypted:false
      SSDEEP:24:bGYPEgtf9Z+rRqi6cSAYEp5+1hIvUR80zXYbwe21rWymNgpg:HcgtVUFqJkp5+1VFD1rWPNig
      MD5:6BEDC4F5BCEF662B66747C1D6136BECB
      SHA1:3ED98FAB84B91EEA4DEC0360B330E4153DB0BE02
      SHA-256:B983DE30371551C28ADC7590B74DF194DEF2DC0A0AB6FFE0F114AEA0837CD191
      SHA-512:932802DFCA0D7EA4121398ACE2343DB3DD1D07A5EA52647B60160DD56CD45F7DBF227654FC79F0EBB8EAED86D5AD0F5B20F9618F57A014CF11A572BA40992A95
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR...0...`.....[..p....gAMA......a.....IDATx..M..G...U...W........DDe=$AH..x0`4...?@.'%...@P.&.@.......!$...D=(&..8...zZ..5d7;U/..Zk9.;.3............z]=......B5....D*.......Z.uM.P.........A.f.@......O.aX..9...7.\7.g.h.B@.,uAi}<.]x..?.k<.[.[.....I.........;@s...o..6./.,s.#.E....i..+..Q.'..r..>....A....QjDG.n....N..._........fP...~.X....H..^..yt....;%.}O...B..............k.N(".5w.:.q.R.......XTk.....=.....@.FT.....W.m..4..M.}..~..E...Q*@..T..=.*D...!h.e...NA.8KXk~....H .O@..<!6(.....N..z....!h......HRo..&.3X.e..,.7.E.t..4.......\^.4..p.F..7...<.?O.p.k<.)J....E...s..'b.X8(.?..",..4r]fn...u.......O.~~z......:Py.....|.y...V.|Q.H....C...B..u.^39.I,@"..-...71~q!C.s!.M...ck...pk....d............v..oqUd..F.~......0..V6.(..@~$..._....@4..!...-....Mv...-...]&.@..8.O..89Q4...j..8-T4....GJN...@.?...r.(..G1b.fR.....SRm..X.p.K>..B.t.F...8.3...p..../..I..k~*E.P...s.<...xnB...1..9.<..o}......i.)D....l....a..6'.@.1'G.........@.._G.......4.....Q'6.......p
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 96 x 96, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2310
      Entropy (8bit):7.874330739799925
      Encrypted:false
      SSDEEP:48:sem5iGBcCQYZIOpAGX5kUHf6yAhyfIOFmW0g9q:oM4coZIK5PHfso7OZ
      MD5:01157878409C7BFB56F939526F193E55
      SHA1:D3BAFA45C7BAA27E085DBFFB6C5F68A3F781261E
      SHA-256:F26CDED0E564ACA99C3AAB16E0399326E75F8094944A1572349889CAED6CFED4
      SHA-512:D53E9853A09BEE08468418E7BC1172AAC4341A015F251A56871694348A761D0151653769B34E3FA8DB10ABEB07D848E6CBD61208300291D17190A3CFEB6F0490
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR...`...`......w8....gAMA......a.....IDATx..O..D..g&[..n.....a....z..`..ET...H....z.E.}V..K=...J...E.<.P...).+,..A=...[qK7...y/K^..$/o...L`I.&3..|~3.I2..I1...zR....`Z.=-...R.!.......k1...q...Z...Z.YO.Yq...qqn..*.E).X.B..L..M ..`....-l.........q!.N......8.+....{.?.u....P.7...7.~..>Z.)..!o|....J...6.-..Z...=..z...)........b^hyLy.K.{.')Q.J.J3..f...qt..wQ..J,cfQ.q^{.C..-...G......p....}Y.`'j....ZZR...Z....[.(....@7...|.......(.p.).{C6.~..mGV..@7&W....0.x.....Q...@y...n.!.s.m...G...Dp.......2?....zU....5..O./..>.....l*8lya.._.Y.C......Y1.n........>lC...C..Z.M6...T....[.!..?.zPeF)=FJ....,?.qf... .1.y.....>....`0....X..!..Pdb..F9-.N.d....nA.(u...1.B...D.`Q/....K....m.5_.ei...<@..C.xh...r.e.v..{~mo;Ip.1_C....9..8....g..$)Q.sft..o.:D....!..|.?.z..a.f.W.....?g?..CV.ji....0K...SoA|.....y.r..'H....T...u..wG....x.fK......s2L*w...J.....f....0T_.z-.;..........F..D...Ww5.?#..d....u....m.a.............G.3b.p.rL.d.M.%.`....n....'`&%ti.K...#.x
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 96 x 96, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2316
      Entropy (8bit):7.872496758109341
      Encrypted:false
      SSDEEP:48:SK+T7zVjMzF+5xM203a9PGnwH+6lbMKFCdUVL:X+PzVAzF+5xM73RjxeyUVL
      MD5:56F6845916419B9EA942D801A7254079
      SHA1:F70A746CC36C8942B8522AF21FD9678C46214627
      SHA-256:2BBC4703A2F7F851AA110BF6371200E6FBFF0E06543DBC03FC9E0CAB0C222F87
      SHA-512:035041A5F7A98CEDCD65D5028F8E92E23EA45DFC8D042F8A9C987EC79AE76D5F8944B9627860EC78CD8EB25A9C3E2FC95B41E11ABBCF5028227493585B16D751
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR...`...`......w8....gAMA......a.....IDATx..O..D..g&[Z....U. .....zPY..."*.ZD....I=.".>+H. x.U.H-.-..B..Z.T.......n.?[.....{..e...^&.{/.x$y...7._&3If~?).t.....f'. ..BO.-&..7K-../\S.-......k..o..BN{JM..&....A,....tc.*!f..@o....s...haA&..8..WJ..b.l.y.B...R.~...n.../o.A.,......7.^.C.}.SB...UG.K...o3m....E.k....;..j-V.,P.yI)..'?.{.....B.Ki..o.._.m.~..Jxg.e.,.0.kO.....|......7......v.j.-.....ZqA...k..E..P....}....+~}i.,...s..^....,f.U!...5...~t>...Bd.....(.".R..;ecn.(.p.n.@..q.Ym[.*....J...^.+.zX3..p.......y.....zI....;.K?^.......[....T.{m(5.yHq.S.....yu.m...M.\....5y.....S.Qzl.|..<z.<'........|2c.M.. ......{.]....<...,;..E.....D.R...{.._h..../X.3c{......l.s../.n...8@^.C.#xh...r.d.V..{~mo;ip.0...ys/.sf.....W..IS...L.H-.......C....~....+0.Z.L...8.nm...P.....Y.t8....w;....W)I..A...w.k*5.[.=.....(U[.V./.l)T.|..|D.i.N5._).6Ro5.`.>.......s.h.~L.....#.....a..:.........H..........L....D........3b.p..M.d................A...`..8t.
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 8 x 8, 8-bit/color RGB, non-interlaced
      Category:dropped
      Size (bytes):937
      Entropy (8bit):5.8104438047679
      Encrypted:false
      SSDEEP:24:Hh1hpunQWwjx82lY2T32HEVDTutTAyJ3VgcTTTTRGCJ:vitNn2V5ODJ3aMzRr
      MD5:607D9123BB070B183B2B1BDB47AC2AD3
      SHA1:31919F6F61DEECC4C030D95F75F70ED0519660AB
      SHA-256:23B16838B590D437FACA83378E751CB9F06389105F8AEA291C28818901DD367A
      SHA-512:F33C8E2095BFF47334B9738E76438AA2B65682865938F5CC420CC017728A436703E96B4B95E5A5FE736FCC68137A724398AD290A04A8F74063141CC0C2E10FDD
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR.............Km).....tEXtSoftware.Adobe ImageReadyq.e<... iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS5 Windows" xmpMM:InstanceID="xmp.iid:283C04ADE21B11E391C2B262ECC9B134" xmpMM:DocumentID="xmp.did:283C04AEE21B11E391C2B262ECC9B134"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:283C04ABE21B11E391C2B262ECC9B134" stRef:documentID="xmp.did:283C04ACE21B11E391C2B262ECC9B134"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.z......IDATx.bd``...?.*`dddb...T.'..0.O...2.......IEND.B`.
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 12 x 12, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):15727
      Entropy (8bit):1.9617442510888667
      Encrypted:false
      SSDEEP:96:+2SylZkIt+WsNXrNXpd2sc5GcqvtmXgep:XSyLkd5vvtmwep
      MD5:994A9E0DE7C47B99AFB9FCCC5778C274
      SHA1:041F2B6FC406534E267A04B2E9E3EC6BF104F994
      SHA-256:6FD368FF0D52E2E810801E889C600A085A4FA3CEF27DE663973C2DFDA92BC7FA
      SHA-512:D01FD92BE927109902EB37286CE3212BB2DA852ACFC47EDC708342E492019EEB343DC810E29542619D7A3FB98030A2065FF63231BCDD7FB1778C6A1B6F56AD75
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR.............Vu\.....sRGB.........pHYs.................tIME.......n1.....tEXtFile Name.PatchButtonCancel.png._[...<.iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?>.<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 4.2.2-c063 53.352624, 2008/07/30-18:12:18 ">. <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">. <rdf:Description rdf:about="". xmlns:xmp="http://ns.adobe.com/xap/1.0/">. <xmp:CreatorTool>Adobe Photoshop CS4 Windows</xmp:CreatorTool>. <xmp:CreateDate>2014-03-11T17:34:55-04:00</xmp:CreateDate>. <xmp:ModifyDate>2014-03-13T17:03:06-04:00</xmp:ModifyDate>. <xmp:MetadataDate>2014-03-13T17:03:06-04:00</xmp:MetadataDate>. </rdf:Description>. <rdf:Description rdf:about="". xmlns:dc="http://purl.org/dc/elements/1.1/">. <dc:format>image/png</dc:format>. </rdf:Description>. <rdf:Description rdf:about="". xml
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 9 x 19, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2939
      Entropy (8bit):7.8751350252382
      Encrypted:false
      SSDEEP:48:1/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODGp:1SDZ/I09Da01l+gmkyTt6Hk8nTGp
      MD5:FBD05AC80ACDB9D854E7D30E9EFE74C4
      SHA1:1A2A6B66B193E93FAF49D8DA1328350D9D326A14
      SHA-256:5F1542E96AD465E0C8C2586AB7449C715DA47EFEEB7BF3C31649433197E8982E
      SHA-512:1762732D863AAB5A1A1B19A6873947ED2464500FF35EE8F44C571E013D80DA3FEA3DDE2E80D4B90B27EBBB2E124D9535DF371D0825F9E359119AB5ED8339460B
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR.............B.'.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 9 x 19, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2926
      Entropy (8bit):7.90648535434529
      Encrypted:false
      SSDEEP:48:EldHE8+JjpMNNa3OjboViS4nXsAYdPd3F58ZpiU54SN775OBf/6b3hvIypSB:EXHt+JcNgOSiS4XsAYNpf2ESNwSFE
      MD5:FE1B0FA672066528158E0F0B34D73D45
      SHA1:AB6A8C25A0449F5C4E9CB3EE302B6C50F0DFD18A
      SHA-256:9FE680DF2A49D71A72609B6DD97EBF0329149B8720C9BDF45C5A92468075247C
      SHA-512:2A9E68F270CF146BF08EF20F255A6AF5745393D11ADA0256371764C32C131110D00AE08211A32AAB2D697EA82509C6B7EADAEA7B89799FB67D111D912381C9E6
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR.............B.'....9iCCPPhotoshop ICC profile..H..wTT....wz..0.R.....{.^Ea..`(..34.!...ED."HP..P$VD...T..$.(1.ET,oF.........o......Z..../...K......<....Qt.....`.).LVF._.{......!r._...zX..p..3.N....Y.|......9.,...8%K.......,f.%f.(A..9a..>.,....<...9..S.b...L!G....3..,....F.0.+.7..T.3...Il.pX."6.1...."....H._q.W,.d..rIK..s...t......A..d.p....&+..g.].R.......Y2...EE.4...4432..P.u.oJ..Ez...g.........`.j..-....-....b.8....o....M</..A...qVV....2.....O.....g$>...]9.La.....+-%M.g.3Y.......u..A.x....E.....K.......i<:...............Pc...u*@~..(.. ...]..o..0 ~y.*..s..7.g...%...9.%(....3........H.*...@...C`...-p.n.......V..H.....@....A1....jP..A3h..A'8..K....n..`.L.g`......a!2D..!.H... .d..A.P....B....By.f..*...z....:....@..]h...~....L.............C.Up.......p%....;...5.6<.?.........."....G..x...G.....iE..>.&2.. oQ...EG..lQ..P......U..F.Fu.zQ7Qc.Y.G4....G......t...].nB../.o.'.1.......xb"1I.....>L...f.3...b..X}..........*.Q.Y..v...G...p.(..........
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):3379
      Entropy (8bit):7.900810931888687
      Encrypted:false
      SSDEEP:48:lldHE8+JjpMNNa3OjboViS4nXsAYdPd3F58ZpiU54SN775OB78jpcmzBBk:lXHt+JcNgOSiS4XsAYNpf2ESNg8jpzz4
      MD5:3FE8B20F355CA9CCC770C228B94081F1
      SHA1:31C1AD0D7E8351940FB766019D2C90D17A8F832E
      SHA-256:C7CA4B6FFC563D91481509D5F504BCA07CB2F534C470019CD6BD33B4EB621778
      SHA-512:F3D3F57AC993BCD361109F4DB0DD933F6473F055E40C444AC3F76061F4F02C3883E6AB9D889C57912408B6D57D94F47F4832F8F86C45F397576A96438E018323
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR... ... .....szz.....gAMA....|.Q.... cHRM...........R...@..}y.....<.....s<.w...9iCCPPhotoshop ICC profile..H..wTT....wz..0.R.....{.^Ea..`(..34.!...ED."HP..P$VD...T..$.(1.ET,oF.........o......Z..../...K......<....Qt.....`.).LVF._.{......!r._...zX..p..3.N....Y.|......9.,...8%K.......,f.%f.(A..9a..>.,....<...9..S.b...L!G....3..,....F.0.+.7..T.3...Il.pX."6.1...."....H._q.W,.d..rIK..s...t......A..d.p....&+..g.].R.......Y2...EE.4...4432..P.u.oJ..Ez...g.........`.j..-....-....b.8....o....M</..A...qVV....2.....O.....g$>...]9.La.....+-%M.g.3Y.......u..A.x....E.....K.......i<:...............Pc...u*@~..(.. ...]..o..0 ~y.*..s..7.g...%...9.%(....3........H.*...@...C`...-p.n.......V..H.....@....A1....jP..A3h..A'8..K....n..`.L.g`......a!2D..!.H... .d..A.P....B....By.f..*...z....:....@..]h...~....L.............C.Up.......p%....;...5.6<.?.........."....G..x...G.....iE..>.&2.. oQ...EG..lQ..P......U..F.Fu.zQ7Qc.Y.G4....G......t...].nB../.o.'.1.......xb"1I.
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):500
      Entropy (8bit):7.31879354458995
      Encrypted:false
      SSDEEP:12:6v/78jtS1qcjoe+nPhXSHeokvjllumaWZdcctAl5JnfVf/weB:M1VceGhCHmRlRa4Al7fVHweB
      MD5:E395AB024BD6659DD1836A7B3680EC84
      SHA1:2FAE4B7F06993AE051CA5326DB87BC2C2D78621E
      SHA-256:03A1D7BB9899BEF75EEDA31216F00AF96D840EA65E49E2A6D0C1A70133685E9A
      SHA-512:F065F414A3CDAFDC7E031000C3B95556B018EF9DBBA8059CB7AB2FE93B5F2B1628BD4A04495012D8F4D40D620E21E0D993CDEB888CBF39556BA52D785E78AC31
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR................a....gAMA......a.....pHYs...........k.....tEXtSoftware.paint.net 4.0.4.......rIDAT8O.R].AQ.=....H>..$.../$..<8......99w.{..5..5...3c.0`.6b...&....X,b>.c...u]..cd2...E..f.......b..j....q.Z....PS.T.x<.0.J......n.*\(...O..l6..v.D".....b2....'.z=...b4...a....,.....Az...8..H$...9+..k..Az`...&......z.^.K.L.v.x>.h4..G.a.x.E8{N...N..=..f..}.....F1..q>...b...<........j...L&Q......d...1.~B...Pd.\"...............&..N..c..j..C..X*..e.....=]s......IEND.B`.
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):344
      Entropy (8bit):6.9415609943303895
      Encrypted:false
      SSDEEP:6:6v/lhPUC8qZg7jUUjtUogkr6TwrZok4aKZyNE+bF7q34fgOhSt3/p:6v/785qcjU6tUogvwrP4bZUzbtq3/t3R
      MD5:3C92EB6C3D0C1C7E69DE13A360EC8F51
      SHA1:4860E6E417042E488C2568BBC266F393C6A514C5
      SHA-256:C1407F66383A475F2D2EA6DE60E8F450FF9D3D8137FC7BC3050198685D619C76
      SHA-512:C0CD061175C77A5F9194405C934E5EC5D3DA021C5ED74121720DC098C3023B0AE8DCBC6E94ECFE2967650471EA0F7C39BA07219E8A525F7775545032F9E0F341
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR................a....gAMA......a.....pHYs.........8.S$....tEXtSoftware.paint.net 4.0.4........IDAT8O..=.D@...d...%. "r...'P....|._W.bk7..u{?c..yH..G..X..XEQ(M...........,5M...Q........S..u....<..JQ......#.zV.<.0..M...k7....O.<.p.$I.q.-.......u8:>.s.p.....m......F@.e...F...:..=.n.k....._.>..'.....=.B..o..\`....IEND.B`.
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2871
      Entropy (8bit):7.873501464866857
      Encrypted:false
      SSDEEP:48:tocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcOD4ec:tZ/I09Da01l+gmkyTt6Hk8nTo
      MD5:FBE16D3046C26D6BFC803B7E78212B95
      SHA1:449077DBB28FC080E005776DD932A7D72E46E024
      SHA-256:81B6282737DA4599961B793F09CD25DF54F0A00E245E736C6C6760D0F709C3E7
      SHA-512:CABE78CDF343D920AECFEE54A3205A9D3E60BFEF87E7DFC421BFB0A4C965056F942143C28669069EDD4825306CF919876D40A33FBD7DB017302068FE5E90D0AC
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR................a....pHYs..........d_....OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):1131
      Entropy (8bit):6.494156472593123
      Encrypted:false
      SSDEEP:24:K1hpunQWwjx82lY2T32HEVzz1oqW/iyJ3VzzJRq4PGQkcr1fTfMN:oitNn2VFzbyJJ3Fze+df4
      MD5:2F547E30E5CFDA6AD08E987324D4CD32
      SHA1:E12197FF0BDBD4E6801296E3AE1D2C26E80CBF27
      SHA-256:FED07830EA14A3A936077CE362F28DDC08FE6B229CE95DCCFB5D2F1DF8ED455E
      SHA-512:C10B4F8955BD8C7D86E6A06846E6CE365C2302B8B94017132752D1E63F786F009D0AA742D15B56141FA63AF035639EC221D49AB355F6E6BD984F961784D86D77
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR................a....tEXtSoftware.Adobe ImageReadyq.e<... iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS5 Windows" xmpMM:InstanceID="xmp.iid:0DE7F551E21311E3BD759F77B7E8F236" xmpMM:DocumentID="xmp.did:0DE7F552E21311E3BD759F77B7E8F236"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:0DE7F54FE21311E3BD759F77B7E8F236" stRef:documentID="xmp.did:0DE7F550E21311E3BD759F77B7E8F236"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>........IDATx..?..P..om.....Oh.........."...1...|.ii=.H............9W.@...#.2Y....B.].;..Lk..x.B...x..@.ZC..b..\.'
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):2928
      Entropy (8bit):7.876985727119462
      Encrypted:false
      SSDEEP:48:b/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODjhpfN:bSDZ/I09Da01l+gmkyTt6Hk8nTj7fN
      MD5:78939BC95532D22DDA513D6CB7C6415F
      SHA1:447CF0A5795F615DBEAA36FFC5F5C69D47247CDE
      SHA-256:F0F1F9AA994449E519FF3AD9D36ED73600CF2A7281E4E1FB6C32D172FCE8E096
      SHA-512:F7E086AD2FD29CBC1EB10131E76B0713A420A66ED3E9FFEB8A04714ACAF278F6AFCC2F1E9CC8B42B20EE2AD8FDF0A879C6FB6BA46DCB26C9B29EDEE9658615F1
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR................a....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):1101
      Entropy (8bit):7.717092617414279
      Encrypted:false
      SSDEEP:24:TiV6+Y4Yw34ufd161Fyvuu48aNwEYiZGNxYmOH3xU/mBbQa1uoVuJ7:e6n4YCNdVvuuW7YyIxk3C/wVM
      MD5:3BCAC9EAB5FAC148F87450892A1195FA
      SHA1:7C5E593884A93392AF2357DB85A20AD2CFC30F58
      SHA-256:1605DFDE1844F4506ED1246C5C233590DC798D01F72DFC8726690643224CBF98
      SHA-512:00D973A895A293A9727111C6A5A0721D4959188331113DC390172562B8317256C47B3809C9B58ADB205B8D07BD8FB8CC95892F8476DABD40CBA8AD0A12C25FF3
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR...(...(........m....pHYs...........~.....IDATX...J#A..kZ.GGXX.t.^.."...0o`...{.7....y...:{...}......ftY....?vK;.....I.tW}]]=]]:.s*"...ADU"*..u..M|^.Q..:...Bv..:...Q.1.%...Z.v.......{.....!.......`.nw.1v.E.W"js.Ck...jD..{..........G.S0.c...........@...y^.1...:...1.......O..%.:..6.."V.......U..6D\..b..y.F..........L.k.J..~...PQ.-.m#.x.q.e....!.T*|ccc"@................l~~>V.8...NNN...T.`....p.....J....i.lBA...N...~...S#...p...<.....0.^..kfy/.94....a.wwwc..../6U.....o.X.M.........,". y.......g.................].\NM&..6...['.....7.[2.1.X..8..@.Z.>..w:..<...>.F..{...`.....H.1......7....`r.%F.i....?.(U.S...%i.ZS.#..eul4....J...vG.J."....p8|...^..}&.....yM.L._.t".........8...gxUmmm..[0.2.y..{.XK.cH$p<!{.s..~.).....d...........:.m..!`.w..T.w.S"...=..K'`...j2........\ i.....,i)...tV.|.f..O..1..g.....c.2q.T*.X..L.TA..}m.U......}......'.H..I.<...^.j.....S..UT`.6.wbS..I...$l..h.-.50+..|Q.n.F..[.q...[.1.tA....e.........q;.(.B.X.#.*k&...k..
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 30 x 30, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):3365
      Entropy (8bit):7.909660916770975
      Encrypted:false
      SSDEEP:96:NXHt+JcNgOSiS4XsAYNpf2ESNEwuOVgi7+F+pFDA:RoONgOLPXsAYnibgi7wyA
      MD5:E467C881C1075F4AA958D3D98C417F08
      SHA1:BC562BBB8EF2A8F5378B07860F6CC937695E00E9
      SHA-256:225485D29794CC53C206FE475809921AA7B36744E8A63CD64678B8A42424915D
      SHA-512:BDDA2A6AE90E1116336D54165229D59110EA5E2C7187C94480ED71E1253D6909D3503120F23D36883D637848A6852897E3D946121D8695532103975B06B40019
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR.............;0......gAMA....|.Q.... cHRM...........R...@..}y.....<.....s<.w...9iCCPPhotoshop ICC profile..H..wTT....wz..0.R.....{.^Ea..`(..34.!...ED."HP..P$VD...T..$.(1.ET,oF.........o......Z..../...K......<....Qt.....`.).LVF._.{......!r._...zX..p..3.N....Y.|......9.,...8%K.......,f.%f.(A..9a..>.,....<...9..S.b...L!G....3..,....F.0.+.7..T.3...Il.pX."6.1...."....H._q.W,.d..rIK..s...t......A..d.p....&+..g.].R.......Y2...EE.4...4432..P.u.oJ..Ez...g.........`.j..-....-....b.8....o....M</..A...qVV....2.....O.....g$>...]9.La.....+-%M.g.3Y.......u..A.x....E.....K.......i<:...............Pc...u*@~..(.. ...]..o..0 ~y.*..s..7.g...%...9.%(....3........H.*...@...C`...-p.n.......V..H.....@....A1....jP..A3h..A'8..K....n..`.L.g`......a!2D..!.H... .d..A.P....B....By.f..*...z....:....@..]h...~....L.............C.Up.......p%....;...5.6<.?.........."....G..x...G.....iE..>.&2.. oQ...EG..lQ..P......U..F.Fu.zQ7Qc.Y.G4....G......t...].nB../.o.'.1.......xb"1I.
      Process:C:\Windows\System32\msiexec.exe
      File Type:PNG image data, 24 x 24, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):3124
      Entropy (8bit):7.882755127540766
      Encrypted:false
      SSDEEP:96:xSDZ/I09Da01l+gmkyTt6Hk8nTFWl2bc8xb:xSDS0tKg9E05TYl2bcw
      MD5:154D346E7F49F54761D70F4F10F6D717
      SHA1:8A34C0FD811A407E68A1001C13298254C98550E5
      SHA-256:9CAB1DEEF6EB7D0BAE297CAF94376AA7CF95339C098C5A693BA041ABD96B9675
      SHA-512:325BF20B14D7CC2D69B4C3EAAC072B49824DA2864818F069808D16A017C8471A277BCA0F88454B0F0C1C34189EDAE74D666F94A617BB520F981A5AC887AEB88B
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR..............w=.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
      Process:C:\Windows\System32\msiexec.exe
      File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (469), with CRLF line terminators
      Category:dropped
      Size (bytes):202962
      Entropy (8bit):5.692836311112738
      Encrypted:false
      SSDEEP:3072:CiP0VAPqExoHgmUqteN0Jx+MRTCSRlr1istBBJaKs:GG/keNimCMsPBcKs
      MD5:7DA75C1E61B690E74A85613AF05EFAF8
      SHA1:1F029CACC3796C3E1011FD61E1E57209E49C1974
      SHA-256:3697F143C7354F92311121579C7E7D0118FF8953AFE607E1E5C1E7687291D679
      SHA-512:21221B5D770923E1E59A348B2CA6D2B9E6D38F54A58B2657B8CB9CE89563903CB4019B65F2478D468B5A53FDA47DA7DC7802273A62C59EFCD1D6C964893B84DA
      Malicious:false
      Reputation:low
      Preview:.{.. "Messages" : [.. {.. "Codes" : [.. "SU-1001".. ],.. "Title" : "Self Update Failed",.. "Title_translate" : "true",.. "Descriptions" : "Failed to create an installer.",.. "Descriptions_translate" : "true",.. "Title_zh-CN" : "......",.. "Descriptions_zh-CN" : ".........",.. "Title_ja" : "..........",.. "Descriptions_ja" : ".................",.. "Title_fr" : ".chec de la mise . jour automatique",.. "Descriptions_fr" : ".chec de cr.ation du programme d'installation.",.. "Title_de" : "Selbstaktualisierung fehlgeschlagen",.. "Descriptions_de" : "Installer konnte nicht erstellt werden.",.. "Title_ko" : ".. .... ..",.. "Descriptions_ko" : ".... ... .......",.. "Title_it" : "Auto-aggiornamento non riuscito",..
      Process:C:\Windows\System32\msiexec.exe
      File Type:JSON data
      Category:dropped
      Size (bytes):2346
      Entropy (8bit):4.711690635503979
      Encrypted:false
      SSDEEP:48:aliKHMu4oGzcm2HxQS7IOrGPzmtYWELxQqoCyhFmA:aDMuMGXaxarmA
      MD5:42A7FB43C1A33B4B1CCF1C665647C77B
      SHA1:8ADDAE3C4E238F23A60B2013E4655A384211BDCE
      SHA-256:74F7FDDB5FB3EA3CE2856140A690C25AED3FEBD2256ABFDB261ABE2B87025E7E
      SHA-512:76136714AA040196A782FBAED92D4708BF84FF4203D0080A384BE4604370567193A788E6596A09B136EF4E1E3F9F16FAE7CAE4C87BA713F720F3FEAA4E2C91A2
      Malicious:false
      Reputation:low
      Preview:{..."BaseUrls": [....{....."Name": "epicgamesnext",....."BaseUrl": "https://launcher.store.epicgames.com"....},....{....."Name": "epicgames",....."BaseUrl": "https://epicgames.com"....},....{....."Name": "storeweb.epicgames",....."BaseUrl": "https://store.epicgames.com"....},....{....."Name": "epicgames.epicgames",....."BaseUrl": "https://epicgames.com"....},....{....."Name": "launcher.epicgames",....."BaseUrl": "https://ue-launcher-website-prod.ol.epicgames.com"....},....{....."Name": "accounts.epicgames",....."BaseUrl": "https://accounts.epicgames.com"....},....{....."Name": "accounts.launcher.epicgames",....."BaseUrl": "https://accounts.launcher-website-prod07.ol.epicgames.com"....},....{....."Name": "forums.unrealengine",....."BaseUrl": "https://forums.unrealengine.com"....},....{....."Name": "unrealengine",....."BaseUrl": "https://www.unrealengine.com"....},....{....."Name": "publish.unrealengine",....."BaseUrl": "https://publish.unrealengine.com"....},....{....."Name": "help.epic
      Process:C:\Windows\System32\msiexec.exe
      File Type:JSON data
      Category:dropped
      Size (bytes):71868
      Entropy (8bit):5.325421920474391
      Encrypted:false
      SSDEEP:1536:+ibcLjEmiqrXUeontgigNm7ReMBSvfE3OuEsl:+ibrMkCigNaS0
      MD5:7B3736FBFD3E14C718F65BB0E9AE8E2D
      SHA1:F82C46D79BF853FFEFAA4E122DDB63D3AB974E31
      SHA-256:E6185D198759C2BF85AE7A579C13FFDEBED082C1E48F2119F376D85031B90CA4
      SHA-512:57B2372D3DC808ED38A4261179F1BBA2273EFFCA0F6C4E3FA66581ABDBEDE1FA7AE44003688ABB9CC7F17C1FBB2FC10F0AD6A002A610F092168D348A9C1F6FC4
      Malicious:false
      Reputation:low
      Preview:{.. "Links" : [.. {.. "Name" : "Launcher_No_Longer_Supporting_MacOS_10_9",.. "URL" : "{epicgames.epicgames}/help/en-US/epic-games-store-c5719341124379/launcher-support-c5719357217435/epic-games-launcher-no-longer-supports-macos-10-9-or-10-10-a7535371800475".. },.. {.. "Name" : "Launcher_No_Longer_Supporting_MacOS_10_10",.. "URL" : "{epicgames.epicgames}/help/en-US/epic-games-store-c5719341124379/launcher-support-c5719357217435/epic-games-launcher-no-longer-supports-macos-10-9-or-10-10-a7535371800475".. },.. {.. "Name" : "Launcher_No_Longer_Supporting_Older_MacOS",.. "URL" : "{epicgames.epicgames}/help/en-US/epic-games-store-c5719341124379/launcher-support-c5719357217435/epic-games-launcher-no-longer-supports-macos-10-9-or-10-10-a7535371800475".. },.. {.. "Name" : "Launcher_No_Longer_Supported_Without_EOS",.. "URL" : "{epicgames.epicgames}/help/epic-games-store-c73/epic-online-services-a
      Process:C:\Windows\System32\msiexec.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):1600
      Entropy (8bit):5.105123752764663
      Encrypted:false
      SSDEEP:24:PeA9ahcEvSLkzmZ4dx1hyBTWz9LSNWuv+78hPPR9c:PeA9aSEv2gmmddSWJ2WaK8h3w
      MD5:D06139530BCC99514B3DF585C587D57F
      SHA1:5F3797F1D7EAED98EB5A4A552A67F98F23F38A99
      SHA-256:5F291BF36E8EBE726ED442863969717668DA34B61FFFDE1F8FC604CD85BD8308
      SHA-512:C0938EA8B3A760225501EF9EA875C65CFA1CD75D8BA14E2CE0DD8A9B788B1E914EC5B539934842F99D84AFB6AEAC15F378CA1BAD25E96676CD51473B662294CA
      Malicious:false
      Reputation:low
      Preview:;========== PORTAL - CODEREDEMPTION SERVICE ==========..[Portal.OnlineSubsystemMcp.CodeRedemptionServiceMcp Prod]..Domain=coderedemption-public-service-prod.ol.epicgames.com....;========== PORTAL - FULFILLMENT SERVICE ==========..[Portal.OnlineSubsystemMcp.OnlineFulfillmentServiceMcp Prod]..Domain=fulfillment-public-service-prod06.ol.epicgames.com....;========== PORTAL - DATA STORAGE SERVICE ==========..[Portal.OnlineSubsystemMcp.OnlineDataStorageServiceMcp Prod]..Domain=datastorage-public-service-liveegs.live.use1a.on.epicgames.com....;========== PORTAL - LIBRARY SERVICE ==========..[Portal.OnlineSubsystemMcp.OnlineLibraryServiceMcp Prod]..Domain=library-service.live.use1a.on.epicgames.com....;========== PORTAL - REGION ORIGIN SETTINGS ==========..[Portal.Origin Prod]..NextInternalOrigin=launcher.store.epicgames.com/....[Portal.Origin Stage]..NextInternalOrigin=epicgames-stage.ol.epicgames.net/....[Portal.Origin GameDev]..NextInternalOrigin=epicgames-gamedev.ol.epicgames.net/....[Port
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Epic Online Services, Author: Epic Games, Inc., Keywords: Installer, Comments: This installer database contains the logic and data required to install Epic Online Services., Template: Intel;1033, Revision Number: {0AC89065-FDDB-45C2-88AB-02315AA8B5F5}, Create Time/Date: Wed Aug 2 20:37:38 2023, Last Saved Time/Date: Wed Aug 2 20:37:38 2023, Number of Pages: 405, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 4
      Category:dropped
      Size (bytes):134049792
      Entropy (8bit):7.997723606903335
      Encrypted:true
      SSDEEP:3145728:6W+lu8efwAXA7FLjCt1Ond3xSQHVYX2ja6pBaWO5JZIwlnBaZ:6tcw8oFfie750+a6pF
      MD5:1B44609A0998BAE367A4700EA7F5D6B2
      SHA1:CD62B2C1B379A0B18ED14CECDAA4A1787DE20966
      SHA-256:AE27108F40EC5DBB135CFF6F6FDBA238FF11C1DFD0F914A901BFCFD24DC79E0B
      SHA-512:FE2FF76DF94A9E60C0BBB33698C03471C50D4ABD7DD6C5956050520B8E17F1E9C8C2E5E30D0A49C082FB6B83D71C81074B02DD09E5F58A55FEF480DD71A664D3
      Malicious:false
      Reputation:low
      Preview:......................>................... ................................................................ ...$...(...,...0...4...8...<...@...D...H...L...P...T...X...\...`...d...h...l...p...t...x...|..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):24016
      Entropy (8bit):6.6592188895559685
      Encrypted:false
      SSDEEP:384:bgaflz35DQD+Y3DGk8ZpH3GCJEFxExNG+Y3DGE1Fw8JN77hhFiB:bgaN5DIDGkiRBExDGyT3haB
      MD5:4A3181A2E93579124799A9B81263768E
      SHA1:33C8C8EBD802C3D802133AD10475F1DB0E5194C3
      SHA-256:1130E54261ADD0069C5B700555631B780E950A3040E20F3AD6CC984F0251730E
      SHA-512:50B1C8A4766E8C83382A5DF10DCA451F8FADD3B012CC2C82DEC9CFDB48D3B8F6DCAD26D8BAAD9C31426A3E04C6AD672EB599AB6A4EA1FB3A4188E622EAEA5B2E
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...\58e.........."...0..............6... ...@....@.. ..............................q.....`..................................6..O....@...............$...9...`......H5............................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......."..............@..B.................6......H........"..T............................................................0............i./.r...p..i.....(....s....z....(.....(....,.r&..ps....z....(.....rW..p(......r...po....,..(....-.(......(....,; ........s.......r...p....(....,.r...p.(....(......o.....+........(....s.....(.........o.....(....,.r#..pr...p.(....(....(....+9.(...... ......(....&..(........r...p...o....(....(........o .......,...o!........(.....(....-\.("...,Dr0..p....i.1-...+.......r2..p(#........X......i2...
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):190928
      Entropy (8bit):5.969693507588729
      Encrypted:false
      SSDEEP:3072:6GfZS7hUuK3PcbFeRRLxyR69UgoCaf8+aCnfKlRUjW01Kymka5M9:8zMRLkR6joxfRPoM9
      MD5:735AC22B2774C06F1D46B6BF968B1B52
      SHA1:DC003AD2EA8B9FA616E4F2189A0E4D0282174AF2
      SHA-256:23376C15D8B1AC063E69251088081B879C575E133CBA252574B0CCFE81F289F2
      SHA-512:B042E74082DF0AB2BF9A92559EC6A602C5E05CCA7F3B98562FF7CD53DDBE0893F105C1E0DD0A78EDC72E2B14FC635D9455B21ECB95EAADDBE4B3B52AC9CE055C
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....o.].........." ..0...... ......z.... ........... ..............................aq....@.................................(...O........................9.......................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:Certificate, Version=3
      Category:dropped
      Size (bytes):1413
      Entropy (8bit):7.480496427934893
      Encrypted:false
      SSDEEP:24:yYvJm3RW857Ij3kTteTuQRFjGgZLE5XBy9+JYSE19rVAVsGnyI3SKB7:PL854TTuQL/ZoXQ9+mrGVrb3R
      MD5:285EC909C4AB0D2D57F5086B225799AA
      SHA1:D89E3BD43D5D909B47A18977AA9D5CE36CEE184C
      SHA-256:68B9C761219A5B1F0131784474665DB61BBDB109E00F05CA9F74244EE5F5F52B
      SHA-512:4CF305B95F94C7A9504C53C7F2DC8068E647A326D95976B7F4D80433B2284506FC5E3BB9A80A4E9A9889540BBF92908DD39EE4EB25F2566FE9AB37B4DC9A7C09
      Malicious:false
      Reputation:low
      Preview:0...0..i.......9rD:.".Q..l..15.0...*.H........0{1.0...U....GB1.0...U....Greater Manchester1.0...U....Salford1.0...U....Comodo CA Limited1!0...U....AAA Certificate Services0...190312000000Z..281231235959Z0..1.0...U....US1.0...U....New Jersey1.0...U....Jersey City1.0...U....The USERTRUST Network1.0,..U...%USERTrust RSA Certification Authority0.."0...*.H.............0..........e.6......W.v..'.L.P.a. M.-d.....=.........{7(.+G.9.:.._..}..cB.v.;+...o... ..>..t.....bd......j."<......{......Q..gF.Q..T?.3.~l......Q.5..f.rg.!f..x..P:.....L....5.WZ....=.,..T....:M.L..\... =.."4.~;hf.D..NFS.3`...S7.sC.2.S...tNi.k.`.......2..;Qx.g..=V...i....%&k3m.nG.sC.~..f.)|2.cU.....T0....}7..]:l5\.A...I......b..f.%....?.9......L.|.k..^...g.....[..L..[...s.#;-..5Ut.I.IX...6.Q...&}.M....C&.A_@.DD...W..P.WT.>.tc/.Pe..XB.C.L..%GY.....&FJP...x..g...W...c..b.._U..\.(..%9..+..L...?.R.../..........0..0...U.#..0......#>.....)...0..0...U......Sy.Z.+J.T.......f.0...U...........0...U.......0....0...U
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):306
      Entropy (8bit):3.152814233542962
      Encrypted:false
      SSDEEP:6:kKgsEQolNbjMulgokaWbLebhafcDWV+vG1bod7lF/:kvlNnMuldkaUSaPVdbs
      MD5:76B214B8129FF950659E2D478262C21C
      SHA1:57BE334BFAE0B8311B7516FA865ED03A12827146
      SHA-256:41C128D3D8CDBB20A2D3068DDBABB2F0E4EC0CF2CF8E31BC16786244FFBEEB30
      SHA-512:7AD8A13E99297AEAA2C5F738053A9BED2A1C610A6DA24DFC862540A3BA7B25A55DA4DED76317AD4569CA13A99140321885F41290F08FACA1F30FE18D06EAD61D
      Malicious:false
      Reputation:low
      Preview:p...... ....h......f....(....................................................... .........(.f....Q..V...............h.t.t.p.:././.c.r.t...u.s.e.r.t.r.u.s.t...c.o.m./.U.S.E.R.T.r.u.s.t.R.S.A.A.d.d.T.r.u.s.t.C.A...c.r.t...".d.8.9.e.3.b.d.4.3.d.5.d.9.0.9.b.4.7.a.1.8.9.7.7.a.a.9.d.5.c.e.3.6.c.e.e.1.8.4.c."...
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:CSV text
      Category:dropped
      Size (bytes):651
      Entropy (8bit):5.343677015075984
      Encrypted:false
      SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhaOK9eDLI4MNJK9P/JNTK9yiv:ML9E4KlKDE4KhKiKhPKIE4oKNzKoM
      MD5:7EEF860682F76EC7D541A8C1A3494E3D
      SHA1:58D759A845D2D961A5430E429EF777E60C48C87E
      SHA-256:65E958955AC5DBB7D7AD573EB4BB36BFF4A1DC52DD16CF79A5F7A0FA347727F1
      SHA-512:BF7767D55F624B8404240953A726AA616D0CE60EC1B3027710B919D6838EFF7281A79B49B22AB8B065D8CA921EF4D09017A0991CB4A21DAF09B3B43E6698CB04
      Malicious:false
      Reputation:low
      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):2106216
      Entropy (8bit):6.4563314852745375
      Encrypted:false
      SSDEEP:49152:DpX9JVeE9HP6Zpy9KyhMI50Du8LljslNsHSHFUq9OiapbbO5Akb:H3P9HP6Zpy9KyhMI50Du8LljslNsyHiS
      MD5:1C9B45E87528B8BB8CFA884EA0099A85
      SHA1:98BE17E1D324790A5B206E1EA1CC4E64FBE21240
      SHA-256:2F23182EC6F4889397AC4BF03D62536136C5BDBA825C7D2C4EF08C827F3A8A1C
      SHA-512:B76D780810E8617B80331B4AD56E9C753652AF2E55B66795F7A7D67D6AFCEC5EF00D120D9B2C64126309076D8169239A721AE8B34784B639B3A3E2BF50D6EE34
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 3%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......\.h...;...;...;..];...;...;...;.._;...;..h;0..;..i;'..;..X;...;..l;D..;?M.;...;..Y;...;..^;...;Rich...;........PE..L...92.K...........!.........d...............................................p .....O. ...@.........................@.......@...P..................... .h............................................i..@............................................text...S........................... ..`.data....~.......B..................@....rsrc................(..............@..@.reloc..D............,..............@..B................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:data
      Category:dropped
      Size (bytes):6796
      Entropy (8bit):7.242703752909775
      Encrypted:false
      SSDEEP:96:Dm9WkVDPDaD9D743Ss/kPnE8UADPDaMm/D743bM5DODs+5cxzRWolNDPDaZD74oB:69VEQKPnEtObMacxc8hjXHUz1Tr2QRZ
      MD5:11BC389F7A75423CEFA205BF3A404CE2
      SHA1:3883969A816DB884A79E1B1ED8D2EC075D48F985
      SHA-256:32000BAC9D162035751FE9016FC580D0CC0A643563C0F563D86D5FB83329E65F
      SHA-512:0AC8F8FE65A449DBE175CA3B5A9269C7FAA65C852BCD41322FB0DA1B2FA2E52B468589399043C05070E57966559DB6F03D21270DCB26A7BEE0D09B2222905E6E
      Malicious:false
      Reputation:low
      Preview:0.....*.H.........y0..u...1.0...+......0.....+.....7......0...0...+.....7.........C..O..'..]G...100602115423Z0...+.....7.....0..L0..&.RA.0.D.C.F.D.F.1.0.4.C.6.F.9.2.5.F.4.D.E.E.D.8.3.B.3.1.B.1.C.9.E.4.A.D.1.B.E.F.B...1..0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+...............%......J..0....RE.A.5.D.8.B.B.B.F.1.3.1.3.4.3.D.D.0.D.D.B.2.0.7.3.D.C.B.B.7.6.3.4.E.6.B.C.E.C.C...1..0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........]...14=...=.cNk..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}........0..0,..+.....7.....0....S.p.L.e.v.e.l........0...0D..+.....7....604...S.p.A.t.t.r........2.0.0.5.0.2.0.1.0.0.0.0.0.0...0....+.....7....x0v...O.S.A.t.t.r.......`2.:.5...0.,.2.:.5...1.,.2.:.5...2.,.2.:.5...x.,.2.:.6...x.,.2.:.7...x.,.2.:.8...x.,.2.:.9...x......10..`0..L...........
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:Windows setup INFormation
      Category:dropped
      Size (bytes):801
      Entropy (8bit):5.488673383707369
      Encrypted:false
      SSDEEP:24:tsXnoqJhoaj2jt4sV3dGn8rZVI8h8rs37OL:2XthoaqjtV3dGnw+kOL
      MD5:90785E792EDCFA7D43DE9DF2D1AC884D
      SHA1:EA5D8BBBF131343DD0DDB2073DCBB7634E6BCECC
      SHA-256:8F68CCDD8CE1ACFAA5C4AFAC6B2E96E23B7B532FBCBE9375709326083A134E85
      SHA-512:A2D15DF6148B811AD5658D9692A737924A3CE3AE1007CD86B6AD994922D95D839258DD18D785425609970EFA8A39CA79FA61512F7908891CF51CD0EEB6AD2B15
      Malicious:false
      Reputation:low
      Preview:..[Version]..Signature = "$Windows NT$"..AdvancedINF = 2.0..Provider = %MSFT%..Class = %ExceptionClassDesc%..ClassGUID = {F5776D81-AE53-4935-8E84-B0B283D8BCEF}..CatalogFile = D3DCompiler_43_x86.cat..ComponentId = {C4F89AB5-99E9-4CD6-A760-F75EA57D0673}..DriverVer = 06-02-2010, 5.3.1.0904....[SourceDisksNames]..99 = %DiskName%,"JUN2010_D3DCompiler_43_x86.cab",0,,-1....[SourceDisksFiles]..D3DCompiler_43.dll = 99....[DestinationDirs]..DefaultDestDir = 11..DirectX_SysWOW64 = 10,SysWOW64....[x86_Install]..CopyFiles = DirectX_System....[x64_Install]..CopyFiles = DirectX_SysWOW64....[DirectX_System]..D3DCompiler_43.dll....[DirectX_SysWOW64]..D3DCompiler_43.dll....[Strings]..MSFT = "Microsoft"..ExceptionClassDesc = "DirectX JUN2010"..DiskName = "DirectX JUN2010 cab"....
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:Windows setup INFormation
      Category:dropped
      Size (bytes):572
      Entropy (8bit):5.262759700206673
      Encrypted:false
      SSDEEP:12:tsXnoHqqlaydGTFBngTrWgprCpt8e49pt8rs37O1B:tsXnoK0dGn8rZVI8h8rs37OL
      MD5:269EE8EAE0AEB992621E80A3F1B2C501
      SHA1:C1F1031B04E243F44C63AD762217D61D1FC41E58
      SHA-256:EADF4D9537F17BB65FB811B7FD1C5248D6AE08DB5CF0F17E500F5CF73D685CCC
      SHA-512:91003527430C9F15478ECA6FC950ACE7DB9156D38B172484C133601B18D5BF7FEE89F9B36379E723BF408F831B2860E39A1BC03F48C831615CE53CB521D20A87
      Malicious:false
      Reputation:low
      Preview:..[Version]..Signature = "$Windows NT$"..AdvancedINF = 2.0....[SourceDisksNames]..99 = %DiskName%,"JUN2010_D3DCompiler_43_x86.cab",0,,-1....[SourceDisksFiles]..D3DCompiler_43.dll = 99....[DestinationDirs]..DefaultDestDir = 11..DirectX_SysWOW64 = 10,SysWOW64....[x86_Install]..CopyFiles = DirectX_System....[x64_Install]..CopyFiles = DirectX_SysWOW64....[DirectX_System]..D3DCompiler_43.dll....[DirectX_SysWOW64]..D3DCompiler_43.dll....[Strings]..MSFT = "Microsoft"..ExceptionClassDesc = "DirectX JUN2010"..DiskName = "DirectX JUN2010 cab"....
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:Windows setup INFormation
      Category:dropped
      Size (bytes):1670
      Entropy (8bit):5.353827430841304
      Encrypted:false
      SSDEEP:48:0+KXIIO6eK/2FgBrW2F3BLO2F+n2FZZ2Fre2FtW2FO:iXIj6eK/2Fg82F3NO2F+n2FZZ2Fre2FK
      MD5:1A86443FC4E07E0945904DA7EFE2149D
      SHA1:37A6627DBF3B43ACA104EB55F9F37E14947838CE
      SHA-256:5DD568919E1B3CBCB23AB21D0F2D6C1A065070848ABA5D2A896DA39E55C6CBBF
      SHA-512:C9FAA6BB9485B1A0F8356DF42C1EFE1711A77EFA566EEE3EB0C8031ECE10FFA045D35ADB63E5E8B2F79F26BF3596C54C0BD23FEA1642FAAE11BAF2E97B73CF5E
      Malicious:false
      Reputation:low
      Preview:..; ---- Common sections ----..[Version]..Signature = "$CHICAGO$"..AdvancedINF = 2.0..Provider = %MSFT%..SetupClass = BASE....[Strings]..MSFT = "Microsoft"......; ---- Windows 2000 ----..[4.09.00.0904.00-4.09.00.0904.00_Win2K]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..D3DCompiler_43_x86_xp.inf, x86_Install......; ---- Windows XP ----..[4.09.00.0904.00-4.09.00.0904.00_WinXP]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..D3DCompiler_43_x86_xp.inf, x86_Install......; ---- Windows XP 64bit ----..[4.09.00.0904.00-4.09.00.0904.00_WinXP@64]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..D3DCompiler_43_x86_xp.inf, x64_Install......; ---- Windows Server 2003 ----..[4.09.00.0904.00-4.09.00.0904.00_Srv2K3]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..D3DCompiler_43_x86_xp.inf, x86_install......;
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:Windows setup INFormation
      Category:dropped
      Size (bytes):1635
      Entropy (8bit):5.347501446123384
      Encrypted:false
      SSDEEP:48:0+KXIIO6eK/2AgBrW2A3BLO2A+n2AZZ2Are2AtW2AO:iXIj6eK/2Ag82A3NO2A+n2AZZ2Are2AB
      MD5:CF70B3DD13A8C636DB00BD4332996D1A
      SHA1:48DD8FC6FA3DAE23CB6CA8113BC7AD837B4570D7
      SHA-256:D5200B332CAF4FFF25EB3D224527A3944878C5C3849512779A2AFCFEAE4C3CA1
      SHA-512:AE31A9E20743A2052DEEC5D696A555460A03D400720679ED103759241B25D55E2FBC247170DA3C0C0891F32B131AB6A6845DE56C2D3387AD233AA11DB970B313
      Malicious:false
      Reputation:low
      Preview:..; ---- Common sections ----..[Version]..Signature = "$CHICAGO$"..AdvancedINF = 2.0..Provider = %MSFT%..SetupClass = BASE....[Strings]..MSFT = "Microsoft"......; ---- Windows 2000 ----..[4.09.00.0904.00-4.09.00.0904.00_Win2K]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..d3dcsx_43_x86_xp.inf, x86_Install......; ---- Windows XP ----..[4.09.00.0904.00-4.09.00.0904.00_WinXP]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..d3dcsx_43_x86_xp.inf, x86_Install......; ---- Windows XP 64bit ----..[4.09.00.0904.00-4.09.00.0904.00_WinXP@64]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..d3dcsx_43_x86_xp.inf, x64_Install......; ---- Windows Server 2003 ----..[4.09.00.0904.00-4.09.00.0904.00_Srv2K3]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..d3dcsx_43_x86_xp.inf, x86_install......; ---- Windows Server
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:Windows setup INFormation
      Category:dropped
      Size (bytes):1635
      Entropy (8bit):5.334993389233006
      Encrypted:false
      SSDEEP:48:0+KXIIO6eK/2ngBrW2n3BLO2n+n2nZZ2nre2ntW2nO:iXIj6eK/2ng82n3NO2n+n2nZZ2nre2ns
      MD5:53A24FAEE760E18821EF0960C767AB04
      SHA1:4548DB4234DBACBFB726784B907D08D953496FF9
      SHA-256:4D4263CBB11858C727824C4A071F992909675719BE3076B4A47852BF6AFFD862
      SHA-512:8371471624F54DB0ACA3EA051235937FC28575C0F533B89F7D2204C776814D4CD09EE1A37B41163239885E878FB193133AD397FE3C18232AD3469626AF2D2ED1
      Malicious:false
      Reputation:low
      Preview:..; ---- Common sections ----..[Version]..Signature = "$CHICAGO$"..AdvancedINF = 2.0..Provider = %MSFT%..SetupClass = BASE....[Strings]..MSFT = "Microsoft"......; ---- Windows 2000 ----..[4.09.00.0904.00-4.09.00.0904.00_Win2K]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..d3dx10_43_x86_xp.inf, x86_Install......; ---- Windows XP ----..[4.09.00.0904.00-4.09.00.0904.00_WinXP]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..d3dx10_43_x86_xp.inf, x86_Install......; ---- Windows XP 64bit ----..[4.09.00.0904.00-4.09.00.0904.00_WinXP@64]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..d3dx10_43_x86_xp.inf, x64_Install......; ---- Windows Server 2003 ----..[4.09.00.0904.00-4.09.00.0904.00_Srv2K3]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..d3dx10_43_x86_xp.inf, x86_install......; ---- Windows Server
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:Windows setup INFormation
      Category:dropped
      Size (bytes):1635
      Entropy (8bit):5.3452018288502385
      Encrypted:false
      SSDEEP:48:0+KXIIO6eK/2wgBrW2w3BLO2w+n2wZZ2wre2wtW2wO:iXIj6eK/2wg82w3NO2w+n2wZZ2wre2w5
      MD5:FB5D27C88B52DCBDBC226F66F0537573
      SHA1:2CBF1012FBDCBBD17643F7466F986ECD3CE2688A
      SHA-256:3925C924EB4EC4F5A643B2D14D2EDA603341FBBD22118CDD8AE04AAA96F443C0
      SHA-512:8AA2200F91ECA91D7EE3221BC7C8F2A9C8D913A5D633AA00835D5FB243D9CB8AFA60FE34A4C3DAA0731A21914BC52266D05D6B80BFC30B2A255D7ACDF0D18EB5
      Malicious:false
      Reputation:low
      Preview:..; ---- Common sections ----..[Version]..Signature = "$CHICAGO$"..AdvancedINF = 2.0..Provider = %MSFT%..SetupClass = BASE....[Strings]..MSFT = "Microsoft"......; ---- Windows 2000 ----..[4.09.00.0904.00-4.09.00.0904.00_Win2K]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..d3dx11_43_x86_xp.inf, x86_Install......; ---- Windows XP ----..[4.09.00.0904.00-4.09.00.0904.00_WinXP]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..d3dx11_43_x86_xp.inf, x86_Install......; ---- Windows XP 64bit ----..[4.09.00.0904.00-4.09.00.0904.00_WinXP@64]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..d3dx11_43_x86_xp.inf, x64_Install......; ---- Windows Server 2003 ----..[4.09.00.0904.00-4.09.00.0904.00_Srv2K3]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..d3dx11_43_x86_xp.inf, x86_install......; ---- Windows Server
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:Windows setup INFormation
      Category:dropped
      Size (bytes):1431
      Entropy (8bit):5.359559696538983
      Encrypted:false
      SSDEEP:24:M5+gJXIIO6eUBrH2q9vxBLP2q9vnE82q9vLzO2q9vJf2q9vjH2q9vs:0+KXIIO6eUBrWQxBLOQEnQ3ZQJeQjWQs
      MD5:E188F534500688CEC2E894D3533997B4
      SHA1:F073F8515B94CB23B703AB5CDB3A5CFCC10B3333
      SHA-256:1C798CB80E9E46CE03356EA7316E1EFF5D3A88CCDD7CBFBFCDCE73CDED23B4E5
      SHA-512:332CCB25C5ED92AE48C5805A330534D985D6B41F9220AF0844D407B2019396FCEFEA7076B409439F5AB8A9CA6819B65C07ADA7BD3AA1222429966DC5A440D4F7
      Malicious:false
      Reputation:low
      Preview:..; ---- Common sections ----..[Version]..Signature = "$CHICAGO$"..AdvancedINF = 2.0..Provider = %MSFT%..SetupClass = BASE....[Strings]..MSFT = "Microsoft"......; ---- Windows XP ----..[4.09.00.0904.00-4.09.00.0904.00_WinXP]..NumberOfFiles=5..Size=487 ;approximately total file size (Size * 1024 bytes)..CopyCount=1..xinput1_3_x86_xp.inf, x86_Install......; ---- Windows XP 64bit ----..[4.09.00.0904.00-4.09.00.0904.00_WinXP@64]..NumberOfFiles=5..Size=487 ;approximately total file size (Size * 1024 bytes)..CopyCount=1..xinput1_3_x86_xp.inf, x64_Install......; ---- Windows Server 2003 ----..[4.09.00.0904.00-4.09.00.0904.00_Srv2K3]..NumberOfFiles=5..Size=487 ;approximately total file size (Size * 1024 bytes)..CopyCount=1..xinput1_3_x86_xp.inf, x86_Install......; ---- Windows Server 2003 64bit ----..[4.09.00.0904.00-4.09.00.0904.00_Srv2K3@64]..NumberOfFiles=5..Size=487 ;approximately total file size (Size * 1024 bytes)..CopyCount=1..xinput1_3_x86_xp.inf, x64_install......; ---- W
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):1868128
      Entropy (8bit):6.25014757191993
      Encrypted:false
      SSDEEP:24576:/j0ZXvi+of1/z+uQ5Da3Qx1fF4dEQMtqVC43ux:/A9i/f1/z+Zce4dpMATe
      MD5:83EBA442F07AAB8D6375D2EEC945C46C
      SHA1:C29C20DA6BB30BE7D9DDA40241CA48F069123BD9
      SHA-256:B46A44B6FCE8F141C9E02798645DB2EE0DA5C69EA71195E29F83A91A355FA2CA
      SHA-512:288906C8AA8EB4D62440FE84DEAA25E7F362DC3644DAFC1227E45A71F6D915ACF885314531DB4757A9BF2E6CB12EAF43B54E9FF0F6A7E3239CABB697B07C25EA
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........$...E...E...E....$..E...E..]E....&..E.......E....!..E.......E......E.... ..E....'..E..Rich.E..........................PE..L....1.K...........!.........f......Mf....... ............................................@.........................0...X.......<....`...............j..`....p......P................................d..@............... ............................text............................... ..`.data....3... ...0..................@....rsrc........`.......8..............@..@.reloc...,...p.......<..............@..B........................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:data
      Category:dropped
      Size (bytes):6796
      Entropy (8bit):7.257834337832179
      Encrypted:false
      SSDEEP:96:3zm3VkWkVDPDaD9D743Ss/kPnE8UADPDaMm/D743bM5DODs+5cxzRWolNDPDaZD9:a3VkVEQKPnEtObMacxc8hjeyveCXEt
      MD5:AAED60FCF2BCF700D8F17500DAD6DC95
      SHA1:DAC96B0992E12298F17067DD9FA8C50EDCBC2297
      SHA-256:7F8A33984E71CFD932417DD3081C71B798B31A57DEC96CA2D5982584A0B69728
      SHA-512:13B8F5BD490D51F22A8234D089A9913756AD00AECD3A25E1C1CBE220B341FF65148B8ADC37EF64DEE203883E727CA3840E12D589E17F4A4ADEE728BA9CE2F1D7
      Malicious:false
      Reputation:low
      Preview:0.....*.H.........y0..u...1.0...+......0.....+.....7......0...0...+.....7..... .e\(..I...E.]x@..100602115423Z0...+.....7.....0..L0..&.R2.C.5.3.0.F.E.1.6.A.C.7.2.D.D.8.9.6.8.1.B.A.6.B.1.9.5.1.B.E.4.4.9.D.3.8.F.D.D.2...1..0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........,S..j.-...k.Q.D.8..0....RF.F.3.2.9.6.9.8.0.7.4.9.6.5.4.9.3.1.2.8.E.6.2.7.F.7.7.0.B.9.B.3.E.4.4.4.F.8.1.3...1..0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........2...IeI1(.'.p...D..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}........0..0,..+.....7.....0....S.p.L.e.v.e.l........0...0D..+.....7....604...S.p.A.t.t.r........2.0.0.5.0.2.0.1.0.0.0.0.0.0...0....+.....7....x0v...O.S.A.t.t.r.......`2.:.5...0.,.2.:.5...1.,.2.:.5...2.,.2.:.5...x.,.2.:.6...x.,.2.:.7...x.,.2.:.8...x.,.2.:.9...x......10..`0..L...........
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:Windows setup INFormation
      Category:dropped
      Size (bytes):776
      Entropy (8bit):5.483347321437731
      Encrypted:false
      SSDEEP:24:tsXnoqJhoaj1FsVCdJn8rZVI8h8rsg7pL:2XthoahiVCdJnw+xpL
      MD5:DDBFC2923DF1263BD87AC1BDBA534D4A
      SHA1:FF329698074965493128E627F770B9B3E444F813
      SHA-256:48EC353B9C9FBF9EC8692C5D6462C7E4FDB726E7A0B0ABD734F33F9E5F0ACE56
      SHA-512:F10220C3F33CF1DA56C4FF580DA322923B5CDAC25BD1C8D0B4F8F0BF456397A4DD32A21E7B731306ED5E01A2B832ACEC7044D7337911E7F4649CDB6F6D37F603
      Malicious:false
      Reputation:low
      Preview:..[Version]..Signature = "$Windows NT$"..AdvancedINF = 2.0..Provider = %MSFT%..Class = %ExceptionClassDesc%..ClassGUID = {F5776D81-AE53-4935-8E84-B0B283D8BCEF}..CatalogFile = d3dcsx_43_x86.cat..ComponentId = {6D337D2E-C4CC-454A-B384-939F934DDD72}..DriverVer = 06-02-2010, 5.3.1.0904....[SourceDisksNames]..99 = %DiskName%,"JUN2010_d3dcsx_43_x86.cab",0,,-1....[SourceDisksFiles]..d3dcsx_43.dll = 99....[DestinationDirs]..DefaultDestDir = 11..DirectX_SysWOW64 = 10,SysWOW64....[x86_Install]..CopyFiles = DirectX_System....[x64_Install]..CopyFiles = DirectX_SysWOW64....[DirectX_System]..d3dcsx_43.dll....[DirectX_SysWOW64]..d3dcsx_43.dll....[Strings]..MSFT = "Microsoft"..ExceptionClassDesc = "DirectX JUN2010"..DiskName = "DirectX JUN2010 cab"....
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:Windows setup INFormation
      Category:dropped
      Size (bytes):552
      Entropy (8bit):5.261658761807364
      Encrypted:false
      SSDEEP:12:tsXnoHqqlWdGTFkngTrWgprCpt8e49pt8rsg7p1B:tsXnoKrdJn8rZVI8h8rsg7pL
      MD5:0AE2ECCF1418E98849B2973C4225AEB5
      SHA1:78C4661DCC0DA0C7DFC6B67A50F11E54CFE72B78
      SHA-256:2CA1181A9E4D4610557C4203C513D1EBD26D8EC9E0C2366271816044E3CDCAB6
      SHA-512:4CED16CD9A097F19DE3C3E0E58B2F83EC2EA7D88E5A3AA6867AAC3168D3A176D6645B74FE76135E8A5F294256E0F72F7E537563327F47FA91CB95B90B5F78FFB
      Malicious:false
      Reputation:low
      Preview:..[Version]..Signature = "$Windows NT$"..AdvancedINF = 2.0....[SourceDisksNames]..99 = %DiskName%,"JUN2010_d3dcsx_43_x86.cab",0,,-1....[SourceDisksFiles]..d3dcsx_43.dll = 99....[DestinationDirs]..DefaultDestDir = 11..DirectX_SysWOW64 = 10,SysWOW64....[x86_Install]..CopyFiles = DirectX_System....[x64_Install]..CopyFiles = DirectX_SysWOW64....[DirectX_System]..d3dcsx_43.dll....[DirectX_SysWOW64]..d3dcsx_43.dll....[Strings]..MSFT = "Microsoft"..ExceptionClassDesc = "DirectX JUN2010"..DiskName = "DirectX JUN2010 cab"....
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):470880
      Entropy (8bit):6.715347536118646
      Encrypted:false
      SSDEEP:12288:cFUDOgwNvArf8r3bK9s3kW3CG3vQ3sad/QNbubxu:5DOgw6fYbK9s3kW3CG3vQ3snputu
      MD5:20C835843FCEC4DEDFCD7BFFA3B91641
      SHA1:5DD1D5B42A0B58D708D112694394A9A23691C283
      SHA-256:56FCD13650FD1F075743154E8C48465DD68A236AB8960667D75373139D2631BF
      SHA-512:561EB2BB3A7E562BAB0DE6372E824F65B310D96D840CDAA3C391969018AF6AFBA225665D07139FC938DCFF03F4F8DAE7F19DE61C9A0EAE7C658A32800DC9D123
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......o..?+.nl+.nl+.nl+.ol..nl...l .nl...lk.nl...l$.nl...l*.nl...l{.nl.S.l*.nl...l*.nl...l*.nlRich+.nl........PE..L..../.K...........!.................9.......................................@...........@..........................v..%....k..x.......................`........0.....................................@............................................text....~.......................... ..`.data....].......V..................@....rsrc...............................@..@.reloc...9.......:..................@..B........................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:data
      Category:dropped
      Size (bytes):6796
      Entropy (8bit):7.254765641833245
      Encrypted:false
      SSDEEP:192:NbVvVEQKPnEtObMacxc8hjXHUz1Tr2K4ms6W:L9ELXci2jXHU7s7
      MD5:4B9EDAB17511C7AD0D4753E215160C0A
      SHA1:DBCE3E783F5C24A611D3025155381264D840CAE3
      SHA-256:EB374DB35DF2DE925C71B3AFFA8D9248D68E6005B2015BACC6A6E5A13EE4B046
      SHA-512:D8B97FBEEAE38FE80439CD7589C574FA7FFB81C94494CA507ECDE3F7F5DA948EB54DCA63FD0A633B966494E00B7B8EE3C4F7826F681768C735E04EF97907D6BF
      Malicious:false
      Reputation:low
      Preview:0.....*.H.........y0..u...1.0...+......0.....+.....7......0...0...+.....7..........[.H.....A.j..100602115422Z0...+.....7.....0..L0..&.R4.9.8.6.2.E.C.6.9.E.A.9.7.2.B.E.4.8.9.5.5.0.B.C.2.1.C.C.D.D.5.4.E.A.B.6.B.5.5.9...1..0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........I....r.H.P.!..T.Y0....R6.9.8.7.0.C.9.1.E.5.9.B.0.E.A.C.C.4.E.8.8.B.D.2.D.4.F.9.5.E.7.5.6.1.F.6.3.0.F.E...1..0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........i...........^ua.0.0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}........0..0,..+.....7.....0....S.p.L.e.v.e.l........0...0D..+.....7....604...S.p.A.t.t.r........2.0.0.5.0.2.0.1.0.0.0.0.0.0...0....+.....7....x0v...O.S.A.t.t.r.......`2.:.5...0.,.2.:.5...1.,.2.:.5...2.,.2.:.5...x.,.2.:.6...x.,.2.:.7...x.,.2.:.8...x.,.2.:.9...x......10..`0..L...........
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:Windows setup INFormation
      Category:dropped
      Size (bytes):776
      Entropy (8bit):5.486519677108282
      Encrypted:false
      SSDEEP:24:tsXnoqJhoajifNsVJd6tn8rZVI8h8rspN7O5L:2XthoaefaVJd8nw+KIL
      MD5:24338A297E69E534524A71CD5AD543C3
      SHA1:69870C91E59B0EACC4E88BD2D4F95E7561F630FE
      SHA-256:ED1429A15B15A28F2E6A92DA669A205594D09625CBFCDBF0159516A813A6F5D4
      SHA-512:8BB4AE9C72909C6B8BEB6CA675C007317903869BA56F549D9C2FF48A1FB50923B98B6F748E99BFD56B4B068E14C8773E9BF4DCDF5EB6CCB8B0EDD6A0B16DECC0
      Malicious:false
      Reputation:low
      Preview:..[Version]..Signature = "$Windows NT$"..AdvancedINF = 2.0..Provider = %MSFT%..Class = %ExceptionClassDesc%..ClassGUID = {F5776D81-AE53-4935-8E84-B0B283D8BCEF}..CatalogFile = d3dx10_43_x86.cat..ComponentId = {F191D5F9-6D74-445e-9100-64D61DCD95CA}..DriverVer = 06-02-2010, 5.3.1.0904....[SourceDisksNames]..99 = %DiskName%,"JUN2010_d3dx10_43_x86.cab",0,,-1....[SourceDisksFiles]..d3dx10_43.dll = 99....[DestinationDirs]..DefaultDestDir = 11..DirectX_SysWOW64 = 10,SysWOW64....[x86_Install]..CopyFiles = DirectX_System....[x64_Install]..CopyFiles = DirectX_SysWOW64....[DirectX_System]..d3dx10_43.dll....[DirectX_SysWOW64]..d3dx10_43.dll....[Strings]..MSFT = "Microsoft"..ExceptionClassDesc = "DirectX JUN2010"..DiskName = "DirectX JUN2010 cab"....
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:Windows setup INFormation
      Category:dropped
      Size (bytes):552
      Entropy (8bit):5.278909977985311
      Encrypted:false
      SSDEEP:12:tsXnoHqqltdGTFUMtngTrWgprCpt8e49pt8rsmMN75M51B:tsXnoKgd6tn8rZVI8h8rspN7O5L
      MD5:C6F443FD35C24CFCD2E9E906CA19B6B6
      SHA1:2B74782DDDDFE4878319AF93B03CC5DB35EFDF83
      SHA-256:74F3CC9F80A479FCB4954813DF9AC71085BF407E7B8B447B7ACE3C30E08E6F85
      SHA-512:9C529C7DCA0A4F1C18B394AB4D7AA956B3B154889485C2D9F0D65C4CD45A2F040237512AF2BF61EF155724E0D7401BE4B09CBA96614A493DEFB738028637797D
      Malicious:false
      Reputation:low
      Preview:..[Version]..Signature = "$Windows NT$"..AdvancedINF = 2.0....[SourceDisksNames]..99 = %DiskName%,"JUN2010_d3dx10_43_x86.cab",0,,-1....[SourceDisksFiles]..d3dx10_43.dll = 99....[DestinationDirs]..DefaultDestDir = 11..DirectX_SysWOW64 = 10,SysWOW64....[x86_Install]..CopyFiles = DirectX_System....[x64_Install]..CopyFiles = DirectX_SysWOW64....[DirectX_System]..d3dx10_43.dll....[DirectX_SysWOW64]..d3dx10_43.dll....[Strings]..MSFT = "Microsoft"..ExceptionClassDesc = "DirectX JUN2010"..DiskName = "DirectX JUN2010 cab"....
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):248672
      Entropy (8bit):6.540646534165038
      Encrypted:false
      SSDEEP:6144:8K0GaAtQlDJCSB4MvfIeDRI9Z7IJItblSwJ7FnH4fa1wlMjb5:eGjQlDkSB4MvfIeDRI9Z7IJIRlfJ7N4w
      MD5:8E0BB968FF41D80E5F2C747C04DB79AE
      SHA1:69B332D78020177A9B3F60CB672EC47578003C0D
      SHA-256:492E960CB3CCFC8C25FC83F7C464BA77C86A20411347A1A9B3E5D3E8C9180A8D
      SHA-512:7D71CB5411F239696E77FE57A272C675FE15D32456CE7BEFB0C2CF3FC567DCE5D38A45F4B004577E3DEC283904F42AE17A290105D8AB8EF6B70BAD4E15C9D506
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......t.c.0..Z0..Z0..Z.Z9..Z0..Z...Z.Z9..Z.Zp..Z.Z1..Z.Z...Z.6sZ1..Z.Z1..Z.Z1..ZRich0..Z........PE..L....1.K...........!.....6...|......F........P............................................@..........................<..E...T5..d.......................`.......`...................................`...@...............P............................text...%4.......6.................. ..`.data....S...P...R...:..............@....rsrc...............................@..@.reloc...".......$..................@..B........................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:data
      Category:dropped
      Size (bytes):6796
      Entropy (8bit):7.252886544623485
      Encrypted:false
      SSDEEP:192:RSzM5EQKPnEtObMacxc8hjXHUz1Tr22SM:NELXci2jXHULb
      MD5:8731DC141C5F490C84DE170F78D122C7
      SHA1:99D83EA9BDDDB7636E926811700973FDBAC501CA
      SHA-256:ACA973753DACD00F19A10733F900CD4A0CE6F6A202B4CD82B02A06D6EA8D92F8
      SHA-512:CC1F2F0C8DF1AA87D01D86946AA1312D7A737790A2ACC1A3770F8066D9B34B6CD492EA8B5DA16D68ED2F8E6DA190E7B64AC4C65AC88C1B45D9660BE5F78C1649
      Malicious:false
      Reputation:low
      Preview:0.....*.H.........y0..u...1.0...+......0.....+.....7......0...0...+.....7..........(A.&n|.....100602115422Z0...+.....7.....0..L0....R2.E.3.F.0.4.2.2.E.8.8.D.6.D.B.E.A.F.8.2.1.1.D.7.D.C.E.7.B.3.8.D.3.0.4.8.C.4.3.3...1..0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........?.".m.......0H.30b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0..&.R3.E.A.C.F.B.B.6.7.0.F.6.6.5.3.4.9.C.0.A.2.1.6.9.7.E.2.3.E.4.0.7.4.9.B.9.C.0.4.E...1..0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........>...p.e4..!i~#..I..N....0..0,..+.....7.....0....S.p.L.e.v.e.l........0...0D..+.....7....604...S.p.A.t.t.r........2.0.0.5.0.2.0.1.0.0.0.0.0.0...0....+.....7....x0v...O.S.A.t.t.r.......`2.:.5...0.,.2.:.5...1.,.2.:.5...2.,.2.:.5...x.,.2.:.6...x.,.2.:.7...x.,.2.:.8...x.,.2.:.9...x......10..`0..L...........
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:Windows setup INFormation
      Category:dropped
      Size (bytes):776
      Entropy (8bit):5.5085250435289606
      Encrypted:false
      SSDEEP:24:tsXnoqJhoajRkN+GsVadhn8rZVI8h8rss7BL:2XthoaNkExVadhnw+ZBL
      MD5:5F043E62B5CC2F3D578E8F58AAA09FBA
      SHA1:2E3F0422E88D6DBEAF8211D7DCE7B38D3048C433
      SHA-256:025CFD736326445F5D98D8DFC8584189F8EEBB2D5F3E3CD25A6F386BC2496958
      SHA-512:D1AF12375E5169525464DD17DEC6F6EC437B6A35DB6C425D508FA694B506F302B8A72E3F2222467E2CD98346F017A83B5149B80FC8C06B06320EC9E265280680
      Malicious:false
      Reputation:low
      Preview:..[Version]..Signature = "$Windows NT$"..AdvancedINF = 2.0..Provider = %MSFT%..Class = %ExceptionClassDesc%..ClassGUID = {F5776D81-AE53-4935-8E84-B0B283D8BCEF}..CatalogFile = d3dx11_43_x86.cat..ComponentId = {948C45ED-E04A-48A8-A895-EEC45A7D221B}..DriverVer = 06-02-2010, 5.3.1.0904....[SourceDisksNames]..99 = %DiskName%,"JUN2010_d3dx11_43_x86.cab",0,,-1....[SourceDisksFiles]..d3dx11_43.dll = 99....[DestinationDirs]..DefaultDestDir = 11..DirectX_SysWOW64 = 10,SysWOW64....[x86_Install]..CopyFiles = DirectX_System....[x64_Install]..CopyFiles = DirectX_SysWOW64....[DirectX_System]..d3dx11_43.dll....[DirectX_SysWOW64]..d3dx11_43.dll....[Strings]..MSFT = "Microsoft"..ExceptionClassDesc = "DirectX JUN2010"..DiskName = "DirectX JUN2010 cab"....
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:Windows setup INFormation
      Category:dropped
      Size (bytes):552
      Entropy (8bit):5.277146898626137
      Encrypted:false
      SSDEEP:12:tsXnoHqql+dGTFULngTrWgprCpt8e49pt8rsm37571B:tsXnoKXdhn8rZVI8h8rss7BL
      MD5:6984C5F943AF5FCE6FD432A4F4F74259
      SHA1:A785B65C7E0E1166A5E43DE4AEB13E5441E8898B
      SHA-256:F2DBCB36E32847488C27792CD391E3E17DEBA31FF1F0FEB002A2E9A7EDBA6376
      SHA-512:61C79578BEEB811F744C6EF97DDC2B8D357956AA16F2E5F0ABC1271A65390B160135B105756836B528F1C0EF16AB4B106B064B7C7A71E1C0F30CC42FC4477904
      Malicious:false
      Reputation:low
      Preview:..[Version]..Signature = "$Windows NT$"..AdvancedINF = 2.0....[SourceDisksNames]..99 = %DiskName%,"JUN2010_d3dx11_43_x86.cab",0,,-1....[SourceDisksFiles]..d3dx11_43.dll = 99....[DestinationDirs]..DefaultDestDir = 11..DirectX_SysWOW64 = 10,SysWOW64....[x86_Install]..CopyFiles = DirectX_System....[x64_Install]..CopyFiles = DirectX_SysWOW64....[DirectX_System]..d3dx11_43.dll....[DirectX_SysWOW64]..d3dx11_43.dll....[Strings]..MSFT = "Microsoft"..ExceptionClassDesc = "DirectX JUN2010"..DiskName = "DirectX JUN2010 cab"....
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:Windows setup INFormation
      Category:dropped
      Size (bytes):66865
      Entropy (8bit):5.567626982635727
      Encrypted:false
      SSDEEP:768:Wn+OeDyG6lG9CVGQM6UP8XUUkw8KlNxLkPkjdARflPp0VZRTBM9oZPFASJu71N1F:V
      MD5:B36D3F105D18E55534AD605CBF061A92
      SHA1:788EF2DE1DEA6C8FE1D23A2E1007542F7321ED79
      SHA-256:C6C5E877E92D387E977C135765075B7610DF2500E21C16E106A225216E6442AE
      SHA-512:35AE00DA025FD578205337A018B35176095A876CD3C3CF67A3E8A8E69CD750A4CCC34CE240F11FAE3418E5E93CAF5082C987F0C63F9D953ED7CB8D9271E03B62
      Malicious:false
      Reputation:low
      Preview:..[Version]..Signature=$Chicago$..DisplayName=%SetupTitle%..MinFileSize=2000....[DirectX]..SectionType=Group..Priority=100..DisplayName=%DirectX%....[DXUpdate_Feb2005_x86]..DisplayName=%Feb2005%..Details=%DirectX_Desc%..SectionType=Component..Platform=NT5..Group=DirectX..Size=990,0..GUID={44BBA855-CC51-11CF-AAFA-00AA00B6015C}..URL1="Feb2005_d3dx9_24_x86.cab",3..Version=4,09,00,0904....[DXUpdate_Feb2005_x64]..DisplayName=%Feb2005%..Details=%DirectX_Desc%..SectionType=Component..Platform=NT5..Group=DirectX..Size=1220,0..GUID={44BBA855-CC51-11CF-AAFA-00AA00B6015C}..URL1="Feb2005_d3dx9_24_x64.cab",3..Version=4,09,00,0904....[DXUpdate_Apr2005_x86]..DisplayName=%Apr2005%..Details=%DirectX_Desc%..SectionType=Component..Platform=NT5..Group=DirectX..Size=1055,0..GUID={44BBA855-CC51-11CF-AAFA-00AA00B6015C}..URL1="Apr2005_d3dx9_25_x86.cab",3..Version=4,09,00,0904....[DXUpdate_Apr2005_x64]..DisplayName=%Apr2005%..Details=%DirectX_Desc%..SectionType=Component..Platform=NT5..Group=DirectX..Size=1317
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):177152
      Entropy (8bit):6.549767948531931
      Encrypted:false
      SSDEEP:3072:KU6LKKnw8i/9S7BLGKm/nuFV3uNgosUBxr+2y97CqGIpHtWMeJnQRLj+bTHyKaY:Iw8aIMrfuFVeNgosUBxra4rIZsqq
      MD5:7ED554B08E5B69578F9DE012822C39C9
      SHA1:036D04513E134786B4758DEF5AFF83D19BF50C6E
      SHA-256:FB4F297E295C802B1377C6684734B7249D55743DFB7C14807BEF59A1B5DB63A2
      SHA-512:7AF5F9C4A3AD5C120BCDD681B958808ADA4D885D21AEB4A009A36A674AD3ECE9B51837212A982DB6142A6B5580E5B68D46971B802456701391CE40785AE6EBD9
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............M...M...M.CM...M...MJ..M...M...M...M...M...M...M..KM...M..zM...M..{M...M..JM...M..MM...MRich...M................PE..L......M...........!.....j...n............................................................@.........................pw..V....j..........8.......................X...p...................................@...............8............................text....h.......j.................. ..`.data....:...........n..............@....rsrc...8...........................@..@.reloc..0&.......(..................@..B........................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:Windows setup INFormation
      Category:dropped
      Size (bytes):12848
      Entropy (8bit):5.071095411173453
      Encrypted:false
      SSDEEP:384:eXTiDxtV0xxmBxbD6Ys7s6xHOJYwYdDxAp8xXZyUxIJM:eXiM
      MD5:E6A74342F328AFA559D5B0544E113571
      SHA1:A08B053DFD061391942D359C70F9DD406A968B7D
      SHA-256:93F5589499EE4EE2812D73C0D8FEACBBCFE8C47B6D98572486BC0EFF3C5906CA
      SHA-512:1E35E5BDFF1D551DA6C1220A1A228C657A56A70DEDF5BE2D9273FC540F9C9F0BB73469595309EA1FF561BE7480EE92D16F7ACBBD597136F4FC5F9B8B65ECDFAD
      Malicious:false
      Reputation:low
      Preview:..; ---- Common sections ----..[Version]..Signature = "$CHICAGO$"..AdvancedINF = 2.0..Provider = %MSFT%..SetupClass = BASE....[Strings]..MSFT = "Microsoft"....[MDXDLLs]..Microsoft.DirectX.AudioVideoPlayback.dll..Microsoft.DirectX.Diagnostics.dll..Microsoft.DirectX.Direct3D.dll..Microsoft.DirectX.Direct3DX.dll..Microsoft.DirectX.DirectDraw.dll..Microsoft.DirectX.DirectInput.dll..Microsoft.DirectX.DirectPlay.dll..Microsoft.DirectX.DirectSound.dll..Microsoft.DirectX.dll......; ---- Windows 98 ----..[4.09.00.0904.00-4.09.00.0904.00_Win98_Feb2005_d3dx9_24_x86.cab]..NumberOfFiles=4..Size=2178 ;approximately total file size (Size * 1024 bytes)..CopyCount=1..d3dx9_24_w9x.inf....[4.09.00.0904.00-4.09.00.0904.00_Win98_Feb2005_MDX_x86.MSI]..NumberOfFiles=1..Size=1788 ;approximately total file size (Size * 1024 bytes)..CopyCount=1..Dependencies=feb2005_d3dx9_24_x86.cab..Feb2005_MDX_x86.MSI......; ---- Windows ME ----..[4.09.00.0904.00-4.09.00.0904.00_WinME_Feb2005_d3dx9_24_x86.cab]..N
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):81768
      Entropy (8bit):6.4167890753768395
      Encrypted:false
      SSDEEP:1536:TVeqvNS6T6jxeEsU6b0xZtDDVb9X8u9JA7zitdrz/R8cy/FaeBD:TVeqvNOeFgxZ9DVVtRBy/EeD
      MD5:77F595DEE5FFACEA72B135B1FCE1312E
      SHA1:D2A710B332DE3EF7A576E0AED27B0AE66892B7E9
      SHA-256:8D540D484EA41E374FD0107D55D253F87DED4CE780D515D8FD59BBE8C98970A7
      SHA-512:A8683050D7758C248052C11AC6A46C9A0B3B3773902CCA478C1961B6D9D2D57C75A8C925BA5AF4499989C0F44B34EAF57ABAFAFA26506C31E5E4769FB3439746
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........M..i#Y.i#Y.i#Y.i"Y.i#Y.f~Y.i#Y.f,Y.i#Y.f|Y.i#Y.f.Y.i#Y.fCY.i#Y.f}Y.i#Y.fyY.i#YRich.i#Y........................PE..L...5S.F...........!.........F....................@..........................`..................................................d....0..................h%...@..8....................................&..@...............\............................text...j........................... ..`.data....+..........................@....rsrc........0......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:data
      Category:dropped
      Size (bytes):10392
      Entropy (8bit):7.308938023050865
      Encrypted:false
      SSDEEP:192:Hu8+s9dsGEo6opz+Hz+ehjuOu39DKmHj70dpQ:b+sfhnhu1jRaeWb
      MD5:D0C1F2FB476CDDA4CCE9DEB7856500DA
      SHA1:05365C782FCA083F03C5714C5067ADA547B44CAC
      SHA-256:784FC9D9F071130803E34792755CA68B5D0CA3F509F265B109A533EBE0E5314A
      SHA-512:CB7F47DE766ADD6FA3C37F738BB562B352CB7EF89EB637417FDDD8235D86C503D7037713B0B5AF0C82A6BF4EC816CDE28A90418DC7ECB1E731B64EEE839B8AE4
      Malicious:false
      Reputation:low
      Preview:0.(...*.H........(.0.(....1.0...+......0.....+.....7......0...0...+.....7.......A.n..K..VU..6C..070405015813Z0...+.....7.....0..L0....RE.8.6.C.F.5.3.0.F.E.0.0.C.0.F.A.2.A.1.0.7.6.8.4.A.1.9.8.B.3.7.E.9.7.B.9.C.E.7.6...1..0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........l.0....*.v....~...v0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0..&.RF.7.7.0.E.2.4.2.9.A.D.8.A.C.D.3.8.0.F.7.7.2.5.C.7.6.C.E.B.2.E.1.9.6.6.9.E.6.F.7...1..0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........p.B....r\v..i......0..0,..+.....7.....0....S.p.L.e.v.e.l........0...0D..+.....7....604...S.p.A.t.t.r........2.0.0.5.0.2.0.1.0.0.0.0.0.0...0....+.....7....x0v...O.S.A.t.t.r.......`2.:.5...0.,.2.:.5...1.,.2.:.5...2.,.2.:.5...x.,.2.:.6...x.,.2.:.7...x.,.2.:.8...x.,.2.:.9...x..... .0...0..............
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:Windows setup INFormation
      Category:dropped
      Size (bytes):783
      Entropy (8bit):5.506417721060717
      Encrypted:false
      SSDEEP:12:tsXnoHKJhm+eajQ3YKVmHwXdwXqdRl2qGTF4ngflLgprCpt8e49pt8rsE7x16Zw:tsXnoqJhoajgjzdKqhnUMVI8h8rsE7xH
      MD5:E16C94EDC4B577B7ABE7B06E31376884
      SHA1:E86CF530FE00C0FA2A107684A198B37E97B9CE76
      SHA-256:BA212AA1514DF6509474A46C7B2FA07C210D249B524BF7D47D058461009A75C1
      SHA-512:5405F6936E05E1260A3778D86D76145D2853A345AFA156BA6E0A7CF4BC9267CD4CBB5CD32878ADDA3C6130721218FB899FC896BF823CD63C32C7086B18CFE9DB
      Malicious:false
      Reputation:low
      Preview:..[Version]..Signature = "$Windows NT$"..AdvancedINF = 2.0..Provider = %MSFT%..Class = %ExceptionClassDesc%..ClassGUID = {F5776D81-AE53-4935-8E84-B0B283D8BCEF}..CatalogFile = xinput1_3_x86.cat..ComponentId = {8B594EEF-4FAF-4C62-A647-04CA85E5AB00}..DriverVer = 04-04-2007, 5.3.1.0904....[SourceDisksNames]..99 = %DiskName%,"APR2007_xinput_x86.cab",0,,-1....[SourceDisksFiles]..xinput1_3.dll = 99....[DestinationDirs]..DirectX_System = 11..DirectX_SysWOW64 = 10,SysWOW64....[x86_Install]..CopyFiles = DirectX_System....[x64_Install]..CopyFiles = DirectX_SysWOW64....[DirectX_System]..xinput1_3.dll....[DirectX_SysWOW64]..xinput1_3.dll....[Strings]..MSFT = "Microsoft"..ExceptionClassDesc = "DirectX 9.0 APR2007"..DiskName = "DirectX 9.0 APR2007 cab"....
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:Windows setup INFormation
      Category:dropped
      Size (bytes):559
      Entropy (8bit):5.278451695211352
      Encrypted:false
      SSDEEP:12:tsXnoHqql2qGTF4ngflLgprCpt8e49pt8rsE7x16Zw:tsXnoKhqhnUMVI8h8rsE7xH
      MD5:1B4A9360253BBBF4FF2DC1F8F3C0005C
      SHA1:BC639A35D965C579A7DDA8D60748D7482F737F66
      SHA-256:576AD2F8CC0F371D0E061F4A407153BD90E48841FCE7A8F7EF1FF3FDD4138C99
      SHA-512:C0390CAB5DB06A5930EE563055C29EA10B6751049A77B33C9DD89F4016A3887D4D49670CF66D1F395EDC00A3E127864129EC57CBB4AF21B0D67ED6855950EDE3
      Malicious:false
      Reputation:low
      Preview:..[Version]..Signature = "$Windows NT$"..AdvancedINF = 2.0....[SourceDisksNames]..99 = %DiskName%,"APR2007_xinput_x86.cab",0,,-1....[SourceDisksFiles]..xinput1_3.dll = 99....[DestinationDirs]..DirectX_System = 11..DirectX_SysWOW64 = 10,SysWOW64....[x86_Install]..CopyFiles = DirectX_System....[x64_Install]..CopyFiles = DirectX_SysWOW64....[DirectX_System]..xinput1_3.dll....[DirectX_SysWOW64]..xinput1_3.dll....[Strings]..MSFT = "Microsoft"..ExceptionClassDesc = "DirectX 9.0 APR2007"..DiskName = "DirectX 9.0 APR2007 cab"....
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):216496
      Entropy (8bit):6.646208142644182
      Encrypted:false
      SSDEEP:3072:/Jz/kyKA1X1dxbOZU32KndB4GLvyui2lhQtEaY4IDflQn0xHuudQ+cxEHSiZxaQ:/t/kE1jOZy2KL4GBiwQtEa4L2sV
      MD5:A3AE5D86ECF38DB9427359EA37A5F646
      SHA1:EB4CB5FF520717038ADADCC5E1EF8F7C24B27A90
      SHA-256:C8D190D5BE1EFD2D52F72A72AE9DFA3940AB3FACEB626405959349654FE18B74
      SHA-512:96ECB3BC00848EEB2836E289EF7B7B2607D30790FFD1AE0E0ACFC2E14F26A991C6E728B8DC67280426E478C70231F9E13F514E52C8CE7D956C1FAD0E322D98E0
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........................^.......\......].........................,.......<.........L...'.....'.....'.P.......8.....'.....Rich............................PE..L...Ap.]...........!.........P............................................................@.........................@................P..x....................`..........T...............................@...............<............................text...[........................... ..`.rdata..............................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):116144
      Entropy (8bit):6.633672738599962
      Encrypted:false
      SSDEEP:1536:YImZwomOndvrhsgz56GoiFmntw1ebC0fsWk0FlcdOJKJpPpxyNokVbY4:jewOdvregz5L/mxb7FUOsrPpxyN7/
      MD5:4FDD16752561CF585FED1506914D73E0
      SHA1:F00023B9AE3C8CE5B7BB92F25011EAEBE6F9D424
      SHA-256:AECD2D2FE766F6D439ACC2BBF1346930ECC535012CF5AD7B3273D2875237B7E7
      SHA-512:3695E7EB1E35EC959243A91AB5B4454EB59AEEF0F2699AA5DE8E03DE8FBB89F756A89130526DA5C08815408CB700284A17936522AD2CAD594C3E6E9D18A3F600
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........z.b...1...1...1/.^1...1/.\1...1/.]1...1.s.0...1.s.0...1.s.0...1.c<1...1...1^..1.r.0...1.r.0...1.rP1...1..81...1.r.0...1Rich...1........................PE..L....p.]...........!.................4....... ......................................Y.....@.........................p...\..............x...............................T...........................8...@............ ..(............................text...k........................... ..`.rdata...w... ...x..................@..@.data...<"..........................@....rsrc...x...........................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
      Category:dropped
      Size (bytes):259950
      Entropy (8bit):6.312075792225588
      Encrypted:false
      SSDEEP:3072:FArbg5BxgracGnEnRQOl9WGPotdix9uYuiARxs3J4VtiaGKykjFgESYj:FArbtraBqLlAGvPIs3qtiaCkjKESYj
      MD5:F54843AF156794BA61AE0EC764251229
      SHA1:069BA2232C67729A23841EC6C69021CE63B59A37
      SHA-256:02A22318281D8F0475076239A63434189B142F2F533CA378D074AB9EB4E9CFDA
      SHA-512:2D687454AEFCF93667B4D044092F549650C048E9311ED0A474F7E573F5BC8F9E3E18CECD00A69EB6F2FECEDAA23CC63AD882C193B310D52DBACC6E8049E7CE5C
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..................'P\....'P^....'P_...........................>.......4..................R......:...........Rich...........................PE..L....o.]...........!.....D...|.......L.......`.......................................@....@.........................0}...*......x...............................4... s..T...........................xs..@............`..l............................text....B.......D.................. ..`.rdata...Q...`...R...H..............@..@.data...p...........................@....rsrc...............................@..@.reloc..4...........................@..B................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):1493
      Entropy (8bit):4.732294656481805
      Encrypted:false
      SSDEEP:24:2dhmhx0PY6Iee7LfKhT06XWwlTh17jJBDZtG9jDqRp:c0nd5t7q7WwFD7t3tG96n
      MD5:3A35350940B2FA2C5A9C57BDB25AAE3F
      SHA1:F4D32D9E007478C80C23F7B70245D6401550CE6A
      SHA-256:361F2F5623B1E11403827FFD625C9EDC5D7977D584393D6475FC5E6559C3EDB7
      SHA-512:62756D9247CD6EAD152F00D5FF7627E3158E5F0BEAE00520510830EEB9B1FF5B3A33201BC81240BD31F066198C6B639E3F2CBCEB9155C2CE994900AB3A685E8B
      Malicious:false
      Reputation:low
      Preview:<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.... .. Use supportedRuntime tags to explicitly specify the version(s) of the .NET Framework runtime that.. the custom action should run on. If no versions are specified, the chosen version of the runtime.. will be the "best" match to what Microsoft.Deployment.WindowsInstaller.dll was built against..... WARNING: leaving the version unspecified is dangerous as it introduces a risk of compatibility.. problems with future versions of the .NET Framework runtime. It is highly recommended that you specify.. only the version(s) of the .NET Framework runtime that you have tested against..... Note for .NET Framework v3.0 and v3.5, the runtime version is still v2.0..... In order to enable .NET Framework version 2.0 runtime activation policy, which is to load all assemblies .. by using the lates
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):36352
      Entropy (8bit):4.813800140264642
      Encrypted:false
      SSDEEP:384:v2b9NQxWU/kFDMgVzC2Yejxt2GlKyMmfSFtr5AEmHk4gQLnHMdbR:v2mHkDM32Bj2+KyWrB4gQzMd1
      MD5:2B54558C365370886723974967A60B45
      SHA1:FAF9BF7AC38BF35701DB8BD14321BA5E97A0103F
      SHA-256:A7C459CA67D6388EB3C8D16A210E1DC73F6ABFFBB8A78BCF071C22F809942AFA
      SHA-512:A47E0589FE690D45EEBDD540033FB1C0BEF88DBB6A9ED6FDDA0B989DEF4EBE5683A387CA2F72819727BA5BA372368BC35F76FC6BB32EF860F298FC13525BAB84
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....68e.........." ..0.................. ........... ....................................@....................................O.......d............................................................................ ............... ..H............text...$.... ...................... ..`.rsrc...d...........................@..@.reloc..............................@..B........................H.......,>..he...........................................................0..0.........(......o......(....-........,..o.......&...*.*....................')......Z(.......(....+.......*..{....*"..}....*..{....*.0..........(......~....(....-..*....0..........~.....r...pr...p~....(....o......,..~....(....,;(.....r...pr...p..r...p(....(....r...pr...p~....(....o.......&...,..o....*r...p*........gm.......0..0.......~.....r...pr...p~....(....o.......&...,..*~....*.........".......0..
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):184240
      Entropy (8bit):5.876033362692288
      Encrypted:false
      SSDEEP:3072:BGfZS7hUuK3PcbFeRRLxyR69UgoCaf8+aCnfKlRUjW01KymkO:9zMRLkR6joxfRPW
      MD5:1A5CAEA6734FDD07CAA514C3F3FB75DA
      SHA1:F070AC0D91BD337D7952ABD1DDF19A737B94510C
      SHA-256:CF06D4ED4A8BAF88C82D6C9AE0EFC81C469DE6DA8788AB35F373B350A4B4CDCA
      SHA-512:A22DD3B7CF1C2EDCF5B540F3DAA482268D8038D468B8F00CA623D1C254AFFBBC1446E5BD42ADC3D8E274BE3BA776B0034E179FACCD9AC8612CCD75186D1E3BF1
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....o.].........." ..0...... ......z.... ........... ....................................@.................................(...O................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\cmd.exe
      File Type:ASCII text, with CRLF line terminators
      Category:modified
      Size (bytes):284058
      Entropy (8bit):2.231204244869443
      Encrypted:false
      SSDEEP:1536:AudF+8vdSaRKhOBeurrSLKGIvGy3HYnsedZ989yjpYl8W4KY6GRvjm:AudzTkk
      MD5:66A6D113B17DE11FCD6D8741FAC45C7A
      SHA1:C7F2F9EC9B93D6C2728DD5EE0AA195827C440A53
      SHA-256:CFD8B2D253D933B5316ED43957B7DCDCE204E0CAB5964ACBAC87BFC0F846DCA3
      SHA-512:D07F1CA4CA9EC6697FE582BF44B80EDBE1054E2B84D07365992E7B7359D71889416F3E3E56C626F08962A278A239508C0A64568826A7F3B75D6C51980B850BF4
      Malicious:false
      Reputation:low
      Preview:--2024-06-25 12:45:24-- https://epicgames-download1.akamaized.net/Builds/UnrealEngineLauncher/Installers/Win32/EpicInstaller-15.17.1.msi?launcherfilename=EpicInstaller-15.17.1-unrealEngine.msi..Resolving epicgames-download1.akamaized.net (epicgames-download1.akamaized.net)... 95.101.54.105, 95.101.54.129..Connecting to epicgames-download1.akamaized.net (epicgames-download1.akamaized.net)|95.101.54.105|:443... connected...HTTP request sent, awaiting response... 200 OK..Length: 185073664 (176M) [binary/octet-stream]..Saving to: 'C:/Users/user/Desktop/download/EpicInstaller-15.17.1-unrealEngine.msi'.... 0K .......... .......... .......... .......... .......... 0% 324K 9m17s.. 50K .......... .......... .......... .......... .......... 0% 3.90M 5m1s.. 100K .......... .......... .......... .......... .......... 0% 483K 5m25s.. 150K .......... .......... .......... .......... .......... 0% 4.89M 4m13s.. 200K .......... .......... .......... .......... .......... 0% 833
      Process:C:\Windows\SysWOW64\wget.exe
      File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Epic Games Launcher, Author: Epic Games, Inc., Keywords: Installer, Comments: This installer database contains the logic and data required to install Epic Games Launcher., Create Time/Date: Tue Oct 24 22:37:28 2023, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 4, Template: Intel;1033,1042,1041,2052,1025,1031,1034,1036,1040,1045,1046,1049,1055,1054,1028, Last Saved By: Intel;1033,1042,1041,2052,1025,1031,1034,1036,1040,1045,1046,1049,1055,1054,1028, Revision Number: {B85FAA6E-A9AA-4655-9029-E1A4EDC05E1A}1.3.93.0;{FEC1A84C-0BE3-4B1C-9F28-9E333C9DE22D}1.3.93.0;{D0769F44-D459-450F-B084-CAE38062C75B}, Number of Pages: 405, Number of Characters: 0
      Category:dropped
      Size (bytes):185073664
      Entropy (8bit):7.997663391194621
      Encrypted:true
      SSDEEP:3145728:oyKHxXZR5bsPL+buxE4ynkX+kKbtt3V8mIeDLhZ8muXNNE7byK88OmTZbOW/rXiA:IP4PAwUnkuk8BNbLIxg7bUQ
      MD5:7A2CF04AC0C504A8EA5AED805DDE484D
      SHA1:0536D7A178D1A42CEA1476EA6B44BC53ED26BC63
      SHA-256:6F3F486D7A8409FC174198818C039152C6268BD9FDF210EE6BE1C91BF832B7E9
      SHA-512:42AEED1D015AB279DF3065E04ADFF8001672A13180F4D73121ACE3BC8989783F12C7A5D0B50C684C74FD138FC1B4F451439ACD7B6342D4F60C7D3A18034E0988
      Malicious:false
      Reputation:low
      Preview:......................>...................-................................................................ ...$...(...,...0...4...8...<...@...D...H...L...P...T...X...\...`...d...h...l...p...t...x...|..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Epic Games Launcher, Author: Epic Games, Inc., Keywords: Installer, Comments: This installer database contains the logic and data required to install Epic Games Launcher., Create Time/Date: Tue Oct 24 22:37:28 2023, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 4, Template: Intel;1033,1042,1041,2052,1025,1031,1034,1036,1040,1045,1046,1049,1055,1054,1028, Last Saved By: Intel;1033,1042,1041,2052,1025,1031,1034,1036,1040,1045,1046,1049,1055,1054,1028, Revision Number: {B85FAA6E-A9AA-4655-9029-E1A4EDC05E1A}1.3.93.0;{FEC1A84C-0BE3-4B1C-9F28-9E333C9DE22D}1.3.93.0;{D0769F44-D459-450F-B084-CAE38062C75B}, Number of Pages: 405, Number of Characters: 0
      Category:dropped
      Size (bytes):185073664
      Entropy (8bit):7.997663391194621
      Encrypted:true
      SSDEEP:3145728:oyKHxXZR5bsPL+buxE4ynkX+kKbtt3V8mIeDLhZ8muXNNE7byK88OmTZbOW/rXiA:IP4PAwUnkuk8BNbLIxg7bUQ
      MD5:7A2CF04AC0C504A8EA5AED805DDE484D
      SHA1:0536D7A178D1A42CEA1476EA6B44BC53ED26BC63
      SHA-256:6F3F486D7A8409FC174198818C039152C6268BD9FDF210EE6BE1C91BF832B7E9
      SHA-512:42AEED1D015AB279DF3065E04ADFF8001672A13180F4D73121ACE3BC8989783F12C7A5D0B50C684C74FD138FC1B4F451439ACD7B6342D4F60C7D3A18034E0988
      Malicious:false
      Reputation:low
      Preview:......................>...................-................................................................ ...$...(...,...0...4...8...<...@...D...H...L...P...T...X...\...`...d...h...l...p...t...x...|..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):216496
      Entropy (8bit):6.646208142644182
      Encrypted:false
      SSDEEP:3072:/Jz/kyKA1X1dxbOZU32KndB4GLvyui2lhQtEaY4IDflQn0xHuudQ+cxEHSiZxaQ:/t/kE1jOZy2KL4GBiwQtEa4L2sV
      MD5:A3AE5D86ECF38DB9427359EA37A5F646
      SHA1:EB4CB5FF520717038ADADCC5E1EF8F7C24B27A90
      SHA-256:C8D190D5BE1EFD2D52F72A72AE9DFA3940AB3FACEB626405959349654FE18B74
      SHA-512:96ECB3BC00848EEB2836E289EF7B7B2607D30790FFD1AE0E0ACFC2E14F26A991C6E728B8DC67280426E478C70231F9E13F514E52C8CE7D956C1FAD0E322D98E0
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........................^.......\......].........................,.......<.........L...'.....'.....'.P.......8.....'.....Rich............................PE..L...Ap.]...........!.........P............................................................@.........................@................P..x....................`..........T...............................@...............<............................text...[........................... ..`.rdata..............................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
      Category:dropped
      Size (bytes):259950
      Entropy (8bit):6.312075792225588
      Encrypted:false
      SSDEEP:3072:FArbg5BxgracGnEnRQOl9WGPotdix9uYuiARxs3J4VtiaGKykjFgESYj:FArbtraBqLlAGvPIs3qtiaCkjKESYj
      MD5:F54843AF156794BA61AE0EC764251229
      SHA1:069BA2232C67729A23841EC6C69021CE63B59A37
      SHA-256:02A22318281D8F0475076239A63434189B142F2F533CA378D074AB9EB4E9CFDA
      SHA-512:2D687454AEFCF93667B4D044092F549650C048E9311ED0A474F7E573F5BC8F9E3E18CECD00A69EB6F2FECEDAA23CC63AD882C193B310D52DBACC6E8049E7CE5C
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..................'P\....'P^....'P_...........................>.......4..................R......:...........Rich...........................PE..L....o.]...........!.....D...|.......L.......`.......................................@....@.........................0}...*......x...............................4... s..T...........................xs..@............`..l............................text....B.......D.................. ..`.rdata...Q...`...R...H..............@..@.data...p...........................@....rsrc...............................@..@.reloc..4...........................@..B................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):1493
      Entropy (8bit):4.732294656481805
      Encrypted:false
      SSDEEP:24:2dhmhx0PY6Iee7LfKhT06XWwlTh17jJBDZtG9jDqRp:c0nd5t7q7WwFD7t3tG96n
      MD5:3A35350940B2FA2C5A9C57BDB25AAE3F
      SHA1:F4D32D9E007478C80C23F7B70245D6401550CE6A
      SHA-256:361F2F5623B1E11403827FFD625C9EDC5D7977D584393D6475FC5E6559C3EDB7
      SHA-512:62756D9247CD6EAD152F00D5FF7627E3158E5F0BEAE00520510830EEB9B1FF5B3A33201BC81240BD31F066198C6B639E3F2CBCEB9155C2CE994900AB3A685E8B
      Malicious:false
      Reputation:low
      Preview:<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.... .. Use supportedRuntime tags to explicitly specify the version(s) of the .NET Framework runtime that.. the custom action should run on. If no versions are specified, the chosen version of the runtime.. will be the "best" match to what Microsoft.Deployment.WindowsInstaller.dll was built against..... WARNING: leaving the version unspecified is dangerous as it introduces a risk of compatibility.. problems with future versions of the .NET Framework runtime. It is highly recommended that you specify.. only the version(s) of the .NET Framework runtime that you have tested against..... Note for .NET Framework v3.0 and v3.5, the runtime version is still v2.0..... In order to enable .NET Framework version 2.0 runtime activation policy, which is to load all assemblies .. by using the lates
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):36352
      Entropy (8bit):4.813800140264642
      Encrypted:false
      SSDEEP:384:v2b9NQxWU/kFDMgVzC2Yejxt2GlKyMmfSFtr5AEmHk4gQLnHMdbR:v2mHkDM32Bj2+KyWrB4gQzMd1
      MD5:2B54558C365370886723974967A60B45
      SHA1:FAF9BF7AC38BF35701DB8BD14321BA5E97A0103F
      SHA-256:A7C459CA67D6388EB3C8D16A210E1DC73F6ABFFBB8A78BCF071C22F809942AFA
      SHA-512:A47E0589FE690D45EEBDD540033FB1C0BEF88DBB6A9ED6FDDA0B989DEF4EBE5683A387CA2F72819727BA5BA372368BC35F76FC6BB32EF860F298FC13525BAB84
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....68e.........." ..0.................. ........... ....................................@....................................O.......d............................................................................ ............... ..H............text...$.... ...................... ..`.rsrc...d...........................@..@.reloc..............................@..B........................H.......,>..he...........................................................0..0.........(......o......(....-........,..o.......&...*.*....................')......Z(.......(....+.......*..{....*"..}....*..{....*.0..........(......~....(....-..*....0..........~.....r...pr...p~....(....o......,..~....(....,;(.....r...pr...p..r...p(....(....r...pr...p~....(....o.......&...,..o....*r...p*........gm.......0..0.......~.....r...pr...p~....(....o.......&...,..*~....*.........".......0..
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):184240
      Entropy (8bit):5.876033362692288
      Encrypted:false
      SSDEEP:3072:BGfZS7hUuK3PcbFeRRLxyR69UgoCaf8+aCnfKlRUjW01KymkO:9zMRLkR6joxfRPW
      MD5:1A5CAEA6734FDD07CAA514C3F3FB75DA
      SHA1:F070AC0D91BD337D7952ABD1DDF19A737B94510C
      SHA-256:CF06D4ED4A8BAF88C82D6C9AE0EFC81C469DE6DA8788AB35F373B350A4B4CDCA
      SHA-512:A22DD3B7CF1C2EDCF5B540F3DAA482268D8038D468B8F00CA623D1C254AFFBBC1446E5BD42ADC3D8E274BE3BA776B0034E179FACCD9AC8612CCD75186D1E3BF1
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....o.].........." ..0...... ......z.... ........... ....................................@.................................(...O................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
      Category:dropped
      Size (bytes):259950
      Entropy (8bit):6.312075792225588
      Encrypted:false
      SSDEEP:3072:FArbg5BxgracGnEnRQOl9WGPotdix9uYuiARxs3J4VtiaGKykjFgESYj:FArbtraBqLlAGvPIs3qtiaCkjKESYj
      MD5:F54843AF156794BA61AE0EC764251229
      SHA1:069BA2232C67729A23841EC6C69021CE63B59A37
      SHA-256:02A22318281D8F0475076239A63434189B142F2F533CA378D074AB9EB4E9CFDA
      SHA-512:2D687454AEFCF93667B4D044092F549650C048E9311ED0A474F7E573F5BC8F9E3E18CECD00A69EB6F2FECEDAA23CC63AD882C193B310D52DBACC6E8049E7CE5C
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..................'P\....'P^....'P_...........................>.......4..................R......:...........Rich...........................PE..L....o.]...........!.....D...|.......L.......`.......................................@....@.........................0}...*......x...............................4... s..T...........................xs..@............`..l............................text....B.......D.................. ..`.rdata...Q...`...R...H..............@..@.data...p...........................@....rsrc...............................@..@.reloc..4...........................@..B................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):1493
      Entropy (8bit):4.732294656481805
      Encrypted:false
      SSDEEP:24:2dhmhx0PY6Iee7LfKhT06XWwlTh17jJBDZtG9jDqRp:c0nd5t7q7WwFD7t3tG96n
      MD5:3A35350940B2FA2C5A9C57BDB25AAE3F
      SHA1:F4D32D9E007478C80C23F7B70245D6401550CE6A
      SHA-256:361F2F5623B1E11403827FFD625C9EDC5D7977D584393D6475FC5E6559C3EDB7
      SHA-512:62756D9247CD6EAD152F00D5FF7627E3158E5F0BEAE00520510830EEB9B1FF5B3A33201BC81240BD31F066198C6B639E3F2CBCEB9155C2CE994900AB3A685E8B
      Malicious:false
      Reputation:low
      Preview:<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.... .. Use supportedRuntime tags to explicitly specify the version(s) of the .NET Framework runtime that.. the custom action should run on. If no versions are specified, the chosen version of the runtime.. will be the "best" match to what Microsoft.Deployment.WindowsInstaller.dll was built against..... WARNING: leaving the version unspecified is dangerous as it introduces a risk of compatibility.. problems with future versions of the .NET Framework runtime. It is highly recommended that you specify.. only the version(s) of the .NET Framework runtime that you have tested against..... Note for .NET Framework v3.0 and v3.5, the runtime version is still v2.0..... In order to enable .NET Framework version 2.0 runtime activation policy, which is to load all assemblies .. by using the lates
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):36352
      Entropy (8bit):4.813800140264642
      Encrypted:false
      SSDEEP:384:v2b9NQxWU/kFDMgVzC2Yejxt2GlKyMmfSFtr5AEmHk4gQLnHMdbR:v2mHkDM32Bj2+KyWrB4gQzMd1
      MD5:2B54558C365370886723974967A60B45
      SHA1:FAF9BF7AC38BF35701DB8BD14321BA5E97A0103F
      SHA-256:A7C459CA67D6388EB3C8D16A210E1DC73F6ABFFBB8A78BCF071C22F809942AFA
      SHA-512:A47E0589FE690D45EEBDD540033FB1C0BEF88DBB6A9ED6FDDA0B989DEF4EBE5683A387CA2F72819727BA5BA372368BC35F76FC6BB32EF860F298FC13525BAB84
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....68e.........." ..0.................. ........... ....................................@....................................O.......d............................................................................ ............... ..H............text...$.... ...................... ..`.rsrc...d...........................@..@.reloc..............................@..B........................H.......,>..he...........................................................0..0.........(......o......(....-........,..o.......&...*.*....................')......Z(.......(....+.......*..{....*"..}....*..{....*.0..........(......~....(....-..*....0..........~.....r...pr...p~....(....o......,..~....(....,;(.....r...pr...p..r...p(....(....r...pr...p~....(....o.......&...,..o....*r...p*........gm.......0..0.......~.....r...pr...p~....(....o.......&...,..*~....*.........".......0..
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):184240
      Entropy (8bit):5.876033362692288
      Encrypted:false
      SSDEEP:3072:BGfZS7hUuK3PcbFeRRLxyR69UgoCaf8+aCnfKlRUjW01KymkO:9zMRLkR6joxfRPW
      MD5:1A5CAEA6734FDD07CAA514C3F3FB75DA
      SHA1:F070AC0D91BD337D7952ABD1DDF19A737B94510C
      SHA-256:CF06D4ED4A8BAF88C82D6C9AE0EFC81C469DE6DA8788AB35F373B350A4B4CDCA
      SHA-512:A22DD3B7CF1C2EDCF5B540F3DAA482268D8038D468B8F00CA623D1C254AFFBBC1446E5BD42ADC3D8E274BE3BA776B0034E179FACCD9AC8612CCD75186D1E3BF1
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....o.].........." ..0...... ......z.... ........... ....................................@.................................(...O................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):2861758
      Entropy (8bit):6.169118854720023
      Encrypted:false
      SSDEEP:24576:Rog5kZwu04dsB56BbMoKvlGJtaMRalFzOE2Z34K/zOE2Z34Kz:Rv2E6Bb6lWafnUIynUIG
      MD5:9E23E0276BDBC1B2E4D0572F524CD9BD
      SHA1:ED336252CE487CD876284FCE0A164405A7F8196A
      SHA-256:35515683EB5F46605B4D293DB32C2F95297DB7370B398EA4F91EF86F9B34AC8F
      SHA-512:978904112292D9CA9B18BFD6AB056CB0EB0CCEEE0CCDABE9C87D9A0EBF96427F01AC5E2FAE9A627E0B9BFCC8548340B067CA6B82AC94CFD27DE56F7515A7C42A
      Malicious:false
      Reputation:low
      Preview:...@IXOS.@.....@.f.X.@.....@.....@.....@.....@.....@......&.{B85FAA6E-A9AA-4655-9029-E1A4EDC05E1A}..Epic Games Launcher&.EpicInstaller-15.17.1-unrealEngine.msi.@.....@]....@.....@......Installer.ico..&.{A13B70BC-1756-496B-B59D-57ABAB414A7D}.....@.....@.....@.....@.......@.....@.....@.......@......Epic Games Launcher......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration...@.....@.....@.]....&.{0A1854C3-A103-4EB9-AEFF-23E9388B9BA4}/.02:\Software\EpicGames\Unreal Engine\INSTALLDIR.@.......@.....@.....@......&.{50381214-3C27-4EA2-9681-8D3B63ADCF11}D.01:\Software\Epic Games\EpicGamesLauncher\StartMenuShortcutInstalled.@.......@.....@.....@......&.{14FC0C7C-7052-4099-8639-D521EF685E17}B.01:\Software\Epic Games\EpicGamesLauncher\DesktopShortcutInstalled.@.......@.....@.....@......&.{15FF6EE8-2A78-4FD0-830D-1A000D175ACF};.C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe.@.....
      Process:C:\Windows\System32\msiexec.exe
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
      Category:dropped
      Size (bytes):259950
      Entropy (8bit):6.312075792225588
      Encrypted:false
      SSDEEP:3072:FArbg5BxgracGnEnRQOl9WGPotdix9uYuiARxs3J4VtiaGKykjFgESYj:FArbtraBqLlAGvPIs3qtiaCkjKESYj
      MD5:F54843AF156794BA61AE0EC764251229
      SHA1:069BA2232C67729A23841EC6C69021CE63B59A37
      SHA-256:02A22318281D8F0475076239A63434189B142F2F533CA378D074AB9EB4E9CFDA
      SHA-512:2D687454AEFCF93667B4D044092F549650C048E9311ED0A474F7E573F5BC8F9E3E18CECD00A69EB6F2FECEDAA23CC63AD882C193B310D52DBACC6E8049E7CE5C
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..................'P\....'P^....'P_...........................>.......4..................R......:...........Rich...........................PE..L....o.]...........!.....D...|.......L.......`.......................................@....@.........................0}...*......x...............................4... s..T...........................xs..@............`..l............................text....B.......D.................. ..`.rdata...Q...`...R...H..............@..@.data...p...........................@....rsrc...............................@..@.reloc..4...........................@..B................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):1493
      Entropy (8bit):4.732294656481805
      Encrypted:false
      SSDEEP:24:2dhmhx0PY6Iee7LfKhT06XWwlTh17jJBDZtG9jDqRp:c0nd5t7q7WwFD7t3tG96n
      MD5:3A35350940B2FA2C5A9C57BDB25AAE3F
      SHA1:F4D32D9E007478C80C23F7B70245D6401550CE6A
      SHA-256:361F2F5623B1E11403827FFD625C9EDC5D7977D584393D6475FC5E6559C3EDB7
      SHA-512:62756D9247CD6EAD152F00D5FF7627E3158E5F0BEAE00520510830EEB9B1FF5B3A33201BC81240BD31F066198C6B639E3F2CBCEB9155C2CE994900AB3A685E8B
      Malicious:false
      Reputation:low
      Preview:<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.... .. Use supportedRuntime tags to explicitly specify the version(s) of the .NET Framework runtime that.. the custom action should run on. If no versions are specified, the chosen version of the runtime.. will be the "best" match to what Microsoft.Deployment.WindowsInstaller.dll was built against..... WARNING: leaving the version unspecified is dangerous as it introduces a risk of compatibility.. problems with future versions of the .NET Framework runtime. It is highly recommended that you specify.. only the version(s) of the .NET Framework runtime that you have tested against..... Note for .NET Framework v3.0 and v3.5, the runtime version is still v2.0..... In order to enable .NET Framework version 2.0 runtime activation policy, which is to load all assemblies .. by using the lates
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):36352
      Entropy (8bit):4.813800140264642
      Encrypted:false
      SSDEEP:384:v2b9NQxWU/kFDMgVzC2Yejxt2GlKyMmfSFtr5AEmHk4gQLnHMdbR:v2mHkDM32Bj2+KyWrB4gQzMd1
      MD5:2B54558C365370886723974967A60B45
      SHA1:FAF9BF7AC38BF35701DB8BD14321BA5E97A0103F
      SHA-256:A7C459CA67D6388EB3C8D16A210E1DC73F6ABFFBB8A78BCF071C22F809942AFA
      SHA-512:A47E0589FE690D45EEBDD540033FB1C0BEF88DBB6A9ED6FDDA0B989DEF4EBE5683A387CA2F72819727BA5BA372368BC35F76FC6BB32EF860F298FC13525BAB84
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....68e.........." ..0.................. ........... ....................................@....................................O.......d............................................................................ ............... ..H............text...$.... ...................... ..`.rsrc...d...........................@..@.reloc..............................@..B........................H.......,>..he...........................................................0..0.........(......o......(....-........,..o.......&...*.*....................')......Z(.......(....+.......*..{....*"..}....*..{....*.0..........(......~....(....-..*....0..........~.....r...pr...p~....(....o......,..~....(....,;(.....r...pr...p..r...p(....(....r...pr...p~....(....o.......&...,..o....*r...p*........gm.......0..0.......~.....r...pr...p~....(....o.......&...,..*~....*.........".......0..
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):184240
      Entropy (8bit):5.876033362692288
      Encrypted:false
      SSDEEP:3072:BGfZS7hUuK3PcbFeRRLxyR69UgoCaf8+aCnfKlRUjW01KymkO:9zMRLkR6joxfRPW
      MD5:1A5CAEA6734FDD07CAA514C3F3FB75DA
      SHA1:F070AC0D91BD337D7952ABD1DDF19A737B94510C
      SHA-256:CF06D4ED4A8BAF88C82D6C9AE0EFC81C469DE6DA8788AB35F373B350A4B4CDCA
      SHA-512:A22DD3B7CF1C2EDCF5B540F3DAA482268D8038D468B8F00CA623D1C254AFFBBC1446E5BD42ADC3D8E274BE3BA776B0034E179FACCD9AC8612CCD75186D1E3BF1
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....o.].........." ..0...... ......z.... ........... ....................................@.................................(...O................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):1493
      Entropy (8bit):4.732294656481805
      Encrypted:false
      SSDEEP:24:2dhmhx0PY6Iee7LfKhT06XWwlTh17jJBDZtG9jDqRp:c0nd5t7q7WwFD7t3tG96n
      MD5:3A35350940B2FA2C5A9C57BDB25AAE3F
      SHA1:F4D32D9E007478C80C23F7B70245D6401550CE6A
      SHA-256:361F2F5623B1E11403827FFD625C9EDC5D7977D584393D6475FC5E6559C3EDB7
      SHA-512:62756D9247CD6EAD152F00D5FF7627E3158E5F0BEAE00520510830EEB9B1FF5B3A33201BC81240BD31F066198C6B639E3F2CBCEB9155C2CE994900AB3A685E8B
      Malicious:false
      Reputation:low
      Preview:<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.... .. Use supportedRuntime tags to explicitly specify the version(s) of the .NET Framework runtime that.. the custom action should run on. If no versions are specified, the chosen version of the runtime.. will be the "best" match to what Microsoft.Deployment.WindowsInstaller.dll was built against..... WARNING: leaving the version unspecified is dangerous as it introduces a risk of compatibility.. problems with future versions of the .NET Framework runtime. It is highly recommended that you specify.. only the version(s) of the .NET Framework runtime that you have tested against..... Note for .NET Framework v3.0 and v3.5, the runtime version is still v2.0..... In order to enable .NET Framework version 2.0 runtime activation policy, which is to load all assemblies .. by using the lates
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):36352
      Entropy (8bit):4.813800140264642
      Encrypted:false
      SSDEEP:384:v2b9NQxWU/kFDMgVzC2Yejxt2GlKyMmfSFtr5AEmHk4gQLnHMdbR:v2mHkDM32Bj2+KyWrB4gQzMd1
      MD5:2B54558C365370886723974967A60B45
      SHA1:FAF9BF7AC38BF35701DB8BD14321BA5E97A0103F
      SHA-256:A7C459CA67D6388EB3C8D16A210E1DC73F6ABFFBB8A78BCF071C22F809942AFA
      SHA-512:A47E0589FE690D45EEBDD540033FB1C0BEF88DBB6A9ED6FDDA0B989DEF4EBE5683A387CA2F72819727BA5BA372368BC35F76FC6BB32EF860F298FC13525BAB84
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....68e.........." ..0.................. ........... ....................................@....................................O.......d............................................................................ ............... ..H............text...$.... ...................... ..`.rsrc...d...........................@..@.reloc..............................@..B........................H.......,>..he...........................................................0..0.........(......o......(....-........,..o.......&...*.*....................')......Z(.......(....+.......*..{....*"..}....*..{....*.0..........(......~....(....-..*....0..........~.....r...pr...p~....(....o......,..~....(....,;(.....r...pr...p..r...p(....(....r...pr...p~....(....o.......&...,..o....*r...p*........gm.......0..0.......~.....r...pr...p~....(....o.......&...,..*~....*.........".......0..
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):184240
      Entropy (8bit):5.876033362692288
      Encrypted:false
      SSDEEP:3072:BGfZS7hUuK3PcbFeRRLxyR69UgoCaf8+aCnfKlRUjW01KymkO:9zMRLkR6joxfRPW
      MD5:1A5CAEA6734FDD07CAA514C3F3FB75DA
      SHA1:F070AC0D91BD337D7952ABD1DDF19A737B94510C
      SHA-256:CF06D4ED4A8BAF88C82D6C9AE0EFC81C469DE6DA8788AB35F373B350A4B4CDCA
      SHA-512:A22DD3B7CF1C2EDCF5B540F3DAA482268D8038D468B8F00CA623D1C254AFFBBC1446E5BD42ADC3D8E274BE3BA776B0034E179FACCD9AC8612CCD75186D1E3BF1
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....o.].........." ..0...... ......z.... ........... ....................................@.................................(...O................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):1493
      Entropy (8bit):4.732294656481805
      Encrypted:false
      SSDEEP:24:2dhmhx0PY6Iee7LfKhT06XWslTh17jJB7ZtG9jDqRp:c0nd5t7q7WsFD7tztG96n
      MD5:01C01D040563A55E0FD31CC8DAA5F155
      SHA1:3C1C229703198F9772D7721357F1B90281917842
      SHA-256:33D947C04A10E3AFF3DCA3B779393FA56CE5F02251C8CBAE5076A125FDEA081F
      SHA-512:9C3F0CC17868479575090E1949E31A688B8C1CDFA56AC4A08CBE661466BB40ECFC94EA512DC4B64D5FF14A563F96F1E71C03B6EEACC42992455BD4F1C91F17D5
      Malicious:false
      Reputation:low
      Preview:<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.... .. Use supportedRuntime tags to explicitly specify the version(s) of the .NET Framework runtime that.. the custom action should run on. If no versions are specified, the chosen version of the runtime.. will be the "best" match to what Microsoft.Deployment.WindowsInstaller.dll was built against..... WARNING: leaving the version unspecified is dangerous as it introduces a risk of compatibility.. problems with future versions of the .NET Framework runtime. It is highly recommended that you specify.. only the version(s) of the .NET Framework runtime that you have tested against..... Note for .NET Framework v3.0 and v3.5, the runtime version is still v2.0..... In order to enable .NET Framework version 2.0 runtime activation policy, which is to load all assemblies.. by using the latest
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):51200
      Entropy (8bit):5.0659062068745335
      Encrypted:false
      SSDEEP:768:9aob1Yt6/ibkVewbBUwBWnC0ee76rUYxv:/v/PlJWC9drUYxv
      MD5:2CF9FE3247BB25DAF0AADDEFD6D40763
      SHA1:DC9B4F8E2BB6E202500061E0E03DDDB102E42F26
      SHA-256:DD24F8EF3EF4B6BC58B08ADE93E4AAC64856EE681909201B42CB0111A45FE9E6
      SHA-512:4AF9A34082DD04179A080918C88FFFD2DDBC1D7E34779C50F8B9A2EEC9CFB65F2DE3EA016FA0843DE97DFEA5B0CA7E86F07EC0D7D1358DF6A3BCCB54C806A11C
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...}..d.........." ..0.............2.... ........... ....................... ............@.....................................O.......d............................................................................ ............... ..H............text...8.... ...................... ..`.rsrc...d...........................@..@.reloc..............................@..B........................H.......<T..l............................................................0...........-.r...ps....z...u....,...+_.u0...,...+S.u1...-(.u2...- .u3...-..u4...-..u5...-..u6...,...+..u....,...+..u7...-..u8...,.......(....*.0..]........-.r...ps....z..(......sv......ox.....-...ou....o.....$..ou.....o.......,..o......,..o......*.........%."G..........4Q.......0..K........-.r...ps....z.sv......ow.....-....%..ou.....o........,..o......,..o......*..........5..........*?......&...(....*..
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):184240
      Entropy (8bit):5.876033362692288
      Encrypted:false
      SSDEEP:3072:BGfZS7hUuK3PcbFeRRLxyR69UgoCaf8+aCnfKlRUjW01KymkO:9zMRLkR6joxfRPW
      MD5:1A5CAEA6734FDD07CAA514C3F3FB75DA
      SHA1:F070AC0D91BD337D7952ABD1DDF19A737B94510C
      SHA-256:CF06D4ED4A8BAF88C82D6C9AE0EFC81C469DE6DA8788AB35F373B350A4B4CDCA
      SHA-512:A22DD3B7CF1C2EDCF5B540F3DAA482268D8038D468B8F00CA623D1C254AFFBBC1446E5BD42ADC3D8E274BE3BA776B0034E179FACCD9AC8612CCD75186D1E3BF1
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....o.].........." ..0...... ......z.... ........... ....................................@.................................(...O................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):1493
      Entropy (8bit):4.732294656481805
      Encrypted:false
      SSDEEP:24:2dhmhx0PY6Iee7LfKhT06XWslTh17jJB7ZtG9jDqRp:c0nd5t7q7WsFD7tztG96n
      MD5:01C01D040563A55E0FD31CC8DAA5F155
      SHA1:3C1C229703198F9772D7721357F1B90281917842
      SHA-256:33D947C04A10E3AFF3DCA3B779393FA56CE5F02251C8CBAE5076A125FDEA081F
      SHA-512:9C3F0CC17868479575090E1949E31A688B8C1CDFA56AC4A08CBE661466BB40ECFC94EA512DC4B64D5FF14A563F96F1E71C03B6EEACC42992455BD4F1C91F17D5
      Malicious:false
      Reputation:low
      Preview:<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.... .. Use supportedRuntime tags to explicitly specify the version(s) of the .NET Framework runtime that.. the custom action should run on. If no versions are specified, the chosen version of the runtime.. will be the "best" match to what Microsoft.Deployment.WindowsInstaller.dll was built against..... WARNING: leaving the version unspecified is dangerous as it introduces a risk of compatibility.. problems with future versions of the .NET Framework runtime. It is highly recommended that you specify.. only the version(s) of the .NET Framework runtime that you have tested against..... Note for .NET Framework v3.0 and v3.5, the runtime version is still v2.0..... In order to enable .NET Framework version 2.0 runtime activation policy, which is to load all assemblies.. by using the latest
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):51200
      Entropy (8bit):5.0659062068745335
      Encrypted:false
      SSDEEP:768:9aob1Yt6/ibkVewbBUwBWnC0ee76rUYxv:/v/PlJWC9drUYxv
      MD5:2CF9FE3247BB25DAF0AADDEFD6D40763
      SHA1:DC9B4F8E2BB6E202500061E0E03DDDB102E42F26
      SHA-256:DD24F8EF3EF4B6BC58B08ADE93E4AAC64856EE681909201B42CB0111A45FE9E6
      SHA-512:4AF9A34082DD04179A080918C88FFFD2DDBC1D7E34779C50F8B9A2EEC9CFB65F2DE3EA016FA0843DE97DFEA5B0CA7E86F07EC0D7D1358DF6A3BCCB54C806A11C
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...}..d.........." ..0.............2.... ........... ....................... ............@.....................................O.......d............................................................................ ............... ..H............text...8.... ...................... ..`.rsrc...d...........................@..@.reloc..............................@..B........................H.......<T..l............................................................0...........-.r...ps....z...u....,...+_.u0...,...+S.u1...-(.u2...- .u3...-..u4...-..u5...-..u6...,...+..u....,...+..u7...-..u8...,.......(....*.0..]........-.r...ps....z..(......sv......ox.....-...ou....o.....$..ou.....o.......,..o......,..o......*.........%."G..........4Q.......0..K........-.r...ps....z.sv......ow.....-....%..ou.....o........,..o......,..o......*..........5..........*?......&...(....*..
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):184240
      Entropy (8bit):5.876033362692288
      Encrypted:false
      SSDEEP:3072:BGfZS7hUuK3PcbFeRRLxyR69UgoCaf8+aCnfKlRUjW01KymkO:9zMRLkR6joxfRPW
      MD5:1A5CAEA6734FDD07CAA514C3F3FB75DA
      SHA1:F070AC0D91BD337D7952ABD1DDF19A737B94510C
      SHA-256:CF06D4ED4A8BAF88C82D6C9AE0EFC81C469DE6DA8788AB35F373B350A4B4CDCA
      SHA-512:A22DD3B7CF1C2EDCF5B540F3DAA482268D8038D468B8F00CA623D1C254AFFBBC1446E5BD42ADC3D8E274BE3BA776B0034E179FACCD9AC8612CCD75186D1E3BF1
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....o.].........." ..0...... ......z.... ........... ....................................@.................................(...O................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):1493
      Entropy (8bit):4.732294656481805
      Encrypted:false
      SSDEEP:24:2dhmhx0PY6Iee7LfKhT06XWslTh17jJB7ZtG9jDqRp:c0nd5t7q7WsFD7tztG96n
      MD5:01C01D040563A55E0FD31CC8DAA5F155
      SHA1:3C1C229703198F9772D7721357F1B90281917842
      SHA-256:33D947C04A10E3AFF3DCA3B779393FA56CE5F02251C8CBAE5076A125FDEA081F
      SHA-512:9C3F0CC17868479575090E1949E31A688B8C1CDFA56AC4A08CBE661466BB40ECFC94EA512DC4B64D5FF14A563F96F1E71C03B6EEACC42992455BD4F1C91F17D5
      Malicious:false
      Reputation:low
      Preview:<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.... .. Use supportedRuntime tags to explicitly specify the version(s) of the .NET Framework runtime that.. the custom action should run on. If no versions are specified, the chosen version of the runtime.. will be the "best" match to what Microsoft.Deployment.WindowsInstaller.dll was built against..... WARNING: leaving the version unspecified is dangerous as it introduces a risk of compatibility.. problems with future versions of the .NET Framework runtime. It is highly recommended that you specify.. only the version(s) of the .NET Framework runtime that you have tested against..... Note for .NET Framework v3.0 and v3.5, the runtime version is still v2.0..... In order to enable .NET Framework version 2.0 runtime activation policy, which is to load all assemblies.. by using the latest
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):51200
      Entropy (8bit):5.0659062068745335
      Encrypted:false
      SSDEEP:768:9aob1Yt6/ibkVewbBUwBWnC0ee76rUYxv:/v/PlJWC9drUYxv
      MD5:2CF9FE3247BB25DAF0AADDEFD6D40763
      SHA1:DC9B4F8E2BB6E202500061E0E03DDDB102E42F26
      SHA-256:DD24F8EF3EF4B6BC58B08ADE93E4AAC64856EE681909201B42CB0111A45FE9E6
      SHA-512:4AF9A34082DD04179A080918C88FFFD2DDBC1D7E34779C50F8B9A2EEC9CFB65F2DE3EA016FA0843DE97DFEA5B0CA7E86F07EC0D7D1358DF6A3BCCB54C806A11C
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...}..d.........." ..0.............2.... ........... ....................... ............@.....................................O.......d............................................................................ ............... ..H............text...8.... ...................... ..`.rsrc...d...........................@..@.reloc..............................@..B........................H.......<T..l............................................................0...........-.r...ps....z...u....,...+_.u0...,...+S.u1...-(.u2...- .u3...-..u4...-..u5...-..u6...,...+..u....,...+..u7...-..u8...,.......(....*.0..]........-.r...ps....z..(......sv......ox.....-...ou....o.....$..ou.....o.......,..o......,..o......*.........%."G..........4Q.......0..K........-.r...ps....z.sv......ow.....-....%..ou.....o........,..o......,..o......*..........5..........*?......&...(....*..
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):184240
      Entropy (8bit):5.876033362692288
      Encrypted:false
      SSDEEP:3072:BGfZS7hUuK3PcbFeRRLxyR69UgoCaf8+aCnfKlRUjW01KymkO:9zMRLkR6joxfRPW
      MD5:1A5CAEA6734FDD07CAA514C3F3FB75DA
      SHA1:F070AC0D91BD337D7952ABD1DDF19A737B94510C
      SHA-256:CF06D4ED4A8BAF88C82D6C9AE0EFC81C469DE6DA8788AB35F373B350A4B4CDCA
      SHA-512:A22DD3B7CF1C2EDCF5B540F3DAA482268D8038D468B8F00CA623D1C254AFFBBC1446E5BD42ADC3D8E274BE3BA776B0034E179FACCD9AC8612CCD75186D1E3BF1
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....o.].........." ..0...... ......z.... ........... ....................................@.................................(...O................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):1493
      Entropy (8bit):4.732294656481805
      Encrypted:false
      SSDEEP:24:2dhmhx0PY6Iee7LfKhT06XWslTh17jJB7ZtG9jDqRp:c0nd5t7q7WsFD7tztG96n
      MD5:01C01D040563A55E0FD31CC8DAA5F155
      SHA1:3C1C229703198F9772D7721357F1B90281917842
      SHA-256:33D947C04A10E3AFF3DCA3B779393FA56CE5F02251C8CBAE5076A125FDEA081F
      SHA-512:9C3F0CC17868479575090E1949E31A688B8C1CDFA56AC4A08CBE661466BB40ECFC94EA512DC4B64D5FF14A563F96F1E71C03B6EEACC42992455BD4F1C91F17D5
      Malicious:false
      Reputation:low
      Preview:<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.... .. Use supportedRuntime tags to explicitly specify the version(s) of the .NET Framework runtime that.. the custom action should run on. If no versions are specified, the chosen version of the runtime.. will be the "best" match to what Microsoft.Deployment.WindowsInstaller.dll was built against..... WARNING: leaving the version unspecified is dangerous as it introduces a risk of compatibility.. problems with future versions of the .NET Framework runtime. It is highly recommended that you specify.. only the version(s) of the .NET Framework runtime that you have tested against..... Note for .NET Framework v3.0 and v3.5, the runtime version is still v2.0..... In order to enable .NET Framework version 2.0 runtime activation policy, which is to load all assemblies.. by using the latest
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):51200
      Entropy (8bit):5.0659062068745335
      Encrypted:false
      SSDEEP:768:9aob1Yt6/ibkVewbBUwBWnC0ee76rUYxv:/v/PlJWC9drUYxv
      MD5:2CF9FE3247BB25DAF0AADDEFD6D40763
      SHA1:DC9B4F8E2BB6E202500061E0E03DDDB102E42F26
      SHA-256:DD24F8EF3EF4B6BC58B08ADE93E4AAC64856EE681909201B42CB0111A45FE9E6
      SHA-512:4AF9A34082DD04179A080918C88FFFD2DDBC1D7E34779C50F8B9A2EEC9CFB65F2DE3EA016FA0843DE97DFEA5B0CA7E86F07EC0D7D1358DF6A3BCCB54C806A11C
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...}..d.........." ..0.............2.... ........... ....................... ............@.....................................O.......d............................................................................ ............... ..H............text...8.... ...................... ..`.rsrc...d...........................@..@.reloc..............................@..B........................H.......<T..l............................................................0...........-.r...ps....z...u....,...+_.u0...,...+S.u1...-(.u2...- .u3...-..u4...-..u5...-..u6...,...+..u....,...+..u7...-..u8...,.......(....*.0..]........-.r...ps....z..(......sv......ox.....-...ou....o.....$..ou.....o.......,..o......,..o......*.........%."G..........4Q.......0..K........-.r...ps....z.sv......ow.....-....%..ou.....o........,..o......,..o......*..........5..........*?......&...(....*..
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):184240
      Entropy (8bit):5.876033362692288
      Encrypted:false
      SSDEEP:3072:BGfZS7hUuK3PcbFeRRLxyR69UgoCaf8+aCnfKlRUjW01KymkO:9zMRLkR6joxfRPW
      MD5:1A5CAEA6734FDD07CAA514C3F3FB75DA
      SHA1:F070AC0D91BD337D7952ABD1DDF19A737B94510C
      SHA-256:CF06D4ED4A8BAF88C82D6C9AE0EFC81C469DE6DA8788AB35F373B350A4B4CDCA
      SHA-512:A22DD3B7CF1C2EDCF5B540F3DAA482268D8038D468B8F00CA623D1C254AFFBBC1446E5BD42ADC3D8E274BE3BA776B0034E179FACCD9AC8612CCD75186D1E3BF1
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....o.].........." ..0...... ......z.... ........... ....................................@.................................(...O................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):1493
      Entropy (8bit):4.732294656481805
      Encrypted:false
      SSDEEP:24:2dhmhx0PY6Iee7LfKhT06XWslTh17jJB7ZtG9jDqRp:c0nd5t7q7WsFD7tztG96n
      MD5:01C01D040563A55E0FD31CC8DAA5F155
      SHA1:3C1C229703198F9772D7721357F1B90281917842
      SHA-256:33D947C04A10E3AFF3DCA3B779393FA56CE5F02251C8CBAE5076A125FDEA081F
      SHA-512:9C3F0CC17868479575090E1949E31A688B8C1CDFA56AC4A08CBE661466BB40ECFC94EA512DC4B64D5FF14A563F96F1E71C03B6EEACC42992455BD4F1C91F17D5
      Malicious:false
      Reputation:low
      Preview:<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.... .. Use supportedRuntime tags to explicitly specify the version(s) of the .NET Framework runtime that.. the custom action should run on. If no versions are specified, the chosen version of the runtime.. will be the "best" match to what Microsoft.Deployment.WindowsInstaller.dll was built against..... WARNING: leaving the version unspecified is dangerous as it introduces a risk of compatibility.. problems with future versions of the .NET Framework runtime. It is highly recommended that you specify.. only the version(s) of the .NET Framework runtime that you have tested against..... Note for .NET Framework v3.0 and v3.5, the runtime version is still v2.0..... In order to enable .NET Framework version 2.0 runtime activation policy, which is to load all assemblies.. by using the latest
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):51200
      Entropy (8bit):5.0659062068745335
      Encrypted:false
      SSDEEP:768:9aob1Yt6/ibkVewbBUwBWnC0ee76rUYxv:/v/PlJWC9drUYxv
      MD5:2CF9FE3247BB25DAF0AADDEFD6D40763
      SHA1:DC9B4F8E2BB6E202500061E0E03DDDB102E42F26
      SHA-256:DD24F8EF3EF4B6BC58B08ADE93E4AAC64856EE681909201B42CB0111A45FE9E6
      SHA-512:4AF9A34082DD04179A080918C88FFFD2DDBC1D7E34779C50F8B9A2EEC9CFB65F2DE3EA016FA0843DE97DFEA5B0CA7E86F07EC0D7D1358DF6A3BCCB54C806A11C
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...}..d.........." ..0.............2.... ........... ....................... ............@.....................................O.......d............................................................................ ............... ..H............text...8.... ...................... ..`.rsrc...d...........................@..@.reloc..............................@..B........................H.......<T..l............................................................0...........-.r...ps....z...u....,...+_.u0...,...+S.u1...-(.u2...- .u3...-..u4...-..u5...-..u6...,...+..u....,...+..u7...-..u8...,.......(....*.0..]........-.r...ps....z..(......sv......ox.....-...ou....o.....$..ou.....o.......,..o......,..o......*.........%."G..........4Q.......0..K........-.r...ps....z.sv......ow.....-....%..ou.....o........,..o......,..o......*..........5..........*?......&...(....*..
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):184240
      Entropy (8bit):5.876033362692288
      Encrypted:false
      SSDEEP:3072:BGfZS7hUuK3PcbFeRRLxyR69UgoCaf8+aCnfKlRUjW01KymkO:9zMRLkR6joxfRPW
      MD5:1A5CAEA6734FDD07CAA514C3F3FB75DA
      SHA1:F070AC0D91BD337D7952ABD1DDF19A737B94510C
      SHA-256:CF06D4ED4A8BAF88C82D6C9AE0EFC81C469DE6DA8788AB35F373B350A4B4CDCA
      SHA-512:A22DD3B7CF1C2EDCF5B540F3DAA482268D8038D468B8F00CA623D1C254AFFBBC1446E5BD42ADC3D8E274BE3BA776B0034E179FACCD9AC8612CCD75186D1E3BF1
      Malicious:false
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....o.].........." ..0...... ......z.... ........... ....................................@.................................(...O................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):1493
      Entropy (8bit):4.732294656481805
      Encrypted:false
      SSDEEP:24:2dhmhx0PY6Iee7LfKhT06XWwlTh17jJBDZtG9jDqRp:c0nd5t7q7WwFD7t3tG96n
      MD5:3A35350940B2FA2C5A9C57BDB25AAE3F
      SHA1:F4D32D9E007478C80C23F7B70245D6401550CE6A
      SHA-256:361F2F5623B1E11403827FFD625C9EDC5D7977D584393D6475FC5E6559C3EDB7
      SHA-512:62756D9247CD6EAD152F00D5FF7627E3158E5F0BEAE00520510830EEB9B1FF5B3A33201BC81240BD31F066198C6B639E3F2CBCEB9155C2CE994900AB3A685E8B
      Malicious:false
      Reputation:low
      Preview:<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.... .. Use supportedRuntime tags to explicitly specify the version(s) of the .NET Framework runtime that.. the custom action should run on. If no versions are specified, the chosen version of the runtime.. will be the "best" match to what Microsoft.Deployment.WindowsInstaller.dll was built against..... WARNING: leaving the version unspecified is dangerous as it introduces a risk of compatibility.. problems with future versions of the .NET Framework runtime. It is highly recommended that you specify.. only the version(s) of the .NET Framework runtime that you have tested against..... Note for .NET Framework v3.0 and v3.5, the runtime version is still v2.0..... In order to enable .NET Framework version 2.0 runtime activation policy, which is to load all assemblies .. by using the lates
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):36352
      Entropy (8bit):4.813800140264642
      Encrypted:false
      SSDEEP:384:v2b9NQxWU/kFDMgVzC2Yejxt2GlKyMmfSFtr5AEmHk4gQLnHMdbR:v2mHkDM32Bj2+KyWrB4gQzMd1
      MD5:2B54558C365370886723974967A60B45
      SHA1:FAF9BF7AC38BF35701DB8BD14321BA5E97A0103F
      SHA-256:A7C459CA67D6388EB3C8D16A210E1DC73F6ABFFBB8A78BCF071C22F809942AFA
      SHA-512:A47E0589FE690D45EEBDD540033FB1C0BEF88DBB6A9ED6FDDA0B989DEF4EBE5683A387CA2F72819727BA5BA372368BC35F76FC6BB32EF860F298FC13525BAB84
      Malicious:false
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....68e.........." ..0.................. ........... ....................................@....................................O.......d............................................................................ ............... ..H............text...$.... ...................... ..`.rsrc...d...........................@..@.reloc..............................@..B........................H.......,>..he...........................................................0..0.........(......o......(....-........,..o.......&...*.*....................')......Z(.......(....+.......*..{....*"..}....*..{....*.0..........(......~....(....-..*....0..........~.....r...pr...p~....(....o......,..~....(....,;(.....r...pr...p..r...p(....(....r...pr...p~....(....o.......&...,..o....*r...p*........gm.......0..0.......~.....r...pr...p~....(....o.......&...,..*~....*.........".......0..
      Process:C:\Windows\SysWOW64\rundll32.exe
      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):184240
      Entropy (8bit):5.876033362692288
      Encrypted:false
      SSDEEP:3072:BGfZS7hUuK3PcbFeRRLxyR69UgoCaf8+aCnfKlRUjW01KymkO:9zMRLkR6joxfRPW
      MD5:1A5CAEA6734FDD07CAA514C3F3FB75DA
      SHA1:F070AC0D91BD337D7952ABD1DDF19A737B94510C
      SHA-256:CF06D4ED4A8BAF88C82D6C9AE0EFC81C469DE6DA8788AB35F373B350A4B4CDCA
      SHA-512:A22DD3B7CF1C2EDCF5B540F3DAA482268D8038D468B8F00CA623D1C254AFFBBC1446E5BD42ADC3D8E274BE3BA776B0034E179FACCD9AC8612CCD75186D1E3BF1
      Malicious:false
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....o.].........." ..0...... ......z.... ........... ....................................@.................................(...O................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):38725
      Entropy (8bit):5.235651478632947
      Encrypted:false
      SSDEEP:96:OEy/UlDt7vDvv0cjmxUPCNw2ZFZkvbbDTQQR54iPjvYvIwT5lwTJ1DvkfdBOqO6c:EYxeEuxAzKig8GXTvrnAVXR
      MD5:46EDB585C3A602BE8488B79889915DB1
      SHA1:8D15BD9D34D4753C2F5E7783C881D95AB6795212
      SHA-256:7DC4DFE6FB281F0530F749D2FFFB16550ABABAFFE0077B24AC24A161C174139D
      SHA-512:C36832974C6E69C25D51A349BE1A7EE68F846C21CA776B639A997DA9403E05D9ECBFC1B434BA3403B4392AA58DC5E7EE2419214F9166914A40799FE6CCD4189E
      Malicious:false
      Reputation:low
      Preview:06/25/24 12:48:56: DXSetup: CommandLine: /silent..06/25/24 12:48:56: DSETUP: DirectXSetupA(): hWnd: 00000000 dwFlags: 02010098........06/25/24 12:48:56: dsetup32: === SetupForDirectX() start ===..06/25/24 12:48:56: dsetup32: Mar 30 2011 04:38:03..06/25/24 12:48:56: dsetup32: DXSetupCommand = 0...06/25/24 12:48:56: dsetup32: Installing on Windows 6.2.9200..06/25/24 12:48:56: dsetup32: DirectXSetupIsJapanese == 0..06/25/24 12:48:56: dsetup32: DirectXSetupIsJapanNec == 0..06/25/24 12:49:11: dsetup32: IsIA64(): not IA64...06/25/24 12:49:11: dsetup32: CLR version number = 2.0.50727....06/25/24 12:49:11: dsetup32: CLR version number = 4.0.30319....06/25/24 12:49:12: dsetup32: DXCheckTrust(): C:\PROGRA~2\EPICGA~1\DIRECT~1\dxupdate.cab is trusted...06/25/24 12:49:12: dsetup32: GetCDXUpdate(): Extracting dxupdate.dll from C:\PROGRA~2\EPICGA~1\DIRECT~1\dxupdate.cab...06/25/24 12:49:12: dsetup32: Extracted file C:\Users\user\AppData\Local\Temp\DX4270.tmp\dxupdate.dll from cab..06/25/24 12:49:12
      Process:C:\Windows\System32\msiexec.exe
      File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
      Category:dropped
      Size (bytes):364484
      Entropy (8bit):5.365504878598876
      Encrypted:false
      SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26KgauM:zTtbmkExhMJCIpEz
      MD5:F96DDBE89CD459BB8BB75AF444373FCF
      SHA1:D3BFEC9C32FAB874FBC934601AE22BBF9BC42E51
      SHA-256:0E188B4871A31795C041073983B1BDC47A142ABFA5789AE1E731FB4C376FD065
      SHA-512:74783A80294E5EC13CAF788E4FAC51B538971FFE35022A6559537C0BB49807FD65F9607A389C0C3CC87BC29AA51269FEED4FBCE25F01DD6DE7CE136464E7B5FA
      Malicious:false
      Reputation:low
      Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):2106216
      Entropy (8bit):6.4563314852745375
      Encrypted:false
      SSDEEP:49152:DpX9JVeE9HP6Zpy9KyhMI50Du8LljslNsHSHFUq9OiapbbO5Akb:H3P9HP6Zpy9KyhMI50Du8LljslNsyHiS
      MD5:1C9B45E87528B8BB8CFA884EA0099A85
      SHA1:98BE17E1D324790A5B206E1EA1CC4E64FBE21240
      SHA-256:2F23182EC6F4889397AC4BF03D62536136C5BDBA825C7D2C4EF08C827F3A8A1C
      SHA-512:B76D780810E8617B80331B4AD56E9C753652AF2E55B66795F7A7D67D6AFCEC5EF00D120D9B2C64126309076D8169239A721AE8B34784B639B3A3E2BF50D6EE34
      Malicious:false
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......\.h...;...;...;..];...;...;...;.._;...;..h;0..;..i;'..;..X;...;..l;D..;?M.;...;..Y;...;..^;...;Rich...;........PE..L...92.K...........!.........d...............................................p .....O. ...@.........................@.......@...P..................... .h............................................i..@............................................text...S........................... ..`.data....~.......B..................@....rsrc................(..............@..@.reloc..D............,..............@..B................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):81768
      Entropy (8bit):6.4167890753768395
      Encrypted:false
      SSDEEP:1536:TVeqvNS6T6jxeEsU6b0xZtDDVb9X8u9JA7zitdrz/R8cy/FaeBD:TVeqvNOeFgxZ9DVVtRBy/EeD
      MD5:77F595DEE5FFACEA72B135B1FCE1312E
      SHA1:D2A710B332DE3EF7A576E0AED27B0AE66892B7E9
      SHA-256:8D540D484EA41E374FD0107D55D253F87DED4CE780D515D8FD59BBE8C98970A7
      SHA-512:A8683050D7758C248052C11AC6A46C9A0B3B3773902CCA478C1961B6D9D2D57C75A8C925BA5AF4499989C0F44B34EAF57ABAFAFA26506C31E5E4769FB3439746
      Malicious:false
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........M..i#Y.i#Y.i#Y.i"Y.i#Y.f~Y.i#Y.f,Y.i#Y.f|Y.i#Y.f.Y.i#Y.fCY.i#Y.f}Y.i#Y.fyY.i#YRich.i#Y........................PE..L...5S.F...........!.........F....................@..........................`..................................................d....0..................h%...@..8....................................&..@...............\............................text...j........................... ..`.data....+..........................@....rsrc........0......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):470880
      Entropy (8bit):6.715347536118646
      Encrypted:false
      SSDEEP:12288:cFUDOgwNvArf8r3bK9s3kW3CG3vQ3sad/QNbubxu:5DOgw6fYbK9s3kW3CG3vQ3snputu
      MD5:20C835843FCEC4DEDFCD7BFFA3B91641
      SHA1:5DD1D5B42A0B58D708D112694394A9A23691C283
      SHA-256:56FCD13650FD1F075743154E8C48465DD68A236AB8960667D75373139D2631BF
      SHA-512:561EB2BB3A7E562BAB0DE6372E824F65B310D96D840CDAA3C391969018AF6AFBA225665D07139FC938DCFF03F4F8DAE7F19DE61C9A0EAE7C658A32800DC9D123
      Malicious:false
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......o..?+.nl+.nl+.nl+.ol..nl...l .nl...lk.nl...l$.nl...l*.nl...l{.nl.S.l*.nl...l*.nl...l*.nlRich+.nl........PE..L..../.K...........!.................9.......................................@...........@..........................v..%....k..x.......................`........0.....................................@............................................text....~.......................... ..`.data....].......V..................@....rsrc...............................@..@.reloc...9.......:..................@..B........................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):248672
      Entropy (8bit):6.540646534165038
      Encrypted:false
      SSDEEP:6144:8K0GaAtQlDJCSB4MvfIeDRI9Z7IJItblSwJ7FnH4fa1wlMjb5:eGjQlDkSB4MvfIeDRI9Z7IJIRlfJ7N4w
      MD5:8E0BB968FF41D80E5F2C747C04DB79AE
      SHA1:69B332D78020177A9B3F60CB672EC47578003C0D
      SHA-256:492E960CB3CCFC8C25FC83F7C464BA77C86A20411347A1A9B3E5D3E8C9180A8D
      SHA-512:7D71CB5411F239696E77FE57A272C675FE15D32456CE7BEFB0C2CF3FC567DCE5D38A45F4B004577E3DEC283904F42AE17A290105D8AB8EF6B70BAD4E15C9D506
      Malicious:false
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......t.c.0..Z0..Z0..Z.Z9..Z0..Z...Z.Z9..Z.Zp..Z.Z1..Z.Z...Z.6sZ1..Z.Z1..Z.Z1..ZRich0..Z........PE..L....1.K...........!.....6...|......F........P............................................@..........................<..E...T5..d.......................`.......`...................................`...@...............P............................text...%4.......6.................. ..`.data....S...P...R...:..............@....rsrc...............................@..@.reloc...".......$..................@..B........................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):1868128
      Entropy (8bit):6.25014757191993
      Encrypted:false
      SSDEEP:24576:/j0ZXvi+of1/z+uQ5Da3Qx1fF4dEQMtqVC43ux:/A9i/f1/z+Zce4dpMATe
      MD5:83EBA442F07AAB8D6375D2EEC945C46C
      SHA1:C29C20DA6BB30BE7D9DDA40241CA48F069123BD9
      SHA-256:B46A44B6FCE8F141C9E02798645DB2EE0DA5C69EA71195E29F83A91A355FA2CA
      SHA-512:288906C8AA8EB4D62440FE84DEAA25E7F362DC3644DAFC1227E45A71F6D915ACF885314531DB4757A9BF2E6CB12EAF43B54E9FF0F6A7E3239CABB697B07C25EA
      Malicious:false
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........$...E...E...E....$..E...E..]E....&..E.......E....!..E.......E......E.... ..E....'..E..Rich.E..........................PE..L....1.K...........!.........f......Mf....... ............................................@.........................0...X.......<....`...............j..`....p......P................................d..@............... ............................text............................... ..`.data....3... ...0..................@....rsrc........`.......8..............@..@.reloc...,...p.......<..............@..B........................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):2106216
      Entropy (8bit):6.4563314852745375
      Encrypted:false
      SSDEEP:49152:DpX9JVeE9HP6Zpy9KyhMI50Du8LljslNsHSHFUq9OiapbbO5Akb:H3P9HP6Zpy9KyhMI50Du8LljslNsyHiS
      MD5:1C9B45E87528B8BB8CFA884EA0099A85
      SHA1:98BE17E1D324790A5B206E1EA1CC4E64FBE21240
      SHA-256:2F23182EC6F4889397AC4BF03D62536136C5BDBA825C7D2C4EF08C827F3A8A1C
      SHA-512:B76D780810E8617B80331B4AD56E9C753652AF2E55B66795F7A7D67D6AFCEC5EF00D120D9B2C64126309076D8169239A721AE8B34784B639B3A3E2BF50D6EE34
      Malicious:false
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......\.h...;...;...;..];...;...;...;.._;...;..h;0..;..i;'..;..X;...;..l;D..;?M.;...;..Y;...;..^;...;Rich...;........PE..L...92.K...........!.........d...............................................p .....O. ...@.........................@.......@...P..................... .h............................................i..@............................................text...S........................... ..`.data....~.......B..................@....rsrc................(..............@..@.reloc..D............,..............@..B................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):1868128
      Entropy (8bit):6.25014757191993
      Encrypted:false
      SSDEEP:24576:/j0ZXvi+of1/z+uQ5Da3Qx1fF4dEQMtqVC43ux:/A9i/f1/z+Zce4dpMATe
      MD5:83EBA442F07AAB8D6375D2EEC945C46C
      SHA1:C29C20DA6BB30BE7D9DDA40241CA48F069123BD9
      SHA-256:B46A44B6FCE8F141C9E02798645DB2EE0DA5C69EA71195E29F83A91A355FA2CA
      SHA-512:288906C8AA8EB4D62440FE84DEAA25E7F362DC3644DAFC1227E45A71F6D915ACF885314531DB4757A9BF2E6CB12EAF43B54E9FF0F6A7E3239CABB697B07C25EA
      Malicious:false
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........$...E...E...E....$..E...E..]E....&..E.......E....!..E.......E......E.... ..E....'..E..Rich.E..........................PE..L....1.K...........!.........f......Mf....... ............................................@.........................0...X.......<....`...............j..`....p......P................................d..@............... ............................text............................... ..`.data....3... ...0..................@....rsrc........`.......8..............@..@.reloc...,...p.......<..............@..B........................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):470880
      Entropy (8bit):6.715347536118646
      Encrypted:false
      SSDEEP:12288:cFUDOgwNvArf8r3bK9s3kW3CG3vQ3sad/QNbubxu:5DOgw6fYbK9s3kW3CG3vQ3snputu
      MD5:20C835843FCEC4DEDFCD7BFFA3B91641
      SHA1:5DD1D5B42A0B58D708D112694394A9A23691C283
      SHA-256:56FCD13650FD1F075743154E8C48465DD68A236AB8960667D75373139D2631BF
      SHA-512:561EB2BB3A7E562BAB0DE6372E824F65B310D96D840CDAA3C391969018AF6AFBA225665D07139FC938DCFF03F4F8DAE7F19DE61C9A0EAE7C658A32800DC9D123
      Malicious:false
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......o..?+.nl+.nl+.nl+.ol..nl...l .nl...lk.nl...l$.nl...l*.nl...l{.nl.S.l*.nl...l*.nl...l*.nlRich+.nl........PE..L..../.K...........!.................9.......................................@...........@..........................v..%....k..x.......................`........0.....................................@............................................text....~.......................... ..`.data....].......V..................@....rsrc...............................@..@.reloc...9.......:..................@..B........................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):248672
      Entropy (8bit):6.540646534165038
      Encrypted:false
      SSDEEP:6144:8K0GaAtQlDJCSB4MvfIeDRI9Z7IJItblSwJ7FnH4fa1wlMjb5:eGjQlDkSB4MvfIeDRI9Z7IJIRlfJ7N4w
      MD5:8E0BB968FF41D80E5F2C747C04DB79AE
      SHA1:69B332D78020177A9B3F60CB672EC47578003C0D
      SHA-256:492E960CB3CCFC8C25FC83F7C464BA77C86A20411347A1A9B3E5D3E8C9180A8D
      SHA-512:7D71CB5411F239696E77FE57A272C675FE15D32456CE7BEFB0C2CF3FC567DCE5D38A45F4B004577E3DEC283904F42AE17A290105D8AB8EF6B70BAD4E15C9D506
      Malicious:false
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......t.c.0..Z0..Z0..Z.Z9..Z0..Z...Z.Z9..Z.Zp..Z.Z1..Z.Z...Z.6sZ1..Z.Z1..Z.Z1..ZRich0..Z........PE..L....1.K...........!.....6...|......F........P............................................@..........................<..E...T5..d.......................`.......`...................................`...@...............P............................text...%4.......6.................. ..`.data....S...P...R...:..............@....rsrc...............................@..@.reloc...".......$..................@..B........................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):81768
      Entropy (8bit):6.4167890753768395
      Encrypted:false
      SSDEEP:1536:TVeqvNS6T6jxeEsU6b0xZtDDVb9X8u9JA7zitdrz/R8cy/FaeBD:TVeqvNOeFgxZ9DVVtRBy/EeD
      MD5:77F595DEE5FFACEA72B135B1FCE1312E
      SHA1:D2A710B332DE3EF7A576E0AED27B0AE66892B7E9
      SHA-256:8D540D484EA41E374FD0107D55D253F87DED4CE780D515D8FD59BBE8C98970A7
      SHA-512:A8683050D7758C248052C11AC6A46C9A0B3B3773902CCA478C1961B6D9D2D57C75A8C925BA5AF4499989C0F44B34EAF57ABAFAFA26506C31E5E4769FB3439746
      Malicious:false
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........M..i#Y.i#Y.i#Y.i"Y.i#Y.f~Y.i#Y.f,Y.i#Y.f|Y.i#Y.f.Y.i#Y.fCY.i#Y.f}Y.i#Y.fyY.i#YRich.i#Y........................PE..L...5S.F...........!.........F....................@..........................`..................................................d....0..................h%...@..8....................................&..@...............\............................text...j........................... ..`.data....+..........................@....rsrc........0......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:Composite Document File V2 Document, Cannot read section info
      Category:dropped
      Size (bytes):49152
      Entropy (8bit):1.252076633257591
      Encrypted:false
      SSDEEP:96:k4+WTX8N/Zg5nf2JlDKXZs6gwgfJD9PHY:L+WbOgJf2rx4
      MD5:4140F04AC54E91E8728EE84FD600279A
      SHA1:15BB0401D4B2D6A0BB8C140B8F3C21EB74240CFB
      SHA-256:06FA236377602880601B6053679F6728F3A9E3129CC7A23F0768AB1425A8E951
      SHA-512:A8D4ACC08840B299874B1CAFFD94D4A6B74CEE51F6FE320E2F6E97120BF99D36B0FE686E309AED3CD725DC970D4DC01334966DBE40E99B6D35A550E725288CB0
      Malicious:false
      Reputation:low
      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\msiexec.exe
      File Type:data
      Category:dropped
      Size (bytes):512
      Entropy (8bit):0.0
      Encrypted:false
      SSDEEP:3::
      MD5:BF619EAC0CDF3F68D496EA9344137E8B
      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
      Malicious:false
      Reputation:low
      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      No static file info
      Skipped network analysis since the amount of network traffic is too extensive. Please download the PCAP and check manually.

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:12:45:23
      Start date:25/06/2024
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://epicgames-download1.akamaized.net/Builds/UnrealEngineLauncher/Installers/Win32/EpicInstaller-15.17.1.msi?launcherfilename=EpicInstaller-15.17.1-unrealEngine.msi" > cmdline.out 2>&1
      Imagebase:0x790000
      File size:236'544 bytes
      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:1
      Start time:12:45:23
      Start date:25/06/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:2
      Start time:12:45:23
      Start date:25/06/2024
      Path:C:\Windows\SysWOW64\wget.exe
      Wow64 process (32bit):true
      Commandline:wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://epicgames-download1.akamaized.net/Builds/UnrealEngineLauncher/Installers/Win32/EpicInstaller-15.17.1.msi?launcherfilename=EpicInstaller-15.17.1-unrealEngine.msi"
      Imagebase:0x400000
      File size:3'895'184 bytes
      MD5 hash:3DADB6E2ECE9C4B3E1E322E617658B60
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:8
      Start time:12:47:42
      Start date:25/06/2024
      Path:C:\Windows\System32\msiexec.exe
      Wow64 process (32bit):false
      Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\download\EpicInstaller-15.17.1-unrealEngine.msi"
      Imagebase:0x7ff6fb3c0000
      File size:69'632 bytes
      MD5 hash:E5DA170027542E25EDE42FC54C929077
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:9
      Start time:12:47:44
      Start date:25/06/2024
      Path:C:\Windows\System32\msiexec.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\msiexec.exe /V
      Imagebase:0x7ff6fb3c0000
      File size:69'632 bytes
      MD5 hash:E5DA170027542E25EDE42FC54C929077
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:10
      Start time:12:47:44
      Start date:25/06/2024
      Path:C:\Windows\SysWOW64\msiexec.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 58A23805EF6FEF63BB0D3241077B6055 C
      Imagebase:0x2d0000
      File size:59'904 bytes
      MD5 hash:9D09DC1EDA745A5F87553048E57620CF
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:11
      Start time:12:47:51
      Start date:25/06/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI7BA8.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5637875 5 CustomActionManaged!CustomActionManaged.CustomActions.ValidatePathLength
      Imagebase:0x680000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:12
      Start time:12:47:57
      Start date:25/06/2024
      Path:C:\Windows\SysWOW64\msiexec.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 3A9E928A23721413ED58A57A3ED0EE78
      Imagebase:0x2d0000
      File size:59'904 bytes
      MD5 hash:9D09DC1EDA745A5F87553048E57620CF
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:13
      Start time:12:47:57
      Start date:25/06/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Windows\Installer\MSI1EC1.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5644000 10 CustomActionManaged!CustomActionManaged.CustomActions.TelemetrySendStart
      Imagebase:0x680000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:14
      Start time:12:48:00
      Start date:25/06/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Windows\Installer\MSI2BC2.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5647328 16 CustomActionManaged!CustomActionManaged.CustomActions.SetStartupCmdlineArgs
      Imagebase:0x680000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:15
      Start time:12:48:02
      Start date:25/06/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Windows\Installer\MSI328B.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5649046 22 CustomActionManaged!CustomActionManaged.CustomActions.CheckReparsePoints
      Imagebase:0x680000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:16
      Start time:12:48:46
      Start date:25/06/2024
      Path:C:\Windows\SysWOW64\msiexec.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding ADCB3C50BD4A94372326895BA9237D2A E Global\MSI0000
      Imagebase:0x2d0000
      File size:59'904 bytes
      MD5 hash:9D09DC1EDA745A5F87553048E57620CF
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:17
      Start time:12:48:46
      Start date:25/06/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Windows\Installer\MSIE11B.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5693781 31 CustomActionManaged!CustomActionManaged.CustomActions.MoveChainerToFolder
      Imagebase:0x680000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:19
      Start time:12:48:56
      Start date:25/06/2024
      Path:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
      Wow64 process (32bit):true
      Commandline:"C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe" /silent
      Imagebase:0xe70000
      File size:517'976 bytes
      MD5 hash:BF3F290275C21BDD3951955C9C3CF32C
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Antivirus matches:
      • Detection: 0%, ReversingLabs
      Reputation:low
      Has exited:true

      Target ID:23
      Start time:12:49:11
      Start date:25/06/2024
      Path:C:\Windows\System32\SrTasks.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:1
      Imagebase:0x7ff690140000
      File size:59'392 bytes
      MD5 hash:2694D2D28C368B921686FE567BD319EB
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:24
      Start time:12:49:11
      Start date:25/06/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:26
      Start time:12:49:22
      Start date:25/06/2024
      Path:C:\Windows\SysWOW64\icacls.exe
      Wow64 process (32bit):true
      Commandline:"icacls.exe" "C:\Program Files (x86)\Epic Games\Launcher" /grant "BUILTIN\Users":(OI)(CI)F
      Imagebase:0xfb0000
      File size:29'696 bytes
      MD5 hash:2E49585E4E08565F52090B144062F97E
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:28
      Start time:12:49:22
      Start date:25/06/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:29
      Start time:12:49:24
      Start date:25/06/2024
      Path:C:\Windows\SysWOW64\icacls.exe
      Wow64 process (32bit):true
      Commandline:"icacls.exe" "C:\ProgramData\Epic" /grant "BUILTIN\Users":(OI)(CI)F
      Imagebase:0xfb0000
      File size:29'696 bytes
      MD5 hash:2E49585E4E08565F52090B144062F97E
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:30
      Start time:12:49:25
      Start date:25/06/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:31
      Start time:12:49:25
      Start date:25/06/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Windows\Installer\MSI7793.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5732234 50 CustomActionManaged!CustomActionManaged.CustomActions.TelemetrySendEnd
      Imagebase:0x680000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:32
      Start time:12:49:28
      Start date:25/06/2024
      Path:C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exe
      Wow64 process (32bit):true
      Commandline:"C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exe" 44 "C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\EpicOnlineServices.msi" "EOSPRODUCTID=EpicGamesLauncher" "C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\EpicGamesLauncher.exe" com.epicgames.launcher://unrealEngine
      Imagebase:0x7ff7e52b0000
      File size:24'016 bytes
      MD5 hash:4A3181A2E93579124799A9B81263768E
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:33
      Start time:12:49:31
      Start date:25/06/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Windows\Installer\MSI90CA.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5738687 59 CustomActionManaged!CustomActionManaged.CustomActions.SetLauncherEpicGamesDirLoc
      Imagebase:0x680000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:34
      Start time:12:49:33
      Start date:25/06/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Windows\Installer\MSI95CC.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5739984 65 CustomActionManaged!CustomActionManaged.CustomActions.SetLauncherInstallDirLoc
      Imagebase:0x680000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:35
      Start time:12:49:33
      Start date:25/06/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Windows\Installer\MSI988C.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5740671 71 CustomActionManaged!CustomActionManaged.CustomActions.SetServiceWrapperDirLoc
      Imagebase:0x680000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:36
      Start time:12:49:35
      Start date:25/06/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Windows\Installer\MSIA08C.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5742718 77 CustomActionManaged!CustomActionManaged.TelemetryActions.TelemetrySendStart
      Imagebase:0x680000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:37
      Start time:12:49:41
      Start date:25/06/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Windows\Installer\MSIB774.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5748578 99 CustomActionManaged!CustomActionManaged.CustomActions.RegisterProductID
      Imagebase:0x680000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Reset < >
        Strings
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: $]q$$]q
        • API String ID: 0-127220927
        • Opcode ID: 6bfca594e2f30f7539c1f9aea500117ae2354796468a5f0ed31f39958cfc791f
        • Instruction ID: 6992445c7a698b57ccabc1cacdcfff9b2cac8d0512b82f907f276d5c03ac443b
        • Opcode Fuzzy Hash: 6bfca594e2f30f7539c1f9aea500117ae2354796468a5f0ed31f39958cfc791f
        • Instruction Fuzzy Hash: 9151E031B102098FDB19DF78D8506AEBBF6EFC8350B14846AE808DB364DB309C12C7A1
        Strings
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: (aq$LR]q
        • API String ID: 0-67906209
        • Opcode ID: 6f60b681661415844004065ba11eb8d0b8779a16c29480fc38e058b124d0b130
        • Instruction ID: 629f836b9526d0361cee4ba997ef8488d8962cebd015bf3b28a2823a7e904bba
        • Opcode Fuzzy Hash: 6f60b681661415844004065ba11eb8d0b8779a16c29480fc38e058b124d0b130
        • Instruction Fuzzy Hash: 024104317142159FEB0A9F39AC6437F3AABEFC5304F0484A9E806D7295EE34EC4587A4
        Strings
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: (aq
        • API String ID: 0-600464949
        • Opcode ID: 45c4d6e4f056df21df753bbc2c8cd4bac439702b454c85fb30dd8503aba3bf04
        • Instruction ID: 3e17b2cf2af57351543f6d74a54b78ced1cea5582c82e590d3cf719624ae752b
        • Opcode Fuzzy Hash: 45c4d6e4f056df21df753bbc2c8cd4bac439702b454c85fb30dd8503aba3bf04
        • Instruction Fuzzy Hash: AE71B231B202149FDB059FB9C8546BEB7E7AFC8310F148029E906AB3A4DE75EC52C751
        Strings
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: LR]q
        • API String ID: 0-3081347316
        • Opcode ID: a98c2f12110e1a6d9d5f33b46b60cfba0bf1fb9ba10a5d74bdbcef4249e78de3
        • Instruction ID: dadc6218e00dd965a38c4445a2b52d883cb58a7212eb912ee2e66ad74a30d776
        • Opcode Fuzzy Hash: a98c2f12110e1a6d9d5f33b46b60cfba0bf1fb9ba10a5d74bdbcef4249e78de3
        • Instruction Fuzzy Hash: 3C41F532B202159BDF15DE78DC547BF77EAEF88214F048069D806C7294EE74ED4687A0
        Strings
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: (aq
        • API String ID: 0-600464949
        • Opcode ID: 46e725bc6d27572e99ca6d734b5d9dc19be9237cc9c11ebdb749e4a4a93a3fc1
        • Instruction ID: f1bcb22e0dbd995ca17705f90800b3c6cfc5dea4ddef65a47114b24555551b84
        • Opcode Fuzzy Hash: 46e725bc6d27572e99ca6d734b5d9dc19be9237cc9c11ebdb749e4a4a93a3fc1
        • Instruction Fuzzy Hash: 56510431714244AFEB069B78D4287BE7FB2EF89314F14846AD406E7385CE746C45C791
        Strings
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: (aq
        • API String ID: 0-600464949
        • Opcode ID: b4027e9ec9472e6bb6280d893e09d247e83c12f493aa3d9ebb2261fb6836ce7e
        • Instruction ID: 7b8fd77b4e74c85a5a26804b66b922d6768aaf0296c87990f74797676cc3f51c
        • Opcode Fuzzy Hash: b4027e9ec9472e6bb6280d893e09d247e83c12f493aa3d9ebb2261fb6836ce7e
        • Instruction Fuzzy Hash: 1C41F135B14200AFEB0ADB34E4687AE7BB7EF89314F14846AE405D7291DE74AC46C761
        Strings
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: LR]q
        • API String ID: 0-3081347316
        • Opcode ID: cd5c8e4a1c0fbf366655667d7cb80c7dde4cd4b87ee01d9ba24afa904d33b6c1
        • Instruction ID: 21a203cc32adcc0f832982830a721924233e76339a3e91421199f5793e330a80
        • Opcode Fuzzy Hash: cd5c8e4a1c0fbf366655667d7cb80c7dde4cd4b87ee01d9ba24afa904d33b6c1
        • Instruction Fuzzy Hash: D62181717102169FEB099E38AC5477F77AAEF84208F1444ADE51AC7295EE34ED0187A1
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 86fd9f855c03d7db71a09ae96c92075255db48ffb902367ff8b684d59c36305b
        • Instruction ID: c99815e1f044f9d6e41cbc1d220d4578c321449fbc18848b865586ff74082704
        • Opcode Fuzzy Hash: 86fd9f855c03d7db71a09ae96c92075255db48ffb902367ff8b684d59c36305b
        • Instruction Fuzzy Hash: 2DF08C2532D7955FFB221A7808603E66FE94F8B618F0904EAD482CB292D5C4F84683B2
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: d3486d817c295af9706ecee489688c73bb7c8f88f452166ed321d2de6bdffaaf
        • Instruction ID: 01374619b5c2f1c16d6b1f20adbce62510b669610ccde9cd342c39bb58fc1e14
        • Opcode Fuzzy Hash: d3486d817c295af9706ecee489688c73bb7c8f88f452166ed321d2de6bdffaaf
        • Instruction Fuzzy Hash: 6A712135B21212CFDB11CF78D45496ABBB5FF48314F1480E9E815CB2A2DB31E802CBA1
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 3aae56e303ec1ba49c7ebe7ee482279f39134d55d0f5139bd7466119e17b547a
        • Instruction ID: 45e319d19e15a601ca98bda9dad472e1d761ce96dc414dacd6aa2a104a4efaa3
        • Opcode Fuzzy Hash: 3aae56e303ec1ba49c7ebe7ee482279f39134d55d0f5139bd7466119e17b547a
        • Instruction Fuzzy Hash: 284129367143449FEB1A9F39A49862E7BA7EFC5324F0588AAD546CB242DD74FC02C361
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 09ccde1ae9fedd50dba68427073d36ec0d84be01c69e35c2ec51adea5a112322
        • Instruction ID: dbe9e62127c555530967a482dbbefdb11c5ad0d6c0cfb6ba0ee9a4043f22789d
        • Opcode Fuzzy Hash: 09ccde1ae9fedd50dba68427073d36ec0d84be01c69e35c2ec51adea5a112322
        • Instruction Fuzzy Hash: CE312A31710205AFEB05DB74E8257EA7BB6EF88314F114065E405D76D1DE35AC85C7A0
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 025beed0ebbb5496ecf472e0a5552a411048b95a37da306f59bde521d733e6e4
        • Instruction ID: 210bd01160a729d1586085bb2f9cbaa345dc2a9eae56118945566da99120c236
        • Opcode Fuzzy Hash: 025beed0ebbb5496ecf472e0a5552a411048b95a37da306f59bde521d733e6e4
        • Instruction Fuzzy Hash: 8E41FC35B11114DFCB54DF68D88099EBBB6FF88714B14816AE905EB360DB31EC42CBA1
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 2398518583d340bd8ddd8735225e6f3ce7b86e1233263c75345524c990ed8f46
        • Instruction ID: 6312d004b09ee1db803f452bef3f5d023f6736326a524b99503ba0575c10b027
        • Opcode Fuzzy Hash: 2398518583d340bd8ddd8735225e6f3ce7b86e1233263c75345524c990ed8f46
        • Instruction Fuzzy Hash: 8C212733B2021097EF019E79D8546BEBBEAEF88240F04403AD906D7681EE74EE568791
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 117fe5b38428ac0019a4b720c460c94f1e63757e432b5733b929edc13953b716
        • Instruction ID: 83bf744df46e754b757cb73ec40247cd4c0ed42038a5108835345b130da56e58
        • Opcode Fuzzy Hash: 117fe5b38428ac0019a4b720c460c94f1e63757e432b5733b929edc13953b716
        • Instruction Fuzzy Hash: 54216F35B10205AFDB09DF68E855AA97BB6EF8C314F148425E409E7390DE75AC86CB50
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 457e2415df32f63368934f4b9ca801a0e221748f66a5c9ca20bb42ccc350bf94
        • Instruction ID: 298d179b146ca816730a8abd763649706d11ee0d6503d26ca4f5989bc72ea9d8
        • Opcode Fuzzy Hash: 457e2415df32f63368934f4b9ca801a0e221748f66a5c9ca20bb42ccc350bf94
        • Instruction Fuzzy Hash: C01108357393955FFF162A7458643BE2BDACF86214F0444EAC541DB282DC94EC4683B1
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 3e1ce005fa9185fa7d335e142ffd95efe80536fc68606ed83850e054ef778f83
        • Instruction ID: cd59301b08b0cfc5e702f60b86dc55b5b74b0e146582fdc534372e095287908f
        • Opcode Fuzzy Hash: 3e1ce005fa9185fa7d335e142ffd95efe80536fc68606ed83850e054ef778f83
        • Instruction Fuzzy Hash: EB21EA75B102149FDB44DF78D48499EBBB6FF4C714F10816AE905EB360EB31A941CBA1
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 2f5286e828691f8974c93d06a6f3b3b3a46fede8a40015cdfdff513dce0ce7df
        • Instruction ID: 5d50baa155d29be2bd1f633f5286dbaff4a0203c3a6932de46c11744b8f02ff7
        • Opcode Fuzzy Hash: 2f5286e828691f8974c93d06a6f3b3b3a46fede8a40015cdfdff513dce0ce7df
        • Instruction Fuzzy Hash: D0114F31B10205AFDB09DF68D855AAE7BB6EF8C314F148029E409A7794DE75AC85CBA0
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 63e9fd5d2ac7bd32adc016c8ab3057b281cb12ddc4428986d6409793873169e3
        • Instruction ID: 0c7f13459c7b67e9f3ff33d54ace6b51d9c4cec55297781d94fc0d187abbe89f
        • Opcode Fuzzy Hash: 63e9fd5d2ac7bd32adc016c8ab3057b281cb12ddc4428986d6409793873169e3
        • Instruction Fuzzy Hash: 21116D32700214BFDB05DF68E45DAA9BFB6EF8C320F144029E40AA7250CF79AD85CB91
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a6593c5944f4cf0a91dd049e8b29de3d386a8971f4367f4bc2c96da0107c85d3
        • Instruction ID: 3d3ee2185a177e5cf4d1777fa94bd2c6b44393ad4cf043572ffcd66335c85106
        • Opcode Fuzzy Hash: a6593c5944f4cf0a91dd049e8b29de3d386a8971f4367f4bc2c96da0107c85d3
        • Instruction Fuzzy Hash: 232127B0D042498EDB10DFAAC440AEEFBF4FF88314F20842ED559A7240C7746945CFA1
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 69699ef26ed57598ab963ed2ba0cf4c3dd1b82555cbf838b24f2a09a761e7b63
        • Instruction ID: de111b811bf1ca2dd942bd2eb6445ee194680b6f09574592273b432e4d1e6155
        • Opcode Fuzzy Hash: 69699ef26ed57598ab963ed2ba0cf4c3dd1b82555cbf838b24f2a09a761e7b63
        • Instruction Fuzzy Hash: D91117B4D042498FDB10DFAAC480AEEFBF4FF48314F108419D51967240CB78A945CFA1
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a194f2f6a0784ab81388a0196ccbd1327bba532fb8ae39a2c6e73f508b118a23
        • Instruction ID: 7e0e8ce24eaf59ca3581849225171d2bc054127f8ba951c32e7c4038d9b3b4c8
        • Opcode Fuzzy Hash: a194f2f6a0784ab81388a0196ccbd1327bba532fb8ae39a2c6e73f508b118a23
        • Instruction Fuzzy Hash: AE110D36700115BFCB49DF68E45DAA97BB6EF8C321F144029E40AA7390CF796C85CBA0
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: d0cc362f18f6cc7e8b3b89663f368a9c12ac81160c95e1a44f05fdfda2447084
        • Instruction ID: d6a3b259b0ca6905fe9780661b2092ab1dc8da0ef2d1a10d11c532e535e8187c
        • Opcode Fuzzy Hash: d0cc362f18f6cc7e8b3b89663f368a9c12ac81160c95e1a44f05fdfda2447084
        • Instruction Fuzzy Hash: F401B53071A3456FC70A5F3C79391267FEADECA20870909AAD549CB1A2ED189C54C392
        Memory Dump Source
        • Source File: 0000000B.00000002.3474290992.00000000027AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027AD000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_2_27ad000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 6034238c3df1196a198b5b0f7cc8fa7326f4903cd8ac267aca007b0330b57834
        • Instruction ID: 2add285a6b5d63a8bf9de01335989d47c58f70a3916a4e251b2225d66620b6ef
        • Opcode Fuzzy Hash: 6034238c3df1196a198b5b0f7cc8fa7326f4903cd8ac267aca007b0330b57834
        • Instruction Fuzzy Hash: 23012B701043409ED7308E25CD84B67BF9CEFC5334F18C62AED481B646C3799801CAB1
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: d772b6f32c9b54a267174a1159fab50204af7c5023672423ae26fabcfd1df98f
        • Instruction ID: 6366ab7b156333967dec746ece790c051f5e88e2452b4ae0ceda13f9c18065ca
        • Opcode Fuzzy Hash: d772b6f32c9b54a267174a1159fab50204af7c5023672423ae26fabcfd1df98f
        • Instruction Fuzzy Hash: CD018F71B2420597FB09AE68D1553BFBAEBABC8308F25443DD502E3790CE752C01DBA1
        Memory Dump Source
        • Source File: 0000000B.00000002.3474290992.00000000027AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027AD000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_2_27ad000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: ad9f81b567f9ffa2309a6e820596249a5951279ae75fca7a1bcc8f75526c77d3
        • Instruction ID: 097f963dac51feee9daa6eeb707f679ce2f501c15c81a475a425f6e403df92b2
        • Opcode Fuzzy Hash: ad9f81b567f9ffa2309a6e820596249a5951279ae75fca7a1bcc8f75526c77d3
        • Instruction Fuzzy Hash: 0D01527100D3C09ED7128B258894766BFB4EF57224F1D81DBD9888F1A3C2695849C772
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 9da4a175f76d7d2d50bd11ac1ad127b1b9c66be167329b410bfbcad036d08fe6
        • Instruction ID: da03b056bb1a46b8421fd40e69399a5d2fa8f154d5c7039778dde42ce4a3cc59
        • Opcode Fuzzy Hash: 9da4a175f76d7d2d50bd11ac1ad127b1b9c66be167329b410bfbcad036d08fe6
        • Instruction Fuzzy Hash: 11F02477B2A394AFFB02237475283997F98DF02219F0208E7D645CB053E868AC4583A5
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 685276ebb0687ca13a82ec718acfa3c1858205d0ae838bfbad9bb93ac6ef8bc1
        • Instruction ID: c4ba4ec1b6f1892812f42d1836bcfd5a0cfd4373a826e7b3611c6b4fc8249146
        • Opcode Fuzzy Hash: 685276ebb0687ca13a82ec718acfa3c1858205d0ae838bfbad9bb93ac6ef8bc1
        • Instruction Fuzzy Hash: F1F0C2307192427EDB0E5F7C656D12A3F9AEEC9218304086EC545CB1D0ED289840C392
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 059d48212338feea508cba9eef7a40e1cd3c6896e209dc4ea07847ed7a1585fe
        • Instruction ID: 63b1f690e29981006c0a444dd9e3d1d7344bb2f11a18c2aac8ca3160c7867c6d
        • Opcode Fuzzy Hash: 059d48212338feea508cba9eef7a40e1cd3c6896e209dc4ea07847ed7a1585fe
        • Instruction Fuzzy Hash: 24E0C232750229EFF7152A95B408BFA7F9ADB413B0F108062FD0C99210CA755CA0D7F5
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 784477012c2b0e0eb06a70d8f6ae9a1b13d3aa4f1afa512ae66f121ca8a384fd
        • Instruction ID: 4f330c128adda70041f2b5d586089e3a389517344d3b03ee1010c2c72ab9ead5
        • Opcode Fuzzy Hash: 784477012c2b0e0eb06a70d8f6ae9a1b13d3aa4f1afa512ae66f121ca8a384fd
        • Instruction Fuzzy Hash: 78D02B773192808FDB074F30F4100993F76AB162107090053E441C76B5DE314911C751
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: f37469963a355d59974ba2f9d5318814fc3d4d5c1e77cf861773bbf214464901
        • Instruction ID: 3b172da223856e9b957dc82806e03cce77a7df120ec5820bf706c5120602eb22
        • Opcode Fuzzy Hash: f37469963a355d59974ba2f9d5318814fc3d4d5c1e77cf861773bbf214464901
        • Instruction Fuzzy Hash: 92D0A7323310286B66056A58E84597A7BADEB943617504437F901C3220DD70BC54C3D9
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 1e018b8b23cbdc7747bb26d73f593db1abfabae0ea978e82a33f3f6121d8ca6c
        • Instruction ID: 7c8aaa1faee60cfa846d9878e1e7da052a62007f41ba09a2254472a6e336fb16
        • Opcode Fuzzy Hash: 1e018b8b23cbdc7747bb26d73f593db1abfabae0ea978e82a33f3f6121d8ca6c
        • Instruction Fuzzy Hash: 8BD0127372D3C05FDB07426408A4499AF71FB63109F8A42A6C084894139169695BD365
        Memory Dump Source
        • Source File: 0000000B.00000003.3473695944.00000000042D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_3_42d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a9b0609283ef18de125db395b02bbb89b59a7c671b7987607d5a0517ebfc1b9f
        • Instruction ID: b5e9e3a89b6f1b5f3391bb08d0c985b990c6005319c4a33b17e852a186a74963
        • Opcode Fuzzy Hash: a9b0609283ef18de125db395b02bbb89b59a7c671b7987607d5a0517ebfc1b9f
        • Instruction Fuzzy Hash: 40C04C36300018BBEF452A95A4089FA7F16EB553A1B508025FA5985561DA354970AB50
        APIs
        • KiUserExceptionDispatcher.NTDLL ref: 07293A75
        Memory Dump Source
        • Source File: 0000000D.00000003.3550003342.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_13_3_7290000_rundll32.jbxd
        Similarity
        • API ID: DispatcherExceptionUser
        • String ID:
        • API String ID: 6842923-0
        • Opcode ID: 14b6be46055c51cd858530aba166f50872afa9d27399b46bc01895a81f26da82
        • Instruction ID: 560151a8a9f2e49d6ea6f62f3614378c3f36bd7248c436762ddbc32ce8099d83
        • Opcode Fuzzy Hash: 14b6be46055c51cd858530aba166f50872afa9d27399b46bc01895a81f26da82
        • Instruction Fuzzy Hash: C1E022322143801FCB010776A80C86A3FAADFCA23631502EFE5CAC7596DA389C428B60
        APIs
        • KiUserExceptionDispatcher.NTDLL ref: 07293A75
        Memory Dump Source
        • Source File: 0000000D.00000003.3550003342.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_13_3_7290000_rundll32.jbxd
        Similarity
        • API ID: DispatcherExceptionUser
        • String ID:
        • API String ID: 6842923-0
        • Opcode ID: 02d59538851e66a1b1abd8bacde7c7b9394d9828747b64c8c85dbe93874f6688
        • Instruction ID: 83d42dc932a39cea5709f8993bfbca7c7313850afc46ff89907730fd21dc9633
        • Opcode Fuzzy Hash: 02d59538851e66a1b1abd8bacde7c7b9394d9828747b64c8c85dbe93874f6688
        • Instruction Fuzzy Hash: 41E0C2366102006F8B045B77F90DC2B7BAEEBCD222300407FF94AC3A04DE38AC018AA0
        Memory Dump Source
        • Source File: 0000000D.00000002.3551073902.00000000035AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 035AD000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_13_2_35ad000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 3a7c8c374f5f9d823595b1eccfd46908b464655ad6d903e06334127e6bd7f449
        • Instruction ID: fb452febbe42ae9e5fe642bde8f87f15eb5832ce6f8cc519753a6220080f5fd8
        • Opcode Fuzzy Hash: 3a7c8c374f5f9d823595b1eccfd46908b464655ad6d903e06334127e6bd7f449
        • Instruction Fuzzy Hash: 5E213371504604DFCB05FF18E9D0B2ABFB9FB98314F2485A9D90D0B666C33AD416DAE1
        Memory Dump Source
        • Source File: 0000000D.00000002.3551073902.00000000035AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 035AD000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_13_2_35ad000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a996b1983543c5beebe690202e7c9c6d8fa4abb51b24ded49f3361ae76a63bf0
        • Instruction ID: efc6d2cc40f24d71c1c2ec6f2f1dd618f95542d89e98fc6697e10894f78c8ba7
        • Opcode Fuzzy Hash: a996b1983543c5beebe690202e7c9c6d8fa4abb51b24ded49f3361ae76a63bf0
        • Instruction Fuzzy Hash: 26112676504640CFCB02DF14E5C4B1ABFB2FB84314F28C6A9DC490B666C33AD45ADBA2
        Memory Dump Source
        • Source File: 0000000D.00000002.3551073902.00000000035AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 035AD000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_13_2_35ad000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 5040a7b25df4402825b2eec4e5c7aeeb31e7afe1e223e510910eada48f921a46
        • Instruction ID: 3b41de9cceaf040cb453d0028df5033c52a1c60994fa80a55d19d5efe8d92d28
        • Opcode Fuzzy Hash: 5040a7b25df4402825b2eec4e5c7aeeb31e7afe1e223e510910eada48f921a46
        • Instruction Fuzzy Hash: 1E01F771004B409AD720DA2ED984B6BFFECFF45320F18C46AED480A666D2799805E6B1
        Memory Dump Source
        • Source File: 0000000D.00000002.3551073902.00000000035AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 035AD000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_13_2_35ad000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: fe079301e4678bbead3ccd310eedd25a79a82bb569fb4cfcf4be4e2b1e37f1b2
        • Instruction ID: 39e131741b9c0013d7fd11312e1a75da58be1a68c4341c1ed4e17e8618ef7a1e
        • Opcode Fuzzy Hash: fe079301e4678bbead3ccd310eedd25a79a82bb569fb4cfcf4be4e2b1e37f1b2
        • Instruction Fuzzy Hash: E901807100D3C09FD7128B258894B56BFB8EF43224F1D81DBD9888F2A3C2695809D772
        Strings
        Memory Dump Source
        • Source File: 0000000E.00000003.3568964198.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_3_6b70000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: (aq$LR]q
        • API String ID: 0-67906209
        • Opcode ID: 4112f45f2da07891f6d90f045dd11f43aada618bb4646979aa8f361ad60422e8
        • Instruction ID: c9b6ebcba58ce2ebf27139338764f64770b22c0bf4870410aab3bb7fd9b102f2
        • Opcode Fuzzy Hash: 4112f45f2da07891f6d90f045dd11f43aada618bb4646979aa8f361ad60422e8
        • Instruction Fuzzy Hash: E75136B1B142554FDBA95B389C2037E3BEBEFC6600F0444EAE816CB396DE349D0583A1
        Strings
        Memory Dump Source
        • Source File: 0000000E.00000003.3568964198.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_3_6b70000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: $]q$$]q
        • API String ID: 0-127220927
        • Opcode ID: 4773cdf648e1a38b6e73dcfebd6215cc6950ec15d469d85ae13d23e7f055e99d
        • Instruction ID: 164f834f4f179971a61b25cbfe817ce27b0c5dad34bebbdb473ba704e8aca8b9
        • Opcode Fuzzy Hash: 4773cdf648e1a38b6e73dcfebd6215cc6950ec15d469d85ae13d23e7f055e99d
        • Instruction Fuzzy Hash: 3651C0B1B002099FCB55DF7CD8506AEBBF6FFC9250B18816AE825D7364DA309D06C7A1
        Strings
        Memory Dump Source
        • Source File: 0000000E.00000003.3568964198.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_3_6b70000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: (aq
        • API String ID: 0-600464949
        • Opcode ID: d7d9c61c1f949d3d1e440464ccb0196d181d01c3aa925b740c93a57dcc8f5d26
        • Instruction ID: 7c2a68f85aee3d85dd2b8c75fb50c3c638d6e04282f755c39be2b1791603becf
        • Opcode Fuzzy Hash: d7d9c61c1f949d3d1e440464ccb0196d181d01c3aa925b740c93a57dcc8f5d26
        • Instruction Fuzzy Hash: E871E6B1B002158FDB54ABB9C854A6EB7E7FFC8200F188069D516EB3A4DE359C02C791
        Strings
        Memory Dump Source
        • Source File: 0000000E.00000003.3568964198.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_3_6b70000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: (aq
        • API String ID: 0-600464949
        • Opcode ID: b5d303651a16c834b548d42afa0ec5ccc30a1c9401f4a5a4fcc7aaa059eb2b0b
        • Instruction ID: 793d84ba32af937503df9b42a88934886d87b99b852adadbbde5cd43b18a2586
        • Opcode Fuzzy Hash: b5d303651a16c834b548d42afa0ec5ccc30a1c9401f4a5a4fcc7aaa059eb2b0b
        • Instruction Fuzzy Hash: C74119B1B401155BDB98AB79D8A07AF779BDFC8710F14806DD926EB380CD359D0687E0
        Strings
        Memory Dump Source
        • Source File: 0000000E.00000003.3568964198.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_3_6b70000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: (aq
        • API String ID: 0-600464949
        • Opcode ID: 243ce386e2ad96b75633a148d474701971be1395112bdcf38b9d1603f29d4ea6
        • Instruction ID: 8de373b877ee81d8372baa0bf6a3bec7e2c9851eb16467efd8a195ab175a94ba
        • Opcode Fuzzy Hash: 243ce386e2ad96b75633a148d474701971be1395112bdcf38b9d1603f29d4ea6
        • Instruction Fuzzy Hash: 963127B0B093594FD795677888243AE7FE69FC6310F1844DED512EB382CD654C0683A1
        Strings
        Memory Dump Source
        • Source File: 0000000E.00000003.3568964198.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_3_6b70000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: LR]q
        • API String ID: 0-3081347316
        • Opcode ID: 8bdeaa4d0f4d12850c56ffe618b2293985b4f73a70c98ced2030b59cd77dd827
        • Instruction ID: a7a1def77efccf7fb06d06bc2b1cdb6c4fe4cfb9f9b37f55f81c970875ca70e8
        • Opcode Fuzzy Hash: 8bdeaa4d0f4d12850c56ffe618b2293985b4f73a70c98ced2030b59cd77dd827
        • Instruction Fuzzy Hash: F821E0B2B002455FDBA89B289C4477F77EBFFC5614F0850AEE42AC7295EB349A018750
        Memory Dump Source
        • Source File: 0000000E.00000003.3568964198.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_3_6b70000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 5de8079a70d2bee1da23d3575fe1fc3a67fec5ebfd53c4c31768d4630e8d5585
        • Instruction ID: b52d073b99d395e4479b97f1603ff68c4342c65092625288c318884c49143c54
        • Opcode Fuzzy Hash: 5de8079a70d2bee1da23d3575fe1fc3a67fec5ebfd53c4c31768d4630e8d5585
        • Instruction Fuzzy Hash: 89D1DDB5F002158FDBA4CB68C55476ABBF2FF48304F1491A9D8259B391DB31DE81CB91
        Memory Dump Source
        • Source File: 0000000E.00000003.3568964198.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_3_6b70000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 474693eaa6b4ddc2b1bb42f07fb8670962ed767cc060184d6849c6f34cc9e5bf
        • Instruction ID: 3551e9041d0d45c1393c0a1af30ef4830ab074cb4097ef9079c9a50375ea7f4d
        • Opcode Fuzzy Hash: 474693eaa6b4ddc2b1bb42f07fb8670962ed767cc060184d6849c6f34cc9e5bf
        • Instruction Fuzzy Hash: CF71DDB4F102198BEBA4CF64C65436EB7F2EF84304F1495A9D8259B380DB35DE85CB91
        Memory Dump Source
        • Source File: 0000000E.00000003.3568964198.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_3_6b70000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 13edc614800839aa169da23b953cdeac8b960454b02613a809c6469583d088de
        • Instruction ID: 4c600f1bf65d1387f4e2df4f574eb6b359a22770762e9013963e024456e90532
        • Opcode Fuzzy Hash: 13edc614800839aa169da23b953cdeac8b960454b02613a809c6469583d088de
        • Instruction Fuzzy Hash: 3841F975B101189FCB94DF78D88099EBBB2FF89710B14816AE915EB360DB31ED42CB90
        Memory Dump Source
        • Source File: 0000000E.00000003.3568964198.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_3_6b70000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 0d7235ee72afd15ff112ee1482b36f7f4fad6fbba99139c0513d0143fe8c09cd
        • Instruction ID: 62bc124c6b906cc22d5bad7519f6ecfd57785d1b0aa00c07fa8cb3b6f9d119d6
        • Opcode Fuzzy Hash: 0d7235ee72afd15ff112ee1482b36f7f4fad6fbba99139c0513d0143fe8c09cd
        • Instruction Fuzzy Hash: 5C11EBB3F002159BDB648A699844AEEB7DBEB88250F0840AAD517DB344D9709A0587B1
        Memory Dump Source
        • Source File: 0000000E.00000003.3568964198.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_3_6b70000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 6108dbabcb51bab0689ec2c3062f7fb682f4b0a0dc14dd72726000a1516cd2a4
        • Instruction ID: 32a35d52f5bcba3fa8ce4ea05a9473b63e55737cbdabfa07062aa16057396e16
        • Opcode Fuzzy Hash: 6108dbabcb51bab0689ec2c3062f7fb682f4b0a0dc14dd72726000a1516cd2a4
        • Instruction Fuzzy Hash: 6311BD72A403186FDBC52AA9AC107F63F9DDF45270F0440A7FD7C8A251C9358A80E3B0
        Memory Dump Source
        • Source File: 0000000E.00000003.3568964198.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_3_6b70000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: e06338caf7d42fe4d03754d6f7accad525cec6108fa03a416e8a20c525c81266
        • Instruction ID: 3d1a302ee310833171a7aa0a97b495e628c9bbdb3e64488767e0b785991de45c
        • Opcode Fuzzy Hash: e06338caf7d42fe4d03754d6f7accad525cec6108fa03a416e8a20c525c81266
        • Instruction Fuzzy Hash: D6210BB5E101189FCB94DF79D88499EBBF6EF8C710F10816AE815EB320DB319941CB90
        Memory Dump Source
        • Source File: 0000000E.00000003.3568964198.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_3_6b70000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 9b5e474fac76e64be2ff7483c7e0f400f0a1e09c8acc428a43fb0da5fcfd48f1
        • Instruction ID: c61f34f695172a2ff3e94a89b97feaa63d6b5df7aadc09ac03a257332f1f1978
        • Opcode Fuzzy Hash: 9b5e474fac76e64be2ff7483c7e0f400f0a1e09c8acc428a43fb0da5fcfd48f1
        • Instruction Fuzzy Hash: B92127B4D002499FDB20DFAAC844AEEFBF4FF49314F108419D51967240CB786945CFA5
        Memory Dump Source
        • Source File: 0000000E.00000003.3568964198.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_3_6b70000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: ecac7b0283c6fb8fa233b569c2cd5b4914d6c39c1fd395089bb9a0492f648ec1
        • Instruction ID: ddd372c93f8f6d9836aa28266871e9d883258f4f7299323d5edb5591072b395f
        • Opcode Fuzzy Hash: ecac7b0283c6fb8fa233b569c2cd5b4914d6c39c1fd395089bb9a0492f648ec1
        • Instruction Fuzzy Hash: 7A1117B5D002498FDB10DFAAC880AEEFBF4FF48314F108419D51967240C7786945CFA1
        Memory Dump Source
        • Source File: 0000000E.00000003.3568964198.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_3_6b70000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 64d0fdb4b4466b44c3a41f0fa542917410d06d5ae8705e8ee2fd257900215163
        • Instruction ID: b1e228fed403f859b5b450c6068a013ce8b9d4731db34456afb34f1a6c8860d7
        • Opcode Fuzzy Hash: 64d0fdb4b4466b44c3a41f0fa542917410d06d5ae8705e8ee2fd257900215163
        • Instruction Fuzzy Hash: B41182B2A001069FD764DF54D854AAABBF7EF8C324F144019E61AE7354CF756845CBA0
        Memory Dump Source
        • Source File: 0000000E.00000003.3568964198.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_3_6b70000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: ff7e518e5de085946c12515782877a5c016142b4ba74ed2caeb80735e05c1a4e
        • Instruction ID: 40af71f93a728c66f2568e4f1f21ff257c07da1240ae11a95cf136c697f4cef1
        • Opcode Fuzzy Hash: ff7e518e5de085946c12515782877a5c016142b4ba74ed2caeb80735e05c1a4e
        • Instruction Fuzzy Hash: D501A7B1E1011957D7A8AE6D89557EF7AFB9B88710F14405ED026B3380CE710D0587E1
        Memory Dump Source
        • Source File: 0000000E.00000003.3568964198.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_3_6b70000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: beba6bdea936cc20f402c3e90b6ea5a3fa66663d7aa2becec666dce8c4147540
        • Instruction ID: a5872fc64048af3d181241c7f3055f9844c19696bea01f6d488b5b7b08c05e6d
        • Opcode Fuzzy Hash: beba6bdea936cc20f402c3e90b6ea5a3fa66663d7aa2becec666dce8c4147540
        • Instruction Fuzzy Hash: 12010CB5D00219DFCB88DFA8D9409EEBBF6EF4D310B104469D819A7350D7369941CFA4
        Memory Dump Source
        • Source File: 0000000E.00000002.3569626160.000000000458D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0458D000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_2_458d000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 0454f4fb82c9adfd2607b39d8eebb3883b50e82e342f853124d03f5a4b672953
        • Instruction ID: cc55405b2fe27e0b64ea2c17b92d7bd5fce7a091c48ac973fb6721eddd0991f9
        • Opcode Fuzzy Hash: 0454f4fb82c9adfd2607b39d8eebb3883b50e82e342f853124d03f5a4b672953
        • Instruction Fuzzy Hash: 3E01FC70104344D9D7109E15FD84B67BFE8FF41324F18C41DDD481A2C6E679A805D6B1
        Memory Dump Source
        • Source File: 0000000E.00000002.3569626160.000000000458D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0458D000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_2_458d000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 366c6e6a7960f907dae1e0998f7a460087713b89676afd68389c5cf792274d22
        • Instruction ID: cf85e36ff2e4482a8e3c3abe2cbd666fd749e1b6ba7c636721780da1709e70bf
        • Opcode Fuzzy Hash: 366c6e6a7960f907dae1e0998f7a460087713b89676afd68389c5cf792274d22
        • Instruction Fuzzy Hash: 9C015E7100E3C09ED7128B259C94B52BFB4EF43224F1985DBD9889F2E7C2695849C772
        Memory Dump Source
        • Source File: 0000000E.00000003.3568964198.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_3_6b70000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: e644e9fdbc9db45925ed103db9bd46fac61af7487498444f1bc0e61122e8e0d2
        • Instruction ID: 09e399d79cdb5afd212bbca54043a144d0a480b50eaeb44c1072d7b04d65284b
        • Opcode Fuzzy Hash: e644e9fdbc9db45925ed103db9bd46fac61af7487498444f1bc0e61122e8e0d2
        • Instruction Fuzzy Hash: BBF044B1A0A3064FC72D8B7C58302573FEBEFC12087080DAEC746CB1A1E9289405CBE1
        Memory Dump Source
        • Source File: 0000000E.00000003.3568964198.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_3_6b70000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 9836f017a42d070f1c94566c1da1c14b71d57143c2d802b6243c5730154237d7
        • Instruction ID: a95943984529541d0a1519bbc199b40ca510967e1a98a993587af4c929518f85
        • Opcode Fuzzy Hash: 9836f017a42d070f1c94566c1da1c14b71d57143c2d802b6243c5730154237d7
        • Instruction Fuzzy Hash: 5AF090B1A462064ED77C9B7D69616677FDFEFC461C7080A6E874A8B190ED249400CBE1
        Memory Dump Source
        • Source File: 0000000E.00000003.3568964198.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_3_6b70000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 38c10a49e59e92d4077c389bb50fd20909947ff73c5a5dd7b0dbf0e2f5d1aed7
        • Instruction ID: 211a142c23ddaa03723525ba3f1b40731be82f299c68b1eed83ac96db9df4e75
        • Opcode Fuzzy Hash: 38c10a49e59e92d4077c389bb50fd20909947ff73c5a5dd7b0dbf0e2f5d1aed7
        • Instruction Fuzzy Hash: C9E092B0B342590AFBF925785A4476625CDCB41614F0414F9C421C2785D9F4E94843F1
        Memory Dump Source
        • Source File: 0000000E.00000003.3568964198.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_3_6b70000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 3c8d29308716a80783bded65fb11cea133a82cf6052ecd8e140906fdc34dc769
        • Instruction ID: 2f4d1b266064bb00d780f05f98ab7d29c24538c537cf311dc3d5bbf2bfab6926
        • Opcode Fuzzy Hash: 3c8d29308716a80783bded65fb11cea133a82cf6052ecd8e140906fdc34dc769
        • Instruction Fuzzy Hash: 82D097B3E063209BC7982B7438542CABBCECB46820F0380E3D96ECF302D4354D0A03A1
        Memory Dump Source
        • Source File: 0000000E.00000003.3568964198.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_3_6b70000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 3f99b77f03847c7fe0879051512aa2dbabacd3947e2f7c00585975221bbdc13d
        • Instruction ID: ac3b1f604d33232eb8058ce508a88d162a492365905bc4d7c91eba189dc51b88
        • Opcode Fuzzy Hash: 3f99b77f03847c7fe0879051512aa2dbabacd3947e2f7c00585975221bbdc13d
        • Instruction Fuzzy Hash: 6DE0C2B1D00219DF8B94DFA998001EEBBF4EF48240B10416AD529E3300E3355A11CBE4
        Memory Dump Source
        • Source File: 0000000E.00000003.3568964198.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_3_6b70000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 64579f3fc22e098e9a8623d0c3c037be8b72faa496f21f177ef662e4ead8295c
        • Instruction ID: c561fcc2882b1b375f39f977a2bfffc3f165c29a66a631d7bdd898e2d95e5e29
        • Opcode Fuzzy Hash: 64579f3fc22e098e9a8623d0c3c037be8b72faa496f21f177ef662e4ead8295c
        • Instruction Fuzzy Hash: EED02B72A693555FC751237818B41797F9CCF47110F009CE3EA25DB222C8249C0983D0
        Memory Dump Source
        • Source File: 0000000E.00000003.3568964198.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_3_6b70000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 6d7a840c1e21b3e7cd9bbcd833344dea3ff51f9c7ddef790b7c269b36ad2f8cb
        • Instruction ID: 605975186f7a406292fe372c0698262383597ecadde3a2119d2de74f9cc0cf4d
        • Opcode Fuzzy Hash: 6d7a840c1e21b3e7cd9bbcd833344dea3ff51f9c7ddef790b7c269b36ad2f8cb
        • Instruction Fuzzy Hash: 9CE02BB321C2441FC34A5F24EC114D57FB9A71A11030600A7F481C7371DD721D04C7E1
        Memory Dump Source
        • Source File: 0000000E.00000003.3568964198.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_3_6b70000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 68af0ae3203ae4dc694c4911c0eee54febf7f5b7ccaafb1f2b429ec685bcef16
        • Instruction ID: f296bb8cddeb97f99cefec88d102641e42cb4a100c5ec300b4bbf7cd1d5bbbcb
        • Opcode Fuzzy Hash: 68af0ae3203ae4dc694c4911c0eee54febf7f5b7ccaafb1f2b429ec685bcef16
        • Instruction Fuzzy Hash: 7BE02B7260C7900FC706DB28E4248F53BEA8F4A31470400EFF14ACF372D9469C808381
        Memory Dump Source
        • Source File: 0000000E.00000003.3568964198.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_3_6b70000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a77032457dcb768c573456c0fde83b67f892e2d4e02b341a811748e80cad8d27
        • Instruction ID: a18c79732ed773a70d22b6788b27ae602be9499b11e9e329786a75b471bfb645
        • Opcode Fuzzy Hash: a77032457dcb768c573456c0fde83b67f892e2d4e02b341a811748e80cad8d27
        • Instruction Fuzzy Hash: 93D0A9323641218FC308A32CE454A7933DDDF8A728B0044AAF20ECB320C992EC0042CA
        Memory Dump Source
        • Source File: 0000000E.00000003.3568964198.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_3_6b70000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: fa8d471dd6addafee09284596037cc38ecaf920e243c1f824f15944fc62a0812
        • Instruction ID: 8c3904d5c30984e3b5773634b746bf1c22a84a2b448dc00f1ea56a5a1bd9b296
        • Opcode Fuzzy Hash: fa8d471dd6addafee09284596037cc38ecaf920e243c1f824f15944fc62a0812
        • Instruction Fuzzy Hash: ADD0A7F331001C5F47446B29D84586A7B9DEB942617104473FA1683224DD706C1487E5
        Memory Dump Source
        • Source File: 0000000E.00000003.3568964198.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_14_3_6b70000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 8ab4e9547f254b6c14e73225eaff79e3249672444e99c4d72128499bd708c3fb
        • Instruction ID: f8eab16fb5d302281ef413a9477bcfd69d3c7ef109a7b315def88ce2f5eebfee
        • Opcode Fuzzy Hash: 8ab4e9547f254b6c14e73225eaff79e3249672444e99c4d72128499bd708c3fb
        • Instruction Fuzzy Hash: 3BC04CB2A55621ABC631CF149909AD7FFB2FF60716F408A1DB19641010C7314411DA75
        Strings
        Memory Dump Source
        • Source File: 0000000F.00000003.3587061642.0000000006D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D90000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_3_6d90000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: $]q$$]q
        • API String ID: 0-127220927
        • Opcode ID: 1f6cedb049566a781ddbdf39a01d4c65db47a98b8e059155aeb0621626541d2c
        • Instruction ID: d3acd6a9f8049d2c62c57b7644f8baf88ea6d4f018126aed12495dde2ffc1505
        • Opcode Fuzzy Hash: 1f6cedb049566a781ddbdf39a01d4c65db47a98b8e059155aeb0621626541d2c
        • Instruction Fuzzy Hash: B251AD35B0020A9FCB55DFB8DC506AEBBF6FFC9250B14852AD819D7364DA308D06C7A1
        Strings
        Memory Dump Source
        • Source File: 0000000F.00000003.3587061642.0000000006D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D90000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_3_6d90000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: (aq
        • API String ID: 0-600464949
        • Opcode ID: 4e087bd7678d9a3fed3eea60a04241b0763185cc116348690d59af739bd926b7
        • Instruction ID: 8ef9f0b6ce484517a6b714e1607940cb53668383d2f16bb536ee9d13c898dbab
        • Opcode Fuzzy Hash: 4e087bd7678d9a3fed3eea60a04241b0763185cc116348690d59af739bd926b7
        • Instruction Fuzzy Hash: 22719331B002159FEF54ABB5C85466EBAB7EFC9310F158429E506AB3A4DE74DC02C7A1
        Strings
        Memory Dump Source
        • Source File: 0000000F.00000003.3587061642.0000000006D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D90000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_3_6d90000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: (aq
        • API String ID: 0-600464949
        • Opcode ID: 2e75343446747771beb0dd2996abfa8af9561634e8ec2015c6fc88cd47f05f11
        • Instruction ID: 0eef28678b82404bad3092db186360d8c0d68838859e10b739993737f8e3de0d
        • Opcode Fuzzy Hash: 2e75343446747771beb0dd2996abfa8af9561634e8ec2015c6fc88cd47f05f11
        • Instruction Fuzzy Hash: 07112521B4021527FB982A6A1C7873F1A87DBC1720F55883CE90AAB381CD14DD0283F5
        Strings
        Memory Dump Source
        • Source File: 0000000F.00000003.3587061642.0000000006D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D90000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_3_6d90000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: (aq
        • API String ID: 0-600464949
        • Opcode ID: 8c795ed78441c9c634d2c0a51c005e2dd548ff2850e18dc723b6b094242082b5
        • Instruction ID: 5636b108ca1543fc853cde6fd4d3ed836b78a10f47cea8dca6e7f1575a91e1c0
        • Opcode Fuzzy Hash: 8c795ed78441c9c634d2c0a51c005e2dd548ff2850e18dc723b6b094242082b5
        • Instruction Fuzzy Hash: 7711A031B04206ABEB89AB6898243BF7AE6DBC9300F144469D402F7386CE759C0687F1
        Memory Dump Source
        • Source File: 0000000F.00000003.3587061642.0000000006D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D90000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_3_6d90000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: cdc3a9392752a5ba282d18e4c95bd2426774ed57954266c71628ea042b00508d
        • Instruction ID: 78a1f34ad186fc720f0e1f9881203f5b6470014efdab4b130475e1a7d0be70fb
        • Opcode Fuzzy Hash: cdc3a9392752a5ba282d18e4c95bd2426774ed57954266c71628ea042b00508d
        • Instruction Fuzzy Hash: C641D835B101149FCB94DF79D88099EBBB6FF89710B148169E905EB360DB31DD42CBA0
        Memory Dump Source
        • Source File: 0000000F.00000003.3587061642.0000000006D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D90000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_3_6d90000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: bfd4ba6dff74624379cd8ca22ed68fea50c481c1f5868cddde5838f9f8d192e4
        • Instruction ID: 6ac7bcdb9e3050acf065a936fe36162e01b1dd7159707f451a269877911ed7d9
        • Opcode Fuzzy Hash: bfd4ba6dff74624379cd8ca22ed68fea50c481c1f5868cddde5838f9f8d192e4
        • Instruction Fuzzy Hash: F121BF34B002069BDB449F759C9466EBBA6EFC5710F10893AE8259B381DE31DD4687F0
        Memory Dump Source
        • Source File: 0000000F.00000003.3587061642.0000000006D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D90000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_3_6d90000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: f6b831380246564165ed6749d301be2783cffdf644fb4030351d6d9b0f876310
        • Instruction ID: 7b6ac85e5464704d858d858532b972974e0b063481092093d08fe034d6d18bcb
        • Opcode Fuzzy Hash: f6b831380246564165ed6749d301be2783cffdf644fb4030351d6d9b0f876310
        • Instruction Fuzzy Hash: 8F217131B101056BDF88EAA9DC60AAEBBAADFC8310F14802DD516A7390CE359D06C7B0
        Memory Dump Source
        • Source File: 0000000F.00000003.3587061642.0000000006D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D90000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_3_6d90000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 5ec94ca8b1e28fa3719c842138d2ffa885678595f945135abccda5680466df59
        • Instruction ID: cf2666ccf04d20b0517b30c7aebf1b88b999e9878bc142b90750d78ec16c7418
        • Opcode Fuzzy Hash: 5ec94ca8b1e28fa3719c842138d2ffa885678595f945135abccda5680466df59
        • Instruction Fuzzy Hash: ED21AC34B002169BDB44AF759894A6EBBA6EFC5700F148639E8269B381DE35CD4687F0
        Memory Dump Source
        • Source File: 0000000F.00000003.3587061642.0000000006D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D90000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_3_6d90000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: c58f65e80a265b0dd125d04956d05ed8cf06ec3b8615f9be6ff3c2ae7ac99891
        • Instruction ID: 8e1d62b32349780f8a859408b6b276358c0033b9281414f62bf11f73359556e8
        • Opcode Fuzzy Hash: c58f65e80a265b0dd125d04956d05ed8cf06ec3b8615f9be6ff3c2ae7ac99891
        • Instruction Fuzzy Hash: A111E932F00315ABEF549B658C446BEBBEADBC8250F054036D906D7384DE74CD1687A1
        Memory Dump Source
        • Source File: 0000000F.00000003.3587061642.0000000006D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D90000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_3_6d90000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 50672230d252ef5038efe4606b293c55999b320f5c9314dd4cff34dce30c41c1
        • Instruction ID: bf453167a1f097c4bba9e2723ce51ae95e560112272fea981b01044c823333f3
        • Opcode Fuzzy Hash: 50672230d252ef5038efe4606b293c55999b320f5c9314dd4cff34dce30c41c1
        • Instruction Fuzzy Hash: 28110A75E101189FCB84DF69D88099EBBB2FF8D710F108129E915EB360DB319942CBA0
        Memory Dump Source
        • Source File: 0000000F.00000003.3587061642.0000000006D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D90000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_3_6d90000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: f8ce413d32ec6a52c407485df37904e28124bf605376ef94fb11f8fda34103ce
        • Instruction ID: 3351ccffa008f650c8b3c09d78f7e78e2c1990d14b2165ed1785814efbc2c7a5
        • Opcode Fuzzy Hash: f8ce413d32ec6a52c407485df37904e28124bf605376ef94fb11f8fda34103ce
        • Instruction Fuzzy Hash: 1B2115B4D002498EDB10DFAAC884AEEFBF0FF48314F10852AD41967240C7786945CFA1
        Memory Dump Source
        • Source File: 0000000F.00000003.3587061642.0000000006D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D90000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_3_6d90000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 3b116732a0900bd38ee10fe05f56412270f151960ed9e675a79318e793067634
        • Instruction ID: 72125e3059c872dad64e066d21cdb6ab75e7b4cdb33ce51ee1dacf770b0103d2
        • Opcode Fuzzy Hash: 3b116732a0900bd38ee10fe05f56412270f151960ed9e675a79318e793067634
        • Instruction Fuzzy Hash: EE1103B4D002098FDB20DFAAC880AEEFBF4FF48314F10842AD51967240CB78A945CFA1
        Memory Dump Source
        • Source File: 0000000F.00000003.3587061642.0000000006D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D90000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_3_6d90000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: b7228813b673ad1b7905f59ebd26b5e923e243a97ae115cb43877d9ca8414077
        • Instruction ID: dfc9f88981cc89a97a5ab88548887278587d02389852d9c960731a4796c2b7ea
        • Opcode Fuzzy Hash: b7228813b673ad1b7905f59ebd26b5e923e243a97ae115cb43877d9ca8414077
        • Instruction Fuzzy Hash: 1D01B930B1A3461FDB496B785D315263FDDDFC911830609BAD54DCF591E9188805C7E1
        Memory Dump Source
        • Source File: 0000000F.00000003.3587061642.0000000006D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D90000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_3_6d90000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 45d446920d6ee576f32388c990440cbc8ec37bc3180edced6dc2b342d0ff0ea9
        • Instruction ID: 5b559154cc765e8d1f6ef7b00225597e090cdb12de7603cf6188462f4322dd00
        • Opcode Fuzzy Hash: 45d446920d6ee576f32388c990440cbc8ec37bc3180edced6dc2b342d0ff0ea9
        • Instruction Fuzzy Hash: 7C119030A08215AFDB84DF64D855AAD7FB6EF8C320F154029E40AA7780CF799C45CBA0
        Memory Dump Source
        • Source File: 0000000F.00000003.3587061642.0000000006D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D90000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_3_6d90000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 34f7875e28ded8a91b53962f19fde6f949c31662d6ef34a9d1b5ff6a0d3e5296
        • Instruction ID: fc4748b1f8126dd5ab83e11b42056c7fc5090648be37c65fa593ad04eaa3e55f
        • Opcode Fuzzy Hash: 34f7875e28ded8a91b53962f19fde6f949c31662d6ef34a9d1b5ff6a0d3e5296
        • Instruction Fuzzy Hash: 6A018F72A0011667FB58AA699C557AF7AABDBC8200F11402DD011A7380CEB15D0697F1
        Memory Dump Source
        • Source File: 0000000F.00000003.3587061642.0000000006D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D90000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_3_6d90000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 0fdb5aa280d3c1062fb96706f58632f9e463f5face1a3809353a90f9bd40ca19
        • Instruction ID: 9df357917b4d693ca9198e1509e04bd676bc43d5d5c14a6a26b1e4389cb03cf2
        • Opcode Fuzzy Hash: 0fdb5aa280d3c1062fb96706f58632f9e463f5face1a3809353a90f9bd40ca19
        • Instruction Fuzzy Hash: 1B11BF30A04215AFDB84DF64D859AA97FB6FF8C320F154029E40AE3780CF399C45CBA0
        Memory Dump Source
        • Source File: 0000000F.00000002.3590516215.00000000047AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 047AD000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_47ad000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 34a7917de777845d3da6cbd32a4a500248b468bc04f3a734a93089416d1f1b99
        • Instruction ID: f463d27464a2edc65e8ecde7511ac4d94c2da5e385f673646a0140da43454846
        • Opcode Fuzzy Hash: 34a7917de777845d3da6cbd32a4a500248b468bc04f3a734a93089416d1f1b99
        • Instruction Fuzzy Hash: 30012B715047409EE7308E26ED84B67FFD8EFC1320F18CA2AED480B746C279A801CAB1
        Memory Dump Source
        • Source File: 0000000F.00000002.3590516215.00000000047AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 047AD000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_47ad000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 4847f40730e393b4c3c63bb391ff73e35e226ce0d546a97ac186ffa9e7769998
        • Instruction ID: 7838dcc0f5830df8618f154b4a68292ad69eb7c1a0d37cca957de8e3c94fb468
        • Opcode Fuzzy Hash: 4847f40730e393b4c3c63bb391ff73e35e226ce0d546a97ac186ffa9e7769998
        • Instruction Fuzzy Hash: D301527140D3C09ED7228B259894756BFB4EF53224F1D85DBD9888F293C2699845C772
        Memory Dump Source
        • Source File: 0000000F.00000003.3587061642.0000000006D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D90000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_3_6d90000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 637b6d043e96c5388aa49b37926e9f42d636f5022a0d34331f09ab19434e9463
        • Instruction ID: b3489553cadc56b7478ec47b635d07140421a8a8f33f7584b89686a2274041cf
        • Opcode Fuzzy Hash: 637b6d043e96c5388aa49b37926e9f42d636f5022a0d34331f09ab19434e9463
        • Instruction Fuzzy Hash: E7F01D31A001189FCF44AFBAA8046EEBBB9EFC9611F10453AE509E3240DB349951C7E1
        Memory Dump Source
        • Source File: 0000000F.00000003.3587061642.0000000006D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D90000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_3_6d90000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 2faa157b9c22102ea7e741c80a1bc18570b3b69841d88d4dbac09bb98e60f654
        • Instruction ID: 038e75d50cc14781eba6387281f3fb24c0962a2217bb329aee2414af0b5dbdba
        • Opcode Fuzzy Hash: 2faa157b9c22102ea7e741c80a1bc18570b3b69841d88d4dbac09bb98e60f654
        • Instruction Fuzzy Hash: C4F02430B4D3562FEFD563355C2073A2BB6DFC6210F04886AE556CA2C2CC28980483B1
        Memory Dump Source
        • Source File: 0000000F.00000003.3587061642.0000000006D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D90000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_3_6d90000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: cfad69af5dfa8b3ea930265b5637c7c4768414dfb19ecde31ee4913d95e0aa21
        • Instruction ID: f9220b4407ced0dbd3c17b696b23407bae6e2f9ee8252d21acdd4a56856a0aa2
        • Opcode Fuzzy Hash: cfad69af5dfa8b3ea930265b5637c7c4768414dfb19ecde31ee4913d95e0aa21
        • Instruction Fuzzy Hash: 6EF04F31B001189F8B44AF7998446EFBBF9EFC9610B10452AD809D3240DB34890287E0
        Memory Dump Source
        • Source File: 0000000F.00000003.3587061642.0000000006D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D90000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_3_6d90000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 151588e874b691b83b1d4ffc2a7b20c92f2f5fd0a70da3feaf373b841ad30102
        • Instruction ID: 5dccaa308d646d2dbfa7292101ac78ce3ba11d26d99011a7f11f88ce0b341655
        • Opcode Fuzzy Hash: 151588e874b691b83b1d4ffc2a7b20c92f2f5fd0a70da3feaf373b841ad30102
        • Instruction Fuzzy Hash: 4AE0DF33B10215278FA56A9B6CA4F6FAB5EDFC1261F18003EE90CD7200CA20CA06C2F4
        Memory Dump Source
        • Source File: 0000000F.00000003.3587061642.0000000006D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D90000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_3_6d90000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: d079dda380540e4d382e23cfd71d81c63edc5fb1d1cfd6ecd4b70d6059ebdc44
        • Instruction ID: 8516c6c22addf501bc18fa9fd446d97f95a3d15fc6ac6a6c5e18ec4884373ae3
        • Opcode Fuzzy Hash: d079dda380540e4d382e23cfd71d81c63edc5fb1d1cfd6ecd4b70d6059ebdc44
        • Instruction Fuzzy Hash: 51F03070B451061EDB8CAF78A96251A3F9AEFC85283060839C50E8F590EA288805CBE1
        Memory Dump Source
        • Source File: 0000000F.00000003.3587061642.0000000006D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D90000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_3_6d90000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a5a9f837092cfe48fa12ee0c8873e2d3e3f32fe596d127fac5fc3a2ddd5aafe3
        • Instruction ID: ac75c4541c820cd2bafb8ed2b2c7b9f8b8319194f89e57fbe9373b54c080b4db
        • Opcode Fuzzy Hash: a5a9f837092cfe48fa12ee0c8873e2d3e3f32fe596d127fac5fc3a2ddd5aafe3
        • Instruction Fuzzy Hash: A6D02B3231D1600FC7475F10AC614D97F35DB4A1103060067F440CB262CD604E02C3F0
        Memory Dump Source
        • Source File: 0000000F.00000003.3587061642.0000000006D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D90000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_3_6d90000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 90a50a4a2e0fc2ff86560efa3ec836a6f87f4b6be8eb92498eb4f26252a6d8bb
        • Instruction ID: 88f1e97eb8786c9774055cb28124c572af9cc8ceb2472f4abeda552054fab18e
        • Opcode Fuzzy Hash: 90a50a4a2e0fc2ff86560efa3ec836a6f87f4b6be8eb92498eb4f26252a6d8bb
        • Instruction Fuzzy Hash: F9D0A7323241196F5B886A18EC8686ABBA9EF843613514437F90183224DD70AC04C3F5
        Memory Dump Source
        • Source File: 0000000F.00000003.3587061642.0000000006D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D90000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_3_6d90000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: bf0c9376fc684b0bcbf76123d3c1d0ca2af7b9939aac82d5e063052f2366c737
        • Instruction ID: c68613a58fdc3a9935747815459eba0b61689d2858c3eaebb4ef948cef6fc449
        • Opcode Fuzzy Hash: bf0c9376fc684b0bcbf76123d3c1d0ca2af7b9939aac82d5e063052f2366c737
        • Instruction Fuzzy Hash: D0B0127690979057D6458214088489ED786EB732143CD4165C1441A404A15941B7D3F4
        Strings
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: $]q$$]q
        • API String ID: 0-127220927
        • Opcode ID: 9132dc232dd97c7c2e6ec464414b855375ce52c10dfa8503cddaf0f1470a3250
        • Instruction ID: 9de71ecc06bc6eb78d365acbcf497eefeef237640eac0002921d99ebc89b656e
        • Opcode Fuzzy Hash: 9132dc232dd97c7c2e6ec464414b855375ce52c10dfa8503cddaf0f1470a3250
        • Instruction Fuzzy Hash: 5E51D2B5B1020A9FDB15DFB8D8509AE7BF6FFC9350B19812AD409D7364DA308C16C791
        Strings
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: (aq$LR]q
        • API String ID: 0-67906209
        • Opcode ID: 1d5d7658aca4c45633bb9833b1c013ed1a2ff56cc829be76985d1c96213a4fda
        • Instruction ID: c7ccbec235f96229b1f28f0df57f99198e3cdcc0bc4f68537c28cadbb5267098
        • Opcode Fuzzy Hash: 1d5d7658aca4c45633bb9833b1c013ed1a2ff56cc829be76985d1c96213a4fda
        • Instruction Fuzzy Hash: A04106B571021A9FEB099B78A86477E7AEBFFC5204F148469E806D7395DE38CC028391
        Strings
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: (aq
        • API String ID: 0-600464949
        • Opcode ID: cef8499bf23a1b128ccf555098b68861551c25cadb6bc66014bf8703e55fc7cd
        • Instruction ID: 183caba47adb62c620b6159db0436a1b3138847a5f0c83db16db3ffd65cbb9c7
        • Opcode Fuzzy Hash: cef8499bf23a1b128ccf555098b68861551c25cadb6bc66014bf8703e55fc7cd
        • Instruction Fuzzy Hash: CB710875B20219DFDB04ABB5C854A6EBBA7EFC8300F158029E906EB7A4DE75DC12C741
        Strings
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: (aq
        • API String ID: 0-600464949
        • Opcode ID: 23dbbae302b7467f039e6b50b8d23db6bbf53a6ca05f8da8f953bd882586efde
        • Instruction ID: 6385f376d50a1f82050b54b6a281129c6cb077e16ea6df262a3d3f555323221d
        • Opcode Fuzzy Hash: 23dbbae302b7467f039e6b50b8d23db6bbf53a6ca05f8da8f953bd882586efde
        • Instruction Fuzzy Hash: BB512875B14209AFE714EBA8D8657AE7BB3EFC9310F11802AD506E7391CE789C06C791
        Strings
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: (aq
        • API String ID: 0-600464949
        • Opcode ID: 43de231487ce5fe60c1a4f43c77a83a1d0f5c67bb69e688fee74ea0823575e95
        • Instruction ID: ab0423cfb39550e4d156d27f7f9ac02cf246d23b796c131fe325b82a5174de40
        • Opcode Fuzzy Hash: 43de231487ce5fe60c1a4f43c77a83a1d0f5c67bb69e688fee74ea0823575e95
        • Instruction Fuzzy Hash: 7B412B71B50119ABE718AA6898607BF7BA7EFD9311F14802DDA06EB391CE35DC02C391
        Strings
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: LR]q
        • API String ID: 0-3081347316
        • Opcode ID: ce8558eb1b0a88601fe99d59bbdf78d64b055a5cb633de83b50cb5098f6f1e32
        • Instruction ID: 6a224234dd5381eada2cb8fbdb759326efb2a68e66c7636c6d4e1f2d56452457
        • Opcode Fuzzy Hash: ce8558eb1b0a88601fe99d59bbdf78d64b055a5cb633de83b50cb5098f6f1e32
        • Instruction Fuzzy Hash: A12190B272021AEFDB14DB68E855B7F76EAFFC5604F104429E806D7294EF348C018751
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: b94b9db0bc8f9c0b4df831b933a70f15df2d1de4fe6efe614992f58102c496ac
        • Instruction ID: 63c22ae932991d27d33bece848848534fd0e9ad37625be5536417296cb67d881
        • Opcode Fuzzy Hash: b94b9db0bc8f9c0b4df831b933a70f15df2d1de4fe6efe614992f58102c496ac
        • Instruction Fuzzy Hash: C4F049B4C05209DFCB11DFA4E4404EEBFB0FF09200B1080AAC458EB321E7385A12CB81
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: be72960d0ff0a9fcc9cb3a9880c6495e58b4d5f582dfc4d50baee64ebf0c1843
        • Instruction ID: 69ba46375e8b1d5979f61f170f99b2c32a679ce4b39b001463ef2ad97e83d577
        • Opcode Fuzzy Hash: be72960d0ff0a9fcc9cb3a9880c6495e58b4d5f582dfc4d50baee64ebf0c1843
        • Instruction Fuzzy Hash: EFB1DE74B10216DFD714CF68D884A6ABBF6FF88314F218169E8199B3A1DA35DC42CB91
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 96bfa96d671c0221392dd1c6e7a0e4b782811df65cce6a08c9b52025b005da8d
        • Instruction ID: ae92409fc4c1c8d6cd2c641119fda63395a7389bbc37692f0583d6825e565683
        • Opcode Fuzzy Hash: 96bfa96d671c0221392dd1c6e7a0e4b782811df65cce6a08c9b52025b005da8d
        • Instruction Fuzzy Hash: 6C41F575B10219DFCB54DF68D88099EBBB6FF88710B10816AE905EB360DB319C42CB91
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 61ca041ab86cfb3eb3859397d64f23ce7df79b45b6039e704b6765910ba96172
        • Instruction ID: f74bb9a4dc581b4eb6847d30c3fb8b76c117455d737fb5c20f8c68a928beec65
        • Opcode Fuzzy Hash: 61ca041ab86cfb3eb3859397d64f23ce7df79b45b6039e704b6765910ba96172
        • Instruction Fuzzy Hash: 23316DBA70430FAFC7256AA5B45176E7B5ADFE1381F0E502ADB088F155CE309C11C2E1
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 5bf03243f705e850a9629880d3cce516422425759e1fbe4975693b5dd2ccadac
        • Instruction ID: 0903b144211c1aa90876a4ba0a21aca7cf39cc0c921f8a7008e1bfe11cdd2e6f
        • Opcode Fuzzy Hash: 5bf03243f705e850a9629880d3cce516422425759e1fbe4975693b5dd2ccadac
        • Instruction Fuzzy Hash: 053170B6B202158BDB10EB78D8906FE7BEADFC4254F054036D606C7254DE74CD0B8391
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 4a9d1e447112170ce2500078bc43bb8c9e25e741b9bbd6f77a0d209672eec410
        • Instruction ID: 76ff67f411f7129afb351b311cfbf6a1cc75da01b343ea980ef506d6dfec6dd6
        • Opcode Fuzzy Hash: 4a9d1e447112170ce2500078bc43bb8c9e25e741b9bbd6f77a0d209672eec410
        • Instruction Fuzzy Hash: 5A113AB2F202199BEB109A6598406BE77EADBC8241F058036DA06D7680DE74CD138351
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a72b2cdcb4c916b622de062646872c1772c48bd88fe2f60259fc984d6b270dbf
        • Instruction ID: 59dde4873d76f7ee82366a47fb4fb4d8d6402c8b214ccce0452c29f690e6e6f9
        • Opcode Fuzzy Hash: a72b2cdcb4c916b622de062646872c1772c48bd88fe2f60259fc984d6b270dbf
        • Instruction Fuzzy Hash: 551155313483546FE31466BCA850B6A3FAACFC2264F0004BEEA09DB291DE299C05C3E1
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 151d9d435a3e48cf3b7290290b6150f44e80113c2ab87bb986209f49f11a6e38
        • Instruction ID: 31f76089a09ec9108093a99596912fa98b87d85109c9b51ec16e3e8056b2b815
        • Opcode Fuzzy Hash: 151d9d435a3e48cf3b7290290b6150f44e80113c2ab87bb986209f49f11a6e38
        • Instruction Fuzzy Hash: 6D211AB5E102189FCB54DF69D88199EBBB2FF8C710F10812AE805EB320DB319C42CB91
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: d51ca017ed7c7b9d1e826a6399b17b1caf3ae86dc2b6cdd7993982359ea36061
        • Instruction ID: a342a82adb4e36220aaca8069b5cd42c2b65ff10097d0504887fbfc22b2257ac
        • Opcode Fuzzy Hash: d51ca017ed7c7b9d1e826a6399b17b1caf3ae86dc2b6cdd7993982359ea36061
        • Instruction Fuzzy Hash: 9A216F75A1020AEFDB04EFA8D450A9E7BB2EFDC310F118429D509A7790CF799C56CB91
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 659c46a265f2600789304adfc33517e189e4665bd697536e2e7eb0cb7a17dbaa
        • Instruction ID: c8e030d5b06f2392a76da0029bee5cfffbcbb23750436d560046303f68c29268
        • Opcode Fuzzy Hash: 659c46a265f2600789304adfc33517e189e4665bd697536e2e7eb0cb7a17dbaa
        • Instruction Fuzzy Hash: EC11423A600119AFD714EFA8E4659EABBB6EFDC320F115019D909A7350CE795C46CB90
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 6dd5471e93add4b9845004b2f784102385d0daf04a889fe0be48dcec68aaf39c
        • Instruction ID: 72f28e41c2a1d428efb36a84b3a9a773a0458e527660bff634ef9c84bcb668df
        • Opcode Fuzzy Hash: 6dd5471e93add4b9845004b2f784102385d0daf04a889fe0be48dcec68aaf39c
        • Instruction Fuzzy Hash: 95116079A10209AFCB04EFA8D850A9E7BB2EFDC310F108425D509A7794DE799C45CB90
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a72e93539b00ba49fe04a6b8e7e85606289c097fb949d7c7cbe3fe17a4e5b11e
        • Instruction ID: 8fa5c9bea5e8b0a80c05c6a54ce91ac6bba7fee2c7aee26de08c3214a9576476
        • Opcode Fuzzy Hash: a72e93539b00ba49fe04a6b8e7e85606289c097fb949d7c7cbe3fe17a4e5b11e
        • Instruction Fuzzy Hash: C52127B1D002098FDB10DFAAC4856EEFBF0FF48314F108429D51967240DB755946CFA1
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: ed7803331381a6e81279bed299c84d8a81d8fec3e97862e8131d8038e30cdfc7
        • Instruction ID: 5581ecabef50d97da7f54fbd49f4ca19f37233ece043b6c59703debed4816104
        • Opcode Fuzzy Hash: ed7803331381a6e81279bed299c84d8a81d8fec3e97862e8131d8038e30cdfc7
        • Instruction Fuzzy Hash: 591114B4D042498FDB14DFAAC485AEEFBF4FF48314F10842AD51967240CB79A945CFA1
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: b81fb45ed4bcfbee5f217f21bf29c19560358bb3b7c4911521f891fe9f1268a5
        • Instruction ID: 1dc9362e3baf5d04ef20bf6f35daa3f2a0574dfa63d0b38ef68e3c161b32dd24
        • Opcode Fuzzy Hash: b81fb45ed4bcfbee5f217f21bf29c19560358bb3b7c4911521f891fe9f1268a5
        • Instruction Fuzzy Hash: 83111279600119AFC714EF98E464AAA7BB6EFDC321F145019E609E7350CF795C45CB90
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 31c9bd31f08c2cab9a6045dfbacd31aa76bd7a8c6cb2e8f3815ba597d52d9f67
        • Instruction ID: 513daad070be0752dbf174189f7d11245b70615af20147294363083c50212c0d
        • Opcode Fuzzy Hash: 31c9bd31f08c2cab9a6045dfbacd31aa76bd7a8c6cb2e8f3815ba597d52d9f67
        • Instruction Fuzzy Hash: 9A01D8B961A20F1FD7196B7C68751163FA9DED110830609AACA49CB591FD1C8C0683A1
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: b63f5f2a31adbd73591c6834cdb77eb4fecab69d0ff794e3eabacf47e1bce683
        • Instruction ID: 581b14023883e38ffde5ccc1d6c0c122278f75d189ae737a76af8158d2528679
        • Opcode Fuzzy Hash: b63f5f2a31adbd73591c6834cdb77eb4fecab69d0ff794e3eabacf47e1bce683
        • Instruction Fuzzy Hash: 9901D6B2B2011997F724E6A995A57EF7BB79BC8604F114029D006F7790CE714C0797D2
        Memory Dump Source
        • Source File: 00000011.00000002.4073395099.0000000004CFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CFD000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_2_4cfd000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 72c37c6593bac8caaf98f657158cb98d92d4264323eb4b398e2c7ca9cf089fe6
        • Instruction ID: a79ff8acb40c3402c471ad9092022d8882c3f7d7736919bc9c430abe327c3455
        • Opcode Fuzzy Hash: 72c37c6593bac8caaf98f657158cb98d92d4264323eb4b398e2c7ca9cf089fe6
        • Instruction Fuzzy Hash: 2B012B701043009ED7608E2ADDC4B67BF98EF42320F18C52AEE4B0B246D67DA942C6B1
        Memory Dump Source
        • Source File: 00000011.00000002.4073395099.0000000004CFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CFD000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_2_4cfd000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 36abce5b930892efb2589917a7f9817cf6b00f234c73620dd57011822b1a3561
        • Instruction ID: 811ad041638de2d2cc52e6292b208ab205bf1d04e0347481740b84ee2d624d38
        • Opcode Fuzzy Hash: 36abce5b930892efb2589917a7f9817cf6b00f234c73620dd57011822b1a3561
        • Instruction Fuzzy Hash: 2E014C7110E3C09FD7128B259D94B52BFB4EF43224F1981DBDD898F2A7C2695849C772
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 483cc4faa0f3ec9008b33319dfc31d526703220459ee745677d7b8989f04b5cb
        • Instruction ID: 46c52a33952cef01e8ada66c9a8d83d83ed2c1ceb348f809c7d279e1dd5c67c3
        • Opcode Fuzzy Hash: 483cc4faa0f3ec9008b33319dfc31d526703220459ee745677d7b8989f04b5cb
        • Instruction Fuzzy Hash: 9CF062FEA1520F5FD71C6FBC65695563F9AEEE0508306082E8A0A8B590FD2C8C029791
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: c29bc3015dc674e0b62cb10599539a7ae43ba8f5d85003598e666f5c4f0506ae
        • Instruction ID: c89fcaf3058c090f5efab203f4f1485d27bd7ac22f3004f12d51ffa1d85384ae
        • Opcode Fuzzy Hash: c29bc3015dc674e0b62cb10599539a7ae43ba8f5d85003598e666f5c4f0506ae
        • Instruction Fuzzy Hash: 05E092357A02199BD724AA38A480A6E7BEAEFC5255F000A29D60187244CF68EC0E8781
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 74979740976ab051098f5bb12e0085098f37f11e6a7384dbe9f963becf9d789b
        • Instruction ID: f86d9ca51a8513134f64803b23727d17594e257fe09563082b4f228b3c3b7ff0
        • Opcode Fuzzy Hash: 74979740976ab051098f5bb12e0085098f37f11e6a7384dbe9f963becf9d789b
        • Instruction Fuzzy Hash: 27E02239650716DFC734AE28F040B5A37F6EFC2260F11052DD9058B680CF38AC0A8B80
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 0c557179fad39da49db043306f117877a626066dab097ffaad4b17e9f253de41
        • Instruction ID: 3330965d6990eeadba01e8152fde565e490314cfaa4a4d3a18d2a0f68284b604
        • Opcode Fuzzy Hash: 0c557179fad39da49db043306f117877a626066dab097ffaad4b17e9f253de41
        • Instruction Fuzzy Hash: B1E04F7621016DFBDB052A95E804BEA7F9AFF99371F108025FE4885120CA358D61E7A1
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: cb24a4c8f7f874c158bb7bad42751a81f22b7263fd90dec5aba03d117e290008
        • Instruction ID: d1e2c49cbadd424cadf5a89f1b4fbbab07b74241c7719c7ef5d751430677b888
        • Opcode Fuzzy Hash: cb24a4c8f7f874c158bb7bad42751a81f22b7263fd90dec5aba03d117e290008
        • Instruction Fuzzy Hash: 73F01EB0D10219DF8B44EFA9E8004EEBBF4FF48200B20806AC819E3310E7359E01CF90
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 8f4a8d5bc241ffe0405c058e2f721a4fc085da67a35fbcd9faf22022909b3b03
        • Instruction ID: 8fca7552292bbc98e38d74c81f4c9b2cb46435a558043ecb48396a4a84dfb65b
        • Opcode Fuzzy Hash: 8f4a8d5bc241ffe0405c058e2f721a4fc085da67a35fbcd9faf22022909b3b03
        • Instruction Fuzzy Hash: FDE04F7511E7C19FC707477048656407F70AF0330476A40DFC4458E0E3C15E884BC712
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 4d72a5e386f67f741dcae85bd19d2a71a8b8bddef7be676ac227f43132b4366a
        • Instruction ID: 0bb5fa97c14b1bc1555db9d3d5132f6d7e8d648bfd90f9a75a3efaafb5a7fa12
        • Opcode Fuzzy Hash: 4d72a5e386f67f741dcae85bd19d2a71a8b8bddef7be676ac227f43132b4366a
        • Instruction Fuzzy Hash: 58D0C2327003145F8714AEF9A4105AA7FEECE80160700047E950DC7240EE34A8408391
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: fef7cd488049f778721ea107c4656a2b6cbecc3b95767cd07f66513b6b5524b5
        • Instruction ID: db9ff9f6c907c0fc0450148fbc004f1b4792cfad36b9ea114efa7cd62da83237
        • Opcode Fuzzy Hash: fef7cd488049f778721ea107c4656a2b6cbecc3b95767cd07f66513b6b5524b5
        • Instruction Fuzzy Hash: 82D05E32624618AFC3156F55E006B667BA5AF55611B02406BFD5587230DFB50C21E7C5
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: f40d35a6bc1b95665d99581a9c1ee8b6f0c8e21daa318f4ff349c102ce48371c
        • Instruction ID: f93d538d34cfe3221e7cb67691ef0173927ce6c883d929b421abba40ac4a61a8
        • Opcode Fuzzy Hash: f40d35a6bc1b95665d99581a9c1ee8b6f0c8e21daa318f4ff349c102ce48371c
        • Instruction Fuzzy Hash: F2D022F03E034ECAF31432A029193B632C96B40610FB0001CFA8C088E0EDA91CE0C192
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: b537e67a55b00e4a777a75a1a6a32153192f61529981a92e0f9f85f210c07c74
        • Instruction ID: 5fc9de8eabfb5e41034b7098d0f9467766a66ad0a435afb290b1cbc47a7d4e9d
        • Opcode Fuzzy Hash: b537e67a55b00e4a777a75a1a6a32153192f61529981a92e0f9f85f210c07c74
        • Instruction Fuzzy Hash: 0BD0A77227041C6B52046A98D84586A7B99EB95260B114433FA01C3220CD70AC15839B
        Memory Dump Source
        • Source File: 00000011.00000003.4072176143.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_17_3_72d0000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 4191b702ec93d4cac16623818dd7d7da8741a74a4b4a983a686973d8fa49d9a1
        • Instruction ID: 73221082834f110b151b2d374a066c66d57a8ae73601b02373732cf0fca93b36
        • Opcode Fuzzy Hash: 4191b702ec93d4cac16623818dd7d7da8741a74a4b4a983a686973d8fa49d9a1
        • Instruction Fuzzy Hash: 99C08CFBA66E501FE311406C0CE68C62B30EEF290838AC1D2C0808601774266A2380A0

        Execution Graph

        Execution Coverage:11.6%
        Dynamic/Decrypted Code Coverage:2.8%
        Signature Coverage:2.4%
        Total number of Nodes:2000
        Total number of Limit Nodes:42
        execution_graph 27486 6ce5f4c1 27487 6ce5f4cc 27486->27487 27488 6ce5f43f __getstream 27487->27488 27496 6ce5e72a 27487->27496 27491 6ce5f401 5 API calls 27491->27488 27492 6ce5e72a 207 API calls 27493 6ce5f539 27492->27493 27494 6ce5f401 5 API calls 27493->27494 27495 6ce5f56b 27494->27495 27495->27488 27495->27491 27497 6ce5e73f 27496->27497 27498 6ce5e7ee OutputDebugStringA 27496->27498 27499 6ce5e746 OutputDebugStringA 27497->27499 27513 6ce5e77c 27497->27513 27500 6ce5e808 27498->27500 27498->27513 27501 6ce5e759 27499->27501 27499->27513 27502 6ce5e810 CloseHandle 27500->27502 27500->27513 27518 6ce5fc92 27501->27518 27504 6ce5e825 GetLastError 27502->27504 27505 6ce5e843 27502->27505 27549 6ce56391 167 API calls 3 library calls 27504->27549 27517 6ce5e7e9 27505->27517 27550 6ce5e698 170 API calls __getstream 27505->27550 27510 6ce5e76f 27511 6ce5e783 CreateMutexA 27510->27511 27510->27513 27512 6ce5e796 GetLastError 27511->27512 27511->27513 27512->27513 27514 6ce5e7c4 CloseHandle 27512->27514 27513->27492 27513->27495 27514->27513 27515 6ce5e7cf GetLastError 27514->27515 27548 6ce56391 167 API calls 3 library calls 27515->27548 27517->27513 27519 6ce5fc9a 27518->27519 27521 6ce5e763 27519->27521 27551 6ce640d3 27519->27551 27569 6ce641b6 TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress _raise 27519->27569 27521->27510 27523 6ce5b021 27521->27523 27579 6ce571e9 27523->27579 27529 6ce5b045 27530 6ce5b0ac GetWindowsDirectoryA 27529->27530 27531 6ce5b166 GetLastError 27530->27531 27532 6ce5b18f 27530->27532 27615 6ce56391 167 API calls 3 library calls 27531->27615 27616 6ce585ae 27532->27616 27536 6ce5b187 27539 6ce5b1ca GetSystemDirectoryA 27536->27539 27538 6ce5b1a8 27538->27539 27623 6ce56391 167 API calls 3 library calls 27538->27623 27540 6ce5b205 27539->27540 27541 6ce5b1dc GetLastError 27539->27541 27544 6ce5a078 CharNextA 27540->27544 27624 6ce56391 167 API calls 3 library calls 27541->27624 27546 6ce5b212 27544->27546 27545 6ce5b1fd 27545->27510 27546->27545 27625 6ce56391 167 API calls 3 library calls 27546->27625 27548->27517 27549->27505 27550->27517 27552 6ce64186 27551->27552 27562 6ce640e5 27551->27562 27577 6ce641b6 TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress _raise 27552->27577 27554 6ce6418c 27578 6ce633d9 61 API calls __getptd 27554->27578 27557 6ce6417e 27557->27519 27560 6ce64142 HeapAlloc 27560->27562 27561 6ce640f6 27561->27560 27561->27562 27570 6ce67c80 61 API calls 2 library calls 27561->27570 27571 6ce67af6 61 API calls 3 library calls 27561->27571 27572 6ce60f5e GetModuleHandleA GetProcAddress ExitProcess ___crtCorExitProcess 27561->27572 27562->27557 27562->27561 27564 6ce64172 27562->27564 27567 6ce64177 27562->27567 27573 6ce6407f 61 API calls 2 library calls 27562->27573 27574 6ce641b6 TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress _raise 27562->27574 27575 6ce633d9 61 API calls __getptd 27564->27575 27576 6ce633d9 61 API calls __getptd 27567->27576 27569->27519 27570->27561 27571->27561 27573->27562 27574->27562 27575->27567 27576->27557 27577->27554 27578->27557 27580 6ce57213 GetVersionExA 27579->27580 27581 6ce57208 27579->27581 27583 6ce57233 27580->27583 27584 6ce5724a 27580->27584 27626 6ce5fc2e 27581->27626 27583->27584 27630 6ce57089 182 API calls 27583->27630 27584->27581 27585 6ce57262 27585->27529 27587 6ce570ae 27585->27587 27588 6ce570d8 GetVersionExA 27587->27588 27594 6ce570cd 27587->27594 27595 6ce570f8 27588->27595 27601 6ce57126 27588->27601 27590 6ce5fc2e ___ansicp 4 API calls 27592 6ce57150 27590->27592 27592->27529 27602 6ce57157 27592->27602 27593 6ce57133 27667 6ce5691d 9 API calls ___ansicp 27593->27667 27594->27590 27595->27601 27631 6ce56eaf 27595->27631 27598 6ce57138 27598->27594 27601->27593 27655 6ce56dab 27601->27655 27603 6ce57181 GetVersionExA 27602->27603 27611 6ce57176 27602->27611 27604 6ce571a1 27603->27604 27605 6ce571b8 27603->27605 27604->27605 27612 6ce56f9c 178 API calls 27604->27612 27607 6ce56eaf 178 API calls 27605->27607 27610 6ce571c5 27605->27610 27606 6ce5fc2e ___ansicp 4 API calls 27608 6ce571e2 27606->27608 27609 6ce571c1 27607->27609 27608->27529 27609->27610 27609->27611 27701 6ce5691d 9 API calls ___ansicp 27610->27701 27611->27606 27612->27605 27614 6ce571ca 27614->27611 27615->27536 27617 6ce585be CharNextA 27616->27617 27618 6ce585cc 27616->27618 27617->27617 27617->27618 27619 6ce5a078 27618->27619 27620 6ce5a08a 27619->27620 27622 6ce5a0a3 27619->27622 27621 6ce5a095 CharNextA 27620->27621 27620->27622 27621->27621 27621->27622 27622->27538 27623->27536 27624->27545 27625->27545 27627 6ce5fc36 27626->27627 27628 6ce5fc38 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 27626->27628 27627->27585 27628->27585 27630->27584 27632 6ce56edc GetSystemDirectoryA 27631->27632 27633 6ce56ece 27631->27633 27634 6ce56ef5 27632->27634 27635 6ce56f5b GetLastError 27632->27635 27637 6ce5fc2e ___ansicp 4 API calls 27633->27637 27668 6ce56cec 27634->27668 27642 6ce56f2c 27635->27642 27639 6ce56f95 27637->27639 27639->27601 27643 6ce56f9c 27639->27643 27640 6ce56f07 27640->27633 27682 6ce56872 174 API calls 2 library calls 27640->27682 27642->27633 27683 6ce56391 167 API calls 3 library calls 27642->27683 27644 6ce56fc9 GetSystemDirectoryA 27643->27644 27645 6ce56fbb 27643->27645 27646 6ce56fe2 27644->27646 27647 6ce57048 GetLastError 27644->27647 27649 6ce5fc2e ___ansicp 4 API calls 27645->27649 27648 6ce56cec 169 API calls 27646->27648 27654 6ce57019 27647->27654 27652 6ce56ff4 27648->27652 27651 6ce57082 27649->27651 27651->27601 27652->27645 27697 6ce56872 174 API calls 2 library calls 27652->27697 27654->27645 27698 6ce56391 167 API calls 3 library calls 27654->27698 27656 6ce56dd8 GetSystemDirectoryA 27655->27656 27666 6ce56dca 27655->27666 27657 6ce56df1 27656->27657 27658 6ce56e6e GetLastError 27656->27658 27660 6ce56cec 169 API calls 27657->27660 27659 6ce56e2c 27658->27659 27659->27666 27700 6ce56391 167 API calls 3 library calls 27659->27700 27664 6ce56e03 27660->27664 27661 6ce5fc2e ___ansicp 4 API calls 27663 6ce56ea8 27661->27663 27663->27593 27663->27594 27664->27666 27699 6ce56872 174 API calls 2 library calls 27664->27699 27666->27661 27667->27598 27669 6ce56d14 27668->27669 27670 6ce56d51 27668->27670 27684 6ce56c43 27669->27684 27673 6ce56d81 FindFirstFileA 27670->27673 27675 6ce56d60 27670->27675 27676 6ce56d9a FindClose 27673->27676 27679 6ce56d3c 27673->27679 27674 6ce56d1f 27689 6ce56391 167 API calls 3 library calls 27674->27689 27690 6ce56391 167 API calls 3 library calls 27675->27690 27676->27679 27680 6ce5fc2e ___ansicp 4 API calls 27679->27680 27681 6ce56d4d 27680->27681 27681->27640 27682->27642 27683->27633 27691 6ce56be5 27684->27691 27687 6ce56c83 27687->27673 27687->27674 27689->27679 27690->27679 27692 6ce56bf3 27691->27692 27694 6ce56c1d 27692->27694 27696 6ce5f736 97 API calls _vswprintf_s 27692->27696 27694->27687 27695 6ce56391 167 API calls 3 library calls 27694->27695 27695->27687 27696->27694 27697->27654 27698->27645 27699->27659 27700->27666 27701->27614 27702 e76ec2 27703 e76ed1 ___crtLCMapStringA 27702->27703 27744 e7935e GetModuleHandleA 27703->27744 27705 e76edc GetStartupInfoA GetVersionExA 27706 e77036 27705->27706 27708 e76f19 27705->27708 27964 e793e8 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess ___ansicp 27706->27964 27746 e79296 HeapCreate 27708->27746 27711 e76f7a 27712 e76f86 27711->27712 27957 e76e4e 60 API calls 2 library calls 27711->27957 27756 e790b0 GetModuleHandleA 27712->27756 27715 e76f8c 27716 e76f97 27715->27716 27958 e76e4e 60 API calls 2 library calls 27715->27958 27790 e78a65 27716->27790 27719 e76fa0 27720 e76fac GetCommandLineA 27719->27720 27959 e77ec6 60 API calls 2 library calls 27719->27959 27807 e78929 27720->27807 27723 e76fab 27723->27720 27727 e76fd1 27844 e78577 27727->27844 27731 e76fe2 27855 e77fea 27731->27855 27734 e76ff4 27859 e78513 27734->27859 27735 e76fe9 27735->27734 27962 e77ec6 60 API calls 2 library calls 27735->27962 27741 e77031 27745 e7936f 27744->27745 27745->27705 27747 e792be 27746->27747 27748 e792ba 27746->27748 27965 e79234 60 API calls 3 library calls 27747->27965 27748->27711 27750 e792c3 27751 e792f1 27750->27751 27752 e792cd 27750->27752 27751->27711 27966 e7e4a4 HeapAlloc 27752->27966 27754 e792d7 27754->27751 27755 e792dc HeapDestroy 27754->27755 27755->27748 27757 e790c4 27756->27757 27758 e790cd GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27756->27758 27967 e78dc5 63 API calls 2 library calls 27757->27967 27760 e79117 TlsAlloc 27758->27760 27763 e79161 TlsSetValue 27760->27763 27789 e791c4 27760->27789 27762 e790c9 27762->27715 27764 e7916e 27763->27764 27763->27789 27968 e78199 4 API calls 3 library calls 27764->27968 27766 e79173 27969 e78ca4 TlsGetValue 27766->27969 27769 e78ca4 ___crtInitCritSecAndSpinCount 4 API calls 27770 e7918e 27769->27770 27771 e78ca4 ___crtInitCritSecAndSpinCount 4 API calls 27770->27771 27772 e7919e 27771->27772 27773 e78ca4 ___crtInitCritSecAndSpinCount 4 API calls 27772->27773 27774 e791ae 27773->27774 27976 e7d9cb 60 API calls 27774->27976 27776 e791bb 27777 e791bf 27776->27777 27978 e78d1d TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress 27776->27978 27977 e78dc5 63 API calls 2 library calls 27777->27977 27780 e791d9 27780->27777 27979 e7e453 60 API calls __calloc_impl 27780->27979 27782 e791f2 27782->27777 27980 e78d1d TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress 27782->27980 27784 e7920c 27785 e79213 27784->27785 27786 e7921c 27784->27786 27981 e7a5ab 60 API calls 6 library calls 27785->27981 27982 e78e07 60 API calls 4 library calls 27786->27982 27789->27715 27983 e7aba8 27790->27983 27792 e78a71 GetStartupInfoA 27984 e7e40d 27792->27984 27794 e78c96 __lseeki64 27794->27719 27795 e78c12 GetStdHandle 27800 e78bdc 27795->27800 27796 e7e40d ___crtLCMapStringA 60 API calls 27801 e78a92 27796->27801 27797 e78c78 SetHandleCount 27797->27794 27798 e78c24 GetFileType 27798->27800 27799 e78b5e 27799->27800 27802 e78b87 GetFileType 27799->27802 27803 e78b92 27799->27803 27800->27795 27800->27797 27800->27798 27806 e78c3b 27800->27806 27801->27794 27801->27796 27801->27799 27801->27800 27802->27799 27802->27803 27803->27794 27803->27799 27991 e7df24 60 API calls 5 library calls 27803->27991 27806->27794 27806->27800 27992 e7df24 60 API calls 5 library calls 27806->27992 27808 e78947 GetEnvironmentStringsW 27807->27808 27809 e78966 27807->27809 27810 e7894f 27808->27810 27811 e7895b GetLastError 27808->27811 27809->27810 27812 e789ff 27809->27812 27814 e78982 GetEnvironmentStringsW 27810->27814 27816 e78991 27810->27816 27811->27809 27813 e78a08 GetEnvironmentStrings 27812->27813 27819 e76fbc 27812->27819 27813->27819 27820 e78a18 27813->27820 27814->27816 27814->27819 27815 e789a6 WideCharToMultiByte 27817 e789c5 27815->27817 27818 e789f4 FreeEnvironmentStringsW 27815->27818 27816->27815 27816->27816 27822 e7b45f ___crtGetEnvironmentStringsA 60 API calls 27817->27822 27818->27819 27833 e78869 27819->27833 27821 e7b45f ___crtGetEnvironmentStringsA 60 API calls 27820->27821 27823 e78a32 27821->27823 27824 e789cb 27822->27824 27825 e78a45 27823->27825 27826 e78a39 FreeEnvironmentStringsA 27823->27826 27824->27818 27827 e789d3 WideCharToMultiByte 27824->27827 28092 e7b730 __VEC_memcpy 27825->28092 27826->27819 27829 e789e5 27827->27829 27830 e789ed 27827->27830 28091 e7a5ab 60 API calls 6 library calls 27829->28091 27830->27818 27831 e78a4f FreeEnvironmentStringsA 27831->27819 27834 e78883 GetModuleFileNameA 27833->27834 27835 e7887e 27833->27835 27837 e788aa 27834->27837 28099 e7c140 103 API calls __setmbcp 27835->28099 28093 e78682 27837->28093 27839 e76fc6 27839->27727 27960 e77ec6 60 API calls 2 library calls 27839->27960 27841 e7b45f ___crtGetEnvironmentStringsA 60 API calls 27842 e788ec 27841->27842 27842->27839 27843 e78682 70 API calls 27842->27843 27843->27839 27845 e7858a 27844->27845 27848 e7858f 27844->27848 28102 e7c140 103 API calls __setmbcp 27845->28102 27847 e7e40d ___crtLCMapStringA 60 API calls 27853 e785d8 27847->27853 27848->27847 27849 e76fd7 27848->27849 27849->27731 27961 e77ec6 60 API calls 2 library calls 27849->27961 27850 e78656 28105 e7a5ab 60 API calls 6 library calls 27850->28105 27853->27849 27853->27850 28103 e7c4a1 60 API calls __cftoe2_l 27853->28103 28104 e7a451 5 API calls ___ansicp 27853->28104 27856 e77ff8 27855->27856 28106 e7db99 27856->28106 27858 e78016 __initterm_e _doexit 27858->27735 27860 e78526 27859->27860 27861 e78521 27859->27861 27863 e76ffa 27860->27863 28111 e7e2cd 70 API calls x_ismbbtype_l 27860->28111 28110 e7c140 103 API calls __setmbcp 27861->28110 27865 e74d57 CreateMutexA 27863->27865 27866 e75159 EnumWindows 27865->27866 27867 e74d79 GetLastError 27865->27867 27870 e75168 27866->27870 27868 e75150 CloseHandle 27867->27868 27869 e74d8a 27867->27869 27868->27866 28112 e74b1b 27869->28112 27870->27741 27954 e7813b 27870->27954 27957->27712 27958->27716 27959->27723 27960->27727 27961->27731 27962->27734 27965->27750 27966->27754 27967->27762 27968->27766 27970 e78cdd GetModuleHandleA 27969->27970 27971 e78cbc 27969->27971 27973 e78cec GetProcAddress 27970->27973 27975 e78cd5 27970->27975 27971->27970 27972 e78cc6 TlsGetValue 27971->27972 27974 e78cd1 27972->27974 27973->27975 27974->27970 27974->27975 27975->27769 27976->27776 27977->27789 27978->27780 27979->27782 27980->27784 27981->27777 27982->27789 27983->27792 27993 e7e2ea 27984->27993 27986 e7e427 27990 e7e446 27986->27990 28006 e7a553 60 API calls __getptd 27986->28006 27988 e7e43d 27988->27990 28007 e7a553 60 API calls __getptd 27988->28007 27990->27801 27991->27803 27992->27806 27994 e7e2f6 __lseeki64 27993->27994 27995 e7e30e 27994->27995 28005 e7e32d _memset 27994->28005 28008 e7a553 60 API calls __getptd 27995->28008 27997 e7e313 28009 e7a451 5 API calls ___ansicp 27997->28009 27999 e7e39f RtlAllocateHeap 27999->28005 28000 e7e323 __lseeki64 28000->27986 28005->27999 28005->28000 28010 e7db61 28005->28010 28017 e7ea09 5 API calls 2 library calls 28005->28017 28018 e7e3e6 LeaveCriticalSection _doexit 28005->28018 28019 e7b542 TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress __amsg_exit 28005->28019 28006->27988 28007->27990 28008->27997 28009->28000 28011 e7db76 28010->28011 28012 e7db89 EnterCriticalSection 28010->28012 28020 e7da99 28011->28020 28012->28005 28014 e7db7c 28014->28012 28049 e77ec6 60 API calls 2 library calls 28014->28049 28016 e7db88 28016->28012 28017->28005 28018->28005 28019->28005 28021 e7daa5 __lseeki64 28020->28021 28022 e7dab5 28021->28022 28023 e7dacd 28021->28023 28050 e7836a 60 API calls 2 library calls 28022->28050 28031 e7dadb __lseeki64 28023->28031 28055 e7b45f 28023->28055 28026 e7daba 28051 e781e0 60 API calls 3 library calls 28026->28051 28029 e7daed 28073 e7a553 60 API calls __getptd 28029->28073 28030 e7dafc 28034 e7db61 __setmbcp 60 API calls 28030->28034 28031->28014 28032 e7dac1 28052 e77f24 28032->28052 28037 e7db03 28034->28037 28038 e7db37 28037->28038 28039 e7db0b 28037->28039 28077 e7a5ab 60 API calls 6 library calls 28038->28077 28074 e7df24 60 API calls 5 library calls 28039->28074 28042 e7db3d 28078 e7db53 LeaveCriticalSection _doexit 28042->28078 28043 e7db16 28044 e7db28 28043->28044 28075 e7a5ab 60 API calls 6 library calls 28043->28075 28044->28042 28047 e7db22 28076 e7a553 60 API calls __getptd 28047->28076 28049->28016 28050->28026 28051->28032 28079 e77ef4 GetModuleHandleA 28052->28079 28056 e7b512 28055->28056 28065 e7b471 28055->28065 28089 e7b542 TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress __amsg_exit 28056->28089 28058 e7b518 28090 e7a553 60 API calls __getptd 28058->28090 28063 e7b4ce HeapAlloc 28063->28065 28064 e7b482 28064->28063 28064->28065 28066 e77f24 _fast_error_exit 3 API calls 28064->28066 28083 e7836a 60 API calls 2 library calls 28064->28083 28084 e781e0 60 API calls 3 library calls 28064->28084 28065->28064 28067 e7b4fe 28065->28067 28070 e7b503 28065->28070 28072 e7b50a 28065->28072 28085 e7b40b 60 API calls 4 library calls 28065->28085 28086 e7b542 TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress __amsg_exit 28065->28086 28066->28064 28087 e7a553 60 API calls __getptd 28067->28087 28088 e7a553 60 API calls __getptd 28070->28088 28072->28029 28072->28030 28073->28031 28074->28043 28075->28047 28076->28044 28077->28042 28078->28031 28080 e77f1d ExitProcess 28079->28080 28081 e77f08 GetProcAddress 28079->28081 28081->28080 28082 e77f18 28081->28082 28082->28080 28083->28064 28084->28064 28085->28065 28086->28065 28087->28070 28088->28072 28089->28058 28090->28072 28091->27830 28092->27831 28096 e786a9 28093->28096 28095 e7872d 28097 e7884d 28095->28097 28101 e7e2cd 70 API calls x_ismbbtype_l 28095->28101 28096->28095 28100 e7e2cd 70 API calls x_ismbbtype_l 28096->28100 28097->27839 28097->27841 28099->27834 28100->28096 28101->28095 28102->27848 28103->27853 28104->27853 28105->27849 28108 e7db9f 28106->28108 28107 e78ca4 ___crtInitCritSecAndSpinCount 4 API calls 28107->28108 28108->28107 28109 e7dbb7 28108->28109 28109->27858 28110->27860 28111->27860 31010 733f6975 183 API calls __calloc_impl 26516 6ce5f484 26517 6ce5f46b 26516->26517 26520 6ce5f43f __getstream 26517->26520 26528 6ce5f401 26517->26528 26529 6ce5f411 26528->26529 26530 6ce5f40c 26528->26530 26532 6ce62217 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 26530->26532 26532->26529 29181 6ce5e873 29312 6ce5b23f 29181->29312 29186 6ce56210 160 API calls 29187 6ce5e8c3 29186->29187 29350 6ce5ac14 29187->29350 29190 6ce5e8d4 29555 6ce593df 173 API calls ___ansicp 29190->29555 29191 6ce5e8ec RegOpenKeyExA 29193 6ce5e967 29191->29193 29194 6ce5e90a RegQueryValueExA 29191->29194 29556 6ce56391 167 API calls 3 library calls 29193->29556 29196 6ce5e944 29194->29196 29197 6ce5e957 RegCloseKey 29194->29197 29195 6ce5e8d9 29195->29191 29207 6ce5e8dd 29195->29207 29198 6ce56210 160 API calls 29196->29198 29197->29193 29199 6ce5e991 29197->29199 29201 6ce5e94f 29198->29201 29202 6ce56210 160 API calls 29199->29202 29201->29197 29205 6ce5e9ab 29202->29205 29203 6ce5ea51 29204 6ce5eceb 29203->29204 29206 6ce5eaa7 29203->29206 29203->29207 29208 6ce5edbb 29204->29208 29210 6ce5ed08 RegOpenKeyExA 29204->29210 29209 6ce5b5f6 197 API calls 29205->29209 29357 6ce572fc 29206->29357 29207->29203 29219 6ce585ae CharNextA 29207->29219 29211 6ce56210 160 API calls 29208->29211 29212 6ce5e9c2 29209->29212 29214 6ce5ed8d 29210->29214 29215 6ce5ed29 RegDeleteValueA 29210->29215 29216 6ce5ede0 29211->29216 29557 6ce58c66 29212->29557 29596 6ce56391 167 API calls 3 library calls 29214->29596 29220 6ce5ed6c 29215->29220 29221 6ce5ed3e 29215->29221 29520 6ce5b5f6 29216->29520 29230 6ce5ea99 29219->29230 29233 6ce56210 160 API calls 29220->29233 29231 6ce5ed7d RegCloseKey 29221->29231 29595 6ce56391 167 API calls 3 library calls 29221->29595 29224 6ce5eac0 29226 6ce5ebb1 29224->29226 29227 6ce5eac8 29224->29227 29225 6ce5ec69 29229 6ce591c4 294 API calls 29225->29229 29402 6ce5b4e4 29226->29402 29241 6ce5eafc 29227->29241 29375 6ce591c4 29227->29375 29243 6ce5ec7e 29229->29243 29590 6ce5a3ce 177 API calls ___ansicp 29230->29590 29231->29208 29231->29214 29234 6ce5ed67 29233->29234 29234->29231 29235 6ce5e9d7 29267 6ce56210 160 API calls 29235->29267 29236 6ce5eb47 29593 6ce5ab73 187 API calls ___ansicp 29236->29593 29237 6ce5eb2d 29592 6ce5aad4 187 API calls ___ansicp 29237->29592 29238 6ce5ea09 29588 6ce58484 187 API calls ___ansicp 29238->29588 29239 6ce5eb13 29591 6ce5aa25 187 API calls ___ansicp 29239->29591 29240 6ce5ea3a 29589 6ce5a978 187 API calls ___ansicp 29240->29589 29248 6ce5b5f6 197 API calls 29241->29248 29243->29241 29266 6ce591c4 294 API calls 29243->29266 29246 6ce5ee17 29253 6ce5ee54 29246->29253 29254 6ce5ee1e DestroyWindow 29246->29254 29248->29204 29252 6ce572fc 196 API calls 29252->29246 29547 6ce5a365 29253->29547 29258 6ce5ee4e 29254->29258 29259 6ce5ee29 GetLastError 29254->29259 29258->29253 29597 6ce56391 167 API calls 3 library calls 29259->29597 29262 6ce5eb18 29270 6ce5ea0e 29262->29270 29271 6ce5ea47 29262->29271 29263 6ce5ea3f 29263->29270 29263->29271 29264 6ce5eb32 29264->29270 29264->29271 29265 6ce5eb4c 29265->29270 29265->29271 29276 6ce5ec4c 29266->29276 29267->29203 29268 6ce5eaf2 29277 6ce56210 160 API calls 29268->29277 29269 6ce5eb9b 29594 6ce56391 167 API calls 3 library calls 29269->29594 29270->29235 29288 6ce56210 160 API calls 29271->29288 29273 6ce5ebdf 29281 6ce5ebf4 29273->29281 29424 6ce5cec8 29273->29424 29274 6ce5ebc9 29278 6ce56210 160 API calls 29274->29278 29276->29269 29283 6ce5eca1 29276->29283 29277->29241 29278->29241 29279 6ce5ee67 29285 6ce585ae CharNextA 29279->29285 29280 6ce5eecf 29292 6ce56be5 97 API calls 29280->29292 29281->29241 29514 6ce59ca1 29281->29514 29289 6ce56210 160 API calls 29283->29289 29290 6ce5ee73 29285->29290 29288->29203 29289->29241 29598 6ce5a5d2 184 API calls 2 library calls 29290->29598 29294 6ce5ef04 29292->29294 29305 6ce5ef20 29294->29305 29600 6ce5d3b0 180 API calls ___ansicp 29294->29600 29295 6ce5ee84 29297 6ce5eeaf 29295->29297 29298 6ce5ee88 29295->29298 29296 6ce591c4 294 API calls 29299 6ce5ec2f 29296->29299 29299->29241 29304 6ce591c4 294 API calls 29299->29304 29304->29276 29306 6ce56210 160 API calls 29305->29306 29307 6ce5f00f 29306->29307 29313 6ce56c43 167 API calls 29312->29313 29314 6ce5b278 29313->29314 29315 6ce5b2a1 FindFirstFileA 29314->29315 29316 6ce5b27c 29314->29316 29318 6ce5b2e3 FindClose 29315->29318 29319 6ce5b2ba GetLastError 29315->29319 29651 6ce56391 167 API calls 3 library calls 29316->29651 29320 6ce5b48b 29318->29320 29335 6ce5b2fb _strnlen 29318->29335 29652 6ce56391 167 API calls 3 library calls 29319->29652 29602 6ce5fc12 29320->29602 29323 6ce5fc92 61 API calls 29323->29335 29324 6ce5fc2e ___ansicp 4 API calls 29326 6ce5b4dd 29324->29326 29343 6ce56210 29326->29343 29327 6ce5b299 29327->29324 29328 6ce5b42f 29655 6ce56391 167 API calls 3 library calls 29328->29655 29330 6ce5b4b2 29638 6ce5f7d4 29330->29638 29334 6ce5f7d4 __fcloseall 100 API calls 29334->29335 29335->29320 29335->29323 29335->29328 29335->29334 29336 6ce5fc12 151 API calls 29335->29336 29341 6ce5b3c6 29335->29341 29653 6ce60d4a 75 API calls __fread_nolock 29335->29653 29336->29335 29338 6ce5f7d4 __fcloseall 100 API calls 29339 6ce5b3e3 FindFirstFileA 29338->29339 29339->29320 29340 6ce5b403 FindClose 29339->29340 29340->29341 29341->29335 29341->29338 29342 6ce5b42d 29341->29342 29654 6ce60a5d 97 API calls 3 library calls 29341->29654 29342->29320 30358 6ce56028 29343->30358 29348 6ce5fc2e ___ansicp 4 API calls 29349 6ce56254 29348->29349 29349->29186 29351 6ce571e9 183 API calls 29350->29351 29352 6ce5ac19 29351->29352 29353 6ce570ae 188 API calls 29352->29353 29356 6ce5ac2b 29352->29356 29354 6ce5ac22 29353->29354 29355 6ce57157 186 API calls 29354->29355 29354->29356 29355->29356 29356->29190 29356->29191 29358 6ce571e9 183 API calls 29357->29358 29359 6ce5731a 29358->29359 29366 6ce573ff 29359->29366 30432 6ce57269 29359->30432 29361 6ce5fc2e ___ansicp 4 API calls 29363 6ce57412 29361->29363 29363->29224 29363->29225 29364 6ce573bc 29364->29366 29367 6ce569f7 175 API calls 29364->29367 29365 6ce57338 29365->29366 30440 6ce569f7 29365->30440 29366->29361 29373 6ce57398 29367->29373 29370 6ce57351 LoadStringA 29371 6ce57377 GetLastError 29370->29371 29370->29373 30459 6ce56391 167 API calls 3 library calls 29371->30459 29373->29366 30452 6ce56b07 29373->30452 29376 6ce591f0 29375->29376 29377 6ce5921c 29376->29377 29378 6ce5cec8 232 API calls 29376->29378 29401 6ce591f5 29376->29401 29380 6ce59395 29377->29380 29381 6ce59253 29377->29381 29377->29401 29378->29377 29379 6ce5fc2e ___ansicp 4 API calls 29382 6ce593d6 29379->29382 30545 6ce56391 167 API calls 3 library calls 29380->30545 29384 6ce585ae CharNextA 29381->29384 29382->29268 29382->29269 29385 6ce5926d 29384->29385 29386 6ce585ae CharNextA 29385->29386 29387 6ce59279 29386->29387 30465 6ce58ee0 29387->30465 29390 6ce5934b GetLastError 29391 6ce59357 29390->29391 29390->29401 30544 6ce56391 167 API calls 3 library calls 29391->30544 29393 6ce592a6 30531 6ce58e56 29393->30531 29394 6ce59290 29394->29393 29395 6ce5b5f6 197 API calls 29394->29395 29395->29393 29401->29379 29403 6ce5b507 GetVersionExA 29402->29403 29418 6ce5b54a 29402->29418 29404 6ce5b527 29403->29404 29405 6ce5b552 29403->29405 29404->29405 29407 6ce5b540 29404->29407 29409 6ce5fc92 61 API calls 29405->29409 29406 6ce5fc2e ___ansicp 4 API calls 29408 6ce5b5ef 29406->29408 29410 6ce56210 160 API calls 29407->29410 29408->29241 29408->29273 29408->29274 29411 6ce5b55d 29409->29411 29410->29418 29412 6ce5b569 29411->29412 30694 6ce5a211 173 API calls 29411->30694 29414 6ce5b5bc 29412->29414 29415 6ce5b578 GetNativeSystemInfo 29412->29415 30695 6ce56391 167 API calls 3 library calls 29414->30695 29417 6ce585e5 169 API calls 29415->29417 29419 6ce5b58c 29417->29419 29418->29406 29420 6ce5b5ad 29419->29420 29421 6ce5b59d 29419->29421 29423 6ce56210 160 API calls 29420->29423 29422 6ce56210 160 API calls 29421->29422 29422->29418 29423->29418 29425 6ce5cf00 29424->29425 29426 6ce57269 183 API calls 29425->29426 29427 6ce5cf05 29426->29427 29428 6ce5cf40 29427->29428 30733 6ce5ac39 174 API calls 2 library calls 29427->30733 29429 6ce5cf5d GetModuleHandleA 29428->29429 29434 6ce5cf4d 29428->29434 30696 6ce59a79 GetModuleFileNameA 29429->30696 29432 6ce5cf16 29432->29428 29433 6ce5cf1a 29432->29433 30734 6ce56391 167 API calls 3 library calls 29433->30734 29436 6ce5cf35 29434->29436 29437 6ce585ae CharNextA 29434->29437 29439 6ce5fc2e ___ansicp 4 API calls 29436->29439 29438 6ce5cf80 29437->29438 29440 6ce5a078 CharNextA 29438->29440 29441 6ce5d3a7 29439->29441 29442 6ce5cf87 29440->29442 29441->29281 29443 6ce5cf8b 29442->29443 30706 6ce5a303 29442->30706 30738 6ce56391 167 API calls 3 library calls 29443->30738 29515 6ce59cbc 29514->29515 29516 6ce59cac 29514->29516 29515->29241 29515->29296 30745 6ce599e4 29516->30745 29519 6ce56210 160 API calls 29519->29515 29521 6ce5b63d 29520->29521 29522 6ce5b642 29521->29522 29523 6ce5b64a 29521->29523 30836 6ce5b8f8 197 API calls _strrchr 29522->30836 30811 6ce59d7d 29523->30811 29529 6ce5b6f1 29531 6ce5b6da 29529->29531 29534 6ce5b792 29529->29534 29535 6ce5b708 29529->29535 29530 6ce5b68f 29530->29531 29532 6ce5b69f SetFocus 29530->29532 29533 6ce5fc2e ___ansicp 4 API calls 29531->29533 29532->29531 29536 6ce5b6aa GetLastError 29532->29536 29538 6ce5b6ed 29533->29538 30838 6ce59cd8 169 API calls 29534->30838 29539 6ce5b735 29535->29539 29540 6ce5b70d CreateDialogParamA 29535->29540 29536->29531 29541 6ce5b6b4 29536->29541 29538->29246 29538->29252 29543 6ce5b73c GetLastError 29539->29543 29544 6ce5b758 SetDlgItemTextA 29539->29544 29540->29539 29541->29531 30837 6ce56391 167 API calls 3 library calls 29541->30837 29542 6ce5b7aa MessageBoxA 29542->29531 29543->29541 29544->29531 29545 6ce5b772 GetLastError 29544->29545 29545->29541 29548 6ce5a3b6 29547->29548 29549 6ce5a381 29547->29549 29550 6ce5fc2e ___ansicp 4 API calls 29548->29550 29549->29548 29552 6ce585ae CharNextA 29549->29552 29551 6ce5a3c5 29550->29551 29551->29279 29551->29280 29553 6ce5a3aa 29552->29553 30842 6ce59f49 GetFileAttributesA 29553->30842 29555->29195 29556->29199 29558 6ce57269 183 API calls 29557->29558 29559 6ce58c71 29558->29559 29566 6ce58c75 29559->29566 30858 6ce58be6 29559->30858 29563 6ce58d1d 29563->29203 29563->29235 29563->29236 29563->29237 29563->29238 29563->29239 29563->29240 29564 6ce571e9 183 API calls 29565 6ce58c92 29564->29565 29565->29566 29567 6ce570ae 188 API calls 29565->29567 29566->29563 30901 6ce5874e 29566->30901 29568 6ce58ca0 29567->29568 29569 6ce58ca4 29568->29569 29570 6ce58cb7 29568->29570 30912 6ce5895f 187 API calls ___ansicp 29569->30912 30866 6ce588b4 29570->30866 29574 6ce58ca9 29574->29563 29574->29566 29575 6ce58cc0 30913 6ce58a07 187 API calls ___ansicp 29575->30913 29576 6ce58cd3 29578 6ce57157 186 API calls 29576->29578 29579 6ce58cd8 29578->29579 29579->29566 30880 6ce58ab1 29579->30880 29588->29270 29589->29263 29590->29206 29591->29262 29592->29264 29593->29265 29594->29241 29595->29234 29596->29208 29597->29258 29598->29295 29600->29305 29656 6ce5fb39 29602->29656 29604 6ce5b49f 29604->29327 29605 6ce5f855 29604->29605 29608 6ce5f861 __getstream 29605->29608 29606 6ce5f86f 30197 6ce633d9 61 API calls __getptd 29606->30197 29608->29606 29610 6ce5f935 29608->29610 30199 6ce635e0 29608->30199 29609 6ce5f874 30198 6ce632d7 5 API calls ___ansicp 29609->30198 30177 6ce638cd 29610->30177 29614 6ce5f8d5 29614->29606 29621 6ce635e0 __fileno 61 API calls 29614->29621 29616 6ce635e0 __fileno 61 API calls 29618 6ce5f8b9 29616->29618 29617 6ce5f94d 30183 6ce6399b 29617->30183 29618->29614 29624 6ce635e0 __fileno 61 API calls 29618->29624 29619 6ce5f884 __getstream 29619->29330 29625 6ce5f8f2 29621->29625 29627 6ce5f8c5 29624->29627 29628 6ce635e0 __fileno 61 API calls 29625->29628 29637 6ce5f91a 29625->29637 29630 6ce635e0 __fileno 61 API calls 29627->29630 29631 6ce5f8fe 29628->29631 29630->29614 29634 6ce635e0 __fileno 61 API calls 29631->29634 29631->29637 29632 6ce5f971 30206 6ce5f995 LeaveCriticalSection LeaveCriticalSection __fcloseall 29632->30206 29635 6ce5f90a 29634->29635 29636 6ce635e0 __fileno 61 API calls 29635->29636 29636->29637 29637->29606 29637->29610 29639 6ce5f7e0 __getstream 29638->29639 29640 6ce5f7f4 29639->29640 29641 6ce5f811 29639->29641 30300 6ce633d9 61 API calls __getptd 29640->30300 29643 6ce638cd __fread_nolock 62 API calls 29641->29643 29647 6ce5f809 __getstream 29641->29647 29645 6ce5f829 29643->29645 29644 6ce5f7f9 30301 6ce632d7 5 API calls ___ansicp 29644->30301 30284 6ce5f758 29645->30284 29647->29327 29651->29327 29652->29327 29653->29335 29654->29341 29655->29320 29657 6ce5fb45 __getstream 29656->29657 29658 6ce5fb58 29657->29658 29659 6ce5fb6a 29657->29659 29720 6ce633d9 61 API calls __getptd 29658->29720 29661 6ce5fb78 29659->29661 29663 6ce5fb9d 29659->29663 29721 6ce633d9 61 API calls __getptd 29661->29721 29678 6ce63d12 29663->29678 29665 6ce5fb7d 29722 6ce632d7 5 API calls ___ansicp 29665->29722 29666 6ce5fba2 29668 6ce5fbb6 29666->29668 29669 6ce5fba9 29666->29669 29672 6ce5fbdd 29668->29672 29673 6ce5fbbd 29668->29673 29723 6ce633d9 61 API calls __getptd 29669->29723 29670 6ce5fb5d @_EH4_CallFilterFunc@8 __getstream 29670->29604 29698 6ce63a6b 29672->29698 29724 6ce633d9 61 API calls __getptd 29673->29724 29679 6ce63d1e __getstream 29678->29679 29680 6ce64a24 __getstream 61 API calls 29679->29680 29692 6ce63d2c 29680->29692 29681 6ce63d99 29726 6ce63e2f 29681->29726 29682 6ce63d9d 29684 6ce640d3 __getstream 61 API calls 29682->29684 29686 6ce63da7 29684->29686 29685 6ce63e24 __getstream 29685->29666 29686->29681 29687 6ce63dbc 29686->29687 29731 6ce680a8 61 API calls 4 library calls 29687->29731 29688 6ce6495c __mtinitlocknum 61 API calls 29688->29692 29691 6ce63dcc 29693 6ce63dd7 29691->29693 29694 6ce63dea EnterCriticalSection 29691->29694 29692->29681 29692->29682 29692->29688 29729 6ce63907 62 API calls __getstream 29692->29729 29730 6ce6396e LeaveCriticalSection LeaveCriticalSection _doexit 29692->29730 29732 6ce6037b 61 API calls 4 library calls 29693->29732 29694->29681 29697 6ce63ddf 29697->29681 29699 6ce63a8d 29698->29699 29700 6ce63aa1 29699->29700 29710 6ce63ac0 29699->29710 29737 6ce633d9 61 API calls __getptd 29700->29737 29702 6ce63aa6 29738 6ce632d7 5 API calls ___ansicp 29702->29738 29704 6ce63cc6 29734 6ce69402 29704->29734 29705 6ce63cac 29743 6ce633d9 61 API calls __getptd 29705->29743 29708 6ce63cb1 29744 6ce632d7 5 API calls ___ansicp 29708->29744 29709 6ce5fbe8 29725 6ce5fc03 LeaveCriticalSection LeaveCriticalSection __fcloseall 29709->29725 29710->29705 29719 6ce63c5c 29710->29719 29739 6ce697d4 71 API calls __fassign 29710->29739 29713 6ce63c41 29713->29705 29740 6ce69648 96 API calls 29713->29740 29715 6ce63c56 29715->29719 29741 6ce69648 96 API calls 29715->29741 29717 6ce63c73 29717->29719 29742 6ce69648 96 API calls 29717->29742 29719->29704 29719->29705 29720->29670 29721->29665 29722->29670 29723->29670 29724->29670 29725->29670 29733 6ce64940 LeaveCriticalSection 29726->29733 29728 6ce63e36 29728->29685 29729->29692 29730->29692 29731->29691 29732->29697 29733->29728 29745 6ce69345 29734->29745 29736 6ce6941d 29736->29709 29737->29702 29738->29709 29739->29713 29740->29715 29741->29717 29742->29719 29743->29708 29744->29709 29748 6ce69351 __getstream 29745->29748 29746 6ce6935d 29832 6ce633d9 61 API calls __getptd 29746->29832 29748->29746 29749 6ce6938e 29748->29749 29756 6ce68cf7 29749->29756 29750 6ce69362 29833 6ce632d7 5 API calls ___ansicp 29750->29833 29755 6ce69371 __getstream 29755->29736 29757 6ce68d22 29756->29757 29835 6ce6aedb 29757->29835 29763 6ce68d4d 29841 6ce60f9d 29763->29841 29765 6ce68d9e 29952 6ce633f1 61 API calls __getptd 29765->29952 29767 6ce68da3 29953 6ce633d9 61 API calls __getptd 29767->29953 29768 6ce68d68 29768->29765 29772 6ce68e4c 29768->29772 29770 6ce68dad 29954 6ce632d7 5 API calls ___ansicp 29770->29954 29847 6ce689c4 29772->29847 29774 6ce68ef2 29775 6ce68f10 CreateFileA 29774->29775 29776 6ce68ef9 29774->29776 29777 6ce68f6c GetFileType 29775->29777 29778 6ce68f38 29775->29778 29955 6ce633f1 61 API calls __getptd 29776->29955 29781 6ce68f77 CloseHandle 29777->29781 29782 6ce68f9b 29777->29782 29780 6ce68f53 GetLastError 29778->29780 29957 6ce63409 61 API calls 3 library calls 29780->29957 29781->29780 29866 6ce6874a 29782->29866 29783 6ce68efe 29956 6ce633d9 61 API calls __getptd 29783->29956 29789 6ce68fbe CloseHandle 29790 6ce68dbc 29789->29790 29834 6ce693cf LeaveCriticalSection __locking 29790->29834 29791 6ce68fcd 29791->29790 29797 6ce6903f 29791->29797 29875 6ce6ada2 29791->29875 29797->29790 29806 6ce6913b 29797->29806 29807 6ce691ca 29797->29807 29829 6ce69047 29797->29829 29801 6ce6917f 29804 6ce672de __locking 71 API calls 29801->29804 29801->29829 29818 6ce6919a 29804->29818 29806->29790 29806->29801 29814 6ce691df 29806->29814 29976 6ce68251 29806->29976 29807->29790 29811 6ce68251 __lseeki64 63 API calls 29807->29811 29807->29814 29809 6ce68f08 29958 6ce633d9 61 API calls __getptd 29809->29958 29812 6ce6921b 29811->29812 29812->29814 29816 6ce69222 29812->29816 29814->29790 29814->29829 29987 6ce670d3 29814->29987 29818->29790 29818->29829 29829->29790 29960 6ce63431 29829->29960 29832->29750 29833->29755 29834->29755 29836 6ce68d3e 29835->29836 29837 6ce6aeea 29835->29837 29836->29763 29950 6ce632d7 5 API calls ___ansicp 29836->29950 30012 6ce633d9 61 API calls __getptd 29837->30012 29839 6ce6aeef 30013 6ce632d7 5 API calls ___ansicp 29839->30013 29842 6ce60fac 29841->29842 29843 6ce60fc1 29842->29843 30014 6ce633d9 61 API calls __getptd 29842->30014 29843->29768 29951 6ce632d7 5 API calls ___ansicp 29843->29951 29845 6ce60fb1 30015 6ce632d7 5 API calls ___ansicp 29845->30015 29848 6ce689d0 __getstream 29847->29848 29849 6ce6495c __mtinitlocknum 61 API calls 29848->29849 29850 6ce689e0 29849->29850 29851 6ce64a24 __getstream 61 API calls 29850->29851 29852 6ce689e5 __getstream 29850->29852 29861 6ce689f4 29851->29861 29852->29774 29853 6ce68b41 30030 6ce68b5f LeaveCriticalSection _doexit 29853->30030 29854 6ce68ad3 29856 6ce61911 ___crtGetStringTypeA 61 API calls 29854->29856 29859 6ce68adc 29856->29859 29857 6ce64a24 __getstream 61 API calls 29857->29861 29858 6ce68a76 EnterCriticalSection 29860 6ce68a86 LeaveCriticalSection 29858->29860 29858->29861 29859->29853 30018 6ce688f2 29859->30018 29860->29861 29861->29853 29861->29854 29861->29857 29861->29858 29862 6ce68a4a 29861->29862 30017 6ce68a98 LeaveCriticalSection _doexit 29861->30017 29862->29861 30016 6ce680a8 61 API calls 4 library calls 29862->30016 29867 6ce687b1 29866->29867 29868 6ce68758 29866->29868 30033 6ce633d9 61 API calls __getptd 29867->30033 29868->29867 29873 6ce6877c 29868->29873 29870 6ce687b6 30034 6ce633f1 61 API calls __getptd 29870->30034 29872 6ce687a7 29872->29789 29872->29791 29873->29872 29874 6ce687a1 SetStdHandle 29873->29874 29874->29872 30035 6ce6885b 29875->30035 29950->29763 29951->29768 29952->29767 29953->29770 29954->29790 29955->29783 29956->29809 29957->29809 29958->29790 29961 6ce6885b __lseeki64 61 API calls 29960->29961 29962 6ce63441 29961->29962 29977 6ce6885b __lseeki64 61 API calls 29976->29977 29978 6ce6826f 29977->29978 29988 6ce670df __getstream 29987->29988 30012->29839 30013->29836 30014->29845 30015->29843 30016->29862 30017->29861 30019 6ce688fe __getstream 30018->30019 30020 6ce6895b 30019->30020 30023 6ce64a24 __getstream 61 API calls 30019->30023 30021 6ce68961 EnterCriticalSection 30020->30021 30022 6ce6897e __getstream 30020->30022 30021->30022 30022->29853 30024 6ce68929 30023->30024 30025 6ce68934 30024->30025 30026 6ce6894f 30024->30026 30031 6ce680a8 61 API calls 4 library calls 30025->30031 30032 6ce6898a LeaveCriticalSection _doexit 30026->30032 30029 6ce68942 30029->30026 30030->29852 30031->30029 30032->30020 30033->29870 30034->29872 30036 6ce68878 30035->30036 30037 6ce68868 30035->30037 30038 6ce68887 30036->30038 30039 6ce6887d 30036->30039 30056 6ce633d9 61 API calls __getptd 30037->30056 30042 6ce688d5 30038->30042 30045 6ce68896 30038->30045 30057 6ce633f1 61 API calls __getptd 30039->30057 30043 6ce6886d 30056->30043 30057->30037 30178 6ce638f6 EnterCriticalSection 30177->30178 30179 6ce638de 30177->30179 30178->29617 30179->30178 30180 6ce638e5 30179->30180 30181 6ce64a24 __getstream 61 API calls 30180->30181 30182 6ce638f3 30181->30182 30182->29617 30184 6ce635e0 __fileno 61 API calls 30183->30184 30185 6ce639aa 30184->30185 30186 6ce6844d __locking 61 API calls 30185->30186 30188 6ce639b0 30186->30188 30187 6ce5f957 30190 6ce6093c 30187->30190 30188->30187 30189 6ce640d3 __getstream 61 API calls 30188->30189 30189->30187 30191 6ce6095e _realloc 30190->30191 30195 6ce5f967 30190->30195 30194 6ce635e0 __fileno 61 API calls 30191->30194 30191->30195 30196 6ce670d3 __locking 95 API calls 30191->30196 30207 6ce624a1 30191->30207 30228 6ce6364d 30191->30228 30194->30191 30205 6ce63a33 95 API calls __fclose_nolock 30195->30205 30196->30191 30197->29609 30198->29619 30200 6ce635ef 30199->30200 30201 6ce5f8ad 30199->30201 30282 6ce633d9 61 API calls __getptd 30200->30282 30201->29614 30201->29616 30203 6ce635f4 30283 6ce632d7 5 API calls ___ansicp 30203->30283 30205->29632 30206->29619 30208 6ce635e0 __fileno 61 API calls 30207->30208 30209 6ce624b0 30208->30209 30210 6ce624d2 30209->30210 30211 6ce624bb 30209->30211 30213 6ce624d6 30210->30213 30218 6ce624e3 30210->30218 30269 6ce633d9 61 API calls __getptd 30211->30269 30270 6ce633d9 61 API calls __getptd 30213->30270 30215 6ce62534 30216 6ce6253e 30215->30216 30217 6ce625bd 30215->30217 30222 6ce62555 30216->30222 30226 6ce62571 30216->30226 30221 6ce670d3 __locking 95 API calls 30217->30221 30218->30215 30219 6ce62529 30218->30219 30220 6ce6844d __locking 61 API calls 30218->30220 30225 6ce624c0 30218->30225 30219->30215 30234 6ce683f9 30219->30234 30220->30219 30221->30225 30224 6ce670d3 __locking 95 API calls 30222->30224 30224->30225 30225->30191 30226->30225 30237 6ce682db 30226->30237 30229 6ce63666 30228->30229 30233 6ce63687 30228->30233 30230 6ce635e0 __fileno 61 API calls 30229->30230 30229->30233 30231 6ce63680 30230->30231 30232 6ce670d3 __locking 95 API calls 30231->30232 30232->30233 30233->30191 30235 6ce61911 ___crtGetStringTypeA 61 API calls 30234->30235 30236 6ce68410 30235->30236 30236->30215 30238 6ce682e7 __getstream 30237->30238 30239 6ce68314 30238->30239 30240 6ce682f8 30238->30240 30242 6ce68322 30239->30242 30244 6ce68343 30239->30244 30271 6ce633f1 61 API calls __getptd 30240->30271 30273 6ce633f1 61 API calls __getptd 30242->30273 30243 6ce682fd 30272 6ce633d9 61 API calls __getptd 30243->30272 30246 6ce68363 30244->30246 30247 6ce68389 30244->30247 30276 6ce633f1 61 API calls __getptd 30246->30276 30251 6ce688f2 __locking 62 API calls 30247->30251 30249 6ce68327 30274 6ce633d9 61 API calls __getptd 30249->30274 30254 6ce6838f 30251->30254 30253 6ce68368 30277 6ce633d9 61 API calls __getptd 30253->30277 30258 6ce6839c 30254->30258 30259 6ce683b8 30254->30259 30255 6ce6832e 30275 6ce632d7 5 API calls ___ansicp 30255->30275 30263 6ce68251 __lseeki64 63 API calls 30258->30263 30279 6ce633d9 61 API calls __getptd 30259->30279 30261 6ce6836f 30278 6ce632d7 5 API calls ___ansicp 30261->30278 30262 6ce68305 __getstream 30262->30225 30266 6ce683ad 30263->30266 30264 6ce683bd 30280 6ce633f1 61 API calls __getptd 30264->30280 30281 6ce683ea LeaveCriticalSection __locking 30266->30281 30269->30225 30270->30225 30271->30243 30272->30262 30273->30249 30274->30255 30275->30262 30276->30253 30277->30261 30278->30262 30279->30264 30280->30266 30281->30262 30282->30203 30283->30201 30285 6ce5f76c 30284->30285 30288 6ce5f788 30284->30288 30342 6ce633d9 61 API calls __getptd 30285->30342 30287 6ce5f781 30302 6ce5f848 LeaveCriticalSection LeaveCriticalSection __fcloseall 30287->30302 30288->30287 30290 6ce6364d __fclose_nolock 95 API calls 30288->30290 30289 6ce5f771 30343 6ce632d7 5 API calls ___ansicp 30289->30343 30292 6ce5f794 30290->30292 30303 6ce63617 30292->30303 30295 6ce635e0 __fileno 61 API calls 30296 6ce5f7a2 30295->30296 30307 6ce634cf 30296->30307 30298 6ce5f7a8 30298->30287 30344 6ce6037b 61 API calls 4 library calls 30298->30344 30300->29644 30301->29647 30302->29647 30304 6ce63627 30303->30304 30305 6ce5f79c 30303->30305 30304->30305 30345 6ce6037b 61 API calls 4 library calls 30304->30345 30305->30295 30308 6ce634db __getstream 30307->30308 30309 6ce634e5 30308->30309 30310 6ce634ff 30308->30310 30346 6ce633d9 61 API calls __getptd 30309->30346 30311 6ce63504 30310->30311 30312 6ce63519 30310->30312 30348 6ce633f1 61 API calls __getptd 30311->30348 30316 6ce63527 30312->30316 30319 6ce63548 30312->30319 30314 6ce634ea 30347 6ce633f1 61 API calls __getptd 30314->30347 30350 6ce633f1 61 API calls __getptd 30316->30350 30318 6ce63509 30349 6ce633d9 61 API calls __getptd 30318->30349 30321 6ce6358c 30319->30321 30322 6ce63568 30319->30322 30326 6ce688f2 __locking 62 API calls 30321->30326 30353 6ce633f1 61 API calls __getptd 30322->30353 30324 6ce6352c 30351 6ce633d9 61 API calls __getptd 30324->30351 30330 6ce63592 30326->30330 30328 6ce63533 30352 6ce632d7 5 API calls ___ansicp 30328->30352 30329 6ce6356d 30354 6ce633d9 61 API calls __getptd 30329->30354 30333 6ce6359f 30330->30333 30334 6ce635ad 30330->30334 30338 6ce63431 __fclose_nolock 64 API calls 30333->30338 30356 6ce633d9 61 API calls __getptd 30334->30356 30335 6ce634f5 __getstream 30335->30298 30337 6ce63574 30355 6ce632d7 5 API calls ___ansicp 30337->30355 30339 6ce635a7 30338->30339 30357 6ce635d1 LeaveCriticalSection __locking 30339->30357 30342->30289 30343->30287 30344->30287 30345->30305 30346->30314 30347->30335 30348->30318 30349->30335 30350->30324 30351->30328 30352->30335 30353->30329 30354->30337 30355->30335 30356->30339 30357->30335 30359 6ce56034 30358->30359 30361 6ce5605a 30359->30361 30392 6ce55f75 97 API calls _vswprintf_s 30359->30392 30362 6ce5609f 30361->30362 30363 6ce5615f 30362->30363 30364 6ce560c8 GetWindowsDirectoryA 30362->30364 30365 6ce5fc12 151 API calls 30363->30365 30367 6ce560df OutputDebugStringA 30363->30367 30366 6ce560ef 30364->30366 30364->30367 30370 6ce56171 30365->30370 30393 6ce56064 30366->30393 30391 6ce561fa 30367->30391 30370->30367 30372 6ce56183 30370->30372 30397 6ce5fb18 30372->30397 30373 6ce5fc2e ___ansicp 4 API calls 30376 6ce56209 30373->30376 30375 6ce5611b CreateDirectoryA 30378 6ce56142 30375->30378 30379 6ce5612e GetLastError 30375->30379 30376->29348 30381 6ce56064 97 API calls 30378->30381 30379->30367 30379->30378 30381->30363 30383 6ce561c4 30386 6ce56064 97 API calls 30383->30386 30384 6ce5619e 30385 6ce56064 97 API calls 30384->30385 30387 6ce561bf 30385->30387 30386->30387 30388 6ce5f855 97 API calls 30387->30388 30389 6ce561f4 30388->30389 30390 6ce5f7d4 __fcloseall 100 API calls 30389->30390 30390->30391 30391->30373 30392->30361 30394 6ce56070 30393->30394 30395 6ce56097 30394->30395 30403 6ce55f75 97 API calls _vswprintf_s 30394->30403 30395->30367 30395->30375 30404 6ce5fa69 30397->30404 30400 6ce5fa48 30418 6ce5f9a2 30400->30418 30403->30395 30405 6ce5faf6 30404->30405 30406 6ce5fa7c 30404->30406 30416 6ce633d9 61 API calls __getptd 30405->30416 30406->30405 30408 6ce5fa81 30406->30408 30409 6ce5fa92 GetLocalTime 30408->30409 30410 6ce5fa89 30408->30410 30414 6ce5618c 30409->30414 30415 6ce633d9 61 API calls __getptd 30410->30415 30411 6ce5fa8e 30417 6ce632d7 5 API calls ___ansicp 30411->30417 30414->30400 30415->30411 30416->30411 30417->30414 30419 6ce5f9b5 30418->30419 30420 6ce5fa26 30418->30420 30419->30420 30421 6ce5f9ba 30419->30421 30430 6ce633d9 61 API calls __getptd 30420->30430 30423 6ce5f9c3 30421->30423 30424 6ce5f9cc GetLocalTime 30421->30424 30429 6ce633d9 61 API calls __getptd 30423->30429 30428 6ce56195 30424->30428 30427 6ce5f9c8 30431 6ce632d7 5 API calls ___ansicp 30427->30431 30428->30383 30428->30384 30429->30427 30430->30427 30431->30428 30433 6ce57293 GetVersionExA 30432->30433 30434 6ce57288 30432->30434 30437 6ce572b3 30433->30437 30439 6ce572dd 30433->30439 30435 6ce5fc2e ___ansicp 4 API calls 30434->30435 30436 6ce572f5 30435->30436 30436->29364 30436->29365 30436->29366 30437->30439 30460 6ce57089 182 API calls 30437->30460 30439->30434 30441 6ce56a13 LoadLibraryA 30440->30441 30448 6ce56a0b 30440->30448 30442 6ce56ad4 GetLastError 30441->30442 30443 6ce56a2e GetProcAddress GetProcAddress GetProcAddress 30441->30443 30463 6ce56391 167 API calls 3 library calls 30442->30463 30445 6ce56a67 30443->30445 30446 6ce56a7c GetLastError 30443->30446 30445->30446 30445->30448 30461 6ce56391 167 API calls 3 library calls 30446->30461 30448->29366 30448->29370 30449 6ce56aa3 FreeLibrary 30449->30448 30450 6ce56ab6 GetLastError 30449->30450 30462 6ce56391 167 API calls 3 library calls 30450->30462 30453 6ce56b10 FreeLibrary 30452->30453 30454 6ce56b42 30452->30454 30453->30454 30455 6ce56b1b GetLastError 30453->30455 30454->29366 30455->30454 30456 6ce56b25 30455->30456 30464 6ce56391 167 API calls 3 library calls 30456->30464 30458 6ce56b3e 30458->29366 30459->29373 30460->30439 30461->30449 30462->30448 30463->30448 30464->30458 30466 6ce58f13 30465->30466 30467 6ce58f2d 30465->30467 30468 6ce5cec8 232 API calls 30466->30468 30469 6ce56cec 169 API calls 30467->30469 30470 6ce58f1a 30468->30470 30471 6ce58f46 30469->30471 30470->30467 30472 6ce58f1e SetLastError 30470->30472 30473 6ce58f4e 30471->30473 30474 6ce5913b 30471->30474 30475 6ce59170 30472->30475 30476 6ce56cec 169 API calls 30473->30476 30477 6ce56210 160 API calls 30474->30477 30478 6ce5fc2e ___ansicp 4 API calls 30475->30478 30479 6ce58f55 30476->30479 30480 6ce59147 30477->30480 30481 6ce591bb 30478->30481 30482 6ce590c8 30479->30482 30484 6ce56cec 169 API calls 30479->30484 30483 6ce5fc92 61 API calls 30480->30483 30481->29390 30481->29394 30485 6ce56210 160 API calls 30482->30485 30494 6ce590de 30483->30494 30487 6ce58f69 30484->30487 30488 6ce590d4 30485->30488 30486 6ce59160 30486->30475 30628 6ce56391 167 API calls 3 library calls 30486->30628 30490 6ce58f90 30487->30490 30491 6ce56cec 169 API calls 30487->30491 30489 6ce5fc92 61 API calls 30488->30489 30489->30494 30495 6ce56c43 167 API calls 30490->30495 30493 6ce58f7a 30491->30493 30493->30490 30497 6ce58f7e 30493->30497 30494->30486 30596 6ce58d2e 30494->30596 30498 6ce58fa7 30495->30498 30500 6ce56210 160 API calls 30497->30500 30501 6ce58fad 30498->30501 30502 6ce58fdf 30498->30502 30499 6ce5918f 30505 6ce585e5 169 API calls 30499->30505 30526 6ce58f88 30499->30526 30500->30526 30505->30526 30532 6ce58c66 205 API calls 30531->30532 30533 6ce58e5e 30532->30533 30544->29401 30545->29401 30597 6ce56c43 167 API calls 30596->30597 30598 6ce58d62 30597->30598 30599 6ce58d76 30598->30599 30600 6ce58d66 30598->30600 30628->30499 30694->29412 30695->29418 30697 6ce59ad6 GetShortPathNameA 30696->30697 30698 6ce59aae GetLastError 30696->30698 30701 6ce59aec _strnlen 30697->30701 30699 6ce59ac5 30698->30699 30742 6ce56391 167 API calls 3 library calls 30699->30742 30702 6ce59acf _strnlen 30701->30702 30703 6ce59afe GetLastError 30701->30703 30704 6ce5fc2e ___ansicp 4 API calls 30702->30704 30703->30699 30705 6ce59b5a 30704->30705 30705->29434 30707 6ce56b4f 30706->30707 30708 6ce5a32c CharLowerA 30707->30708 30709 6ce5a34a 30708->30709 30710 6ce5fc2e ___ansicp 4 API calls 30709->30710 30711 6ce5a35c 30710->30711 30733->29432 30734->29436 30738->29436 30742->30702 30746 6ce59a04 30745->30746 30748 6ce599f9 30745->30748 30749 6ce595fd LoadLibraryA 30746->30749 30748->29515 30748->29519 30750 6ce59640 GetProcAddress 30749->30750 30751 6ce5997a GetLastError 30749->30751 30752 6ce5965d 30750->30752 30753 6ce5984e GetProcAddress 30750->30753 30754 6ce59987 30751->30754 30755 6ce599be 30751->30755 30752->30753 30761 6ce59678 30752->30761 30757 6ce59959 30753->30757 30758 6ce59863 30753->30758 30754->30755 30760 6ce59998 GetLastError 30754->30760 30756 6ce56210 160 API calls 30755->30756 30759 6ce599b9 30756->30759 30762 6ce56210 160 API calls 30757->30762 30758->30757 30765 6ce59880 30758->30765 30764 6ce5fc2e ___ansicp 4 API calls 30759->30764 30805 6ce56391 167 API calls 3 library calls 30760->30805 30770 6ce59831 30761->30770 30782 6ce60721 61 API calls 30761->30782 30787 6ce606fa 91 API calls 30761->30787 30788 6ce56210 160 API calls 30761->30788 30777 6ce5992a 30762->30777 30767 6ce599db 30764->30767 30789 6ce60721 30765->30789 30767->30748 30768 6ce5996b FreeLibrary 30768->30759 30770->30768 30771 6ce60721 61 API calls 30772 6ce598bc 30771->30772 30773 6ce60721 61 API calls 30772->30773 30777->30768 30782->30761 30787->30761 30788->30761 30790 6ce60750 30789->30790 30791 6ce60731 30789->30791 30798 6ce598a8 30790->30798 30808 6ce633d9 61 API calls __getptd 30790->30808 30806 6ce633d9 61 API calls __getptd 30791->30806 30794 6ce60736 30807 6ce632d7 5 API calls ___ansicp 30794->30807 30796 6ce6076a 30809 6ce632d7 5 API calls ___ansicp 30796->30809 30798->30771 30805->30759 30806->30794 30807->30798 30808->30796 30809->30798 30815 6ce59da3 30811->30815 30812 6ce59f33 30813 6ce5fc2e ___ansicp 4 API calls 30812->30813 30814 6ce59f40 30813->30814 30831 6ce59d2d 30814->30831 30815->30812 30816 6ce59e46 30815->30816 30817 6ce59dec 30815->30817 30830 6ce59f03 30815->30830 30818 6ce59e67 30816->30818 30819 6ce59e4b GetDlgItem SendMessageA 30816->30819 30817->30818 30821 6ce59df0 GetDlgItem SendMessageA SendMessageA SendMessageA ShowWindow 30817->30821 30839 6ce59cd8 169 API calls 30818->30839 30819->30818 30820 6ce59f18 GetDlgItem SendMessageA 30820->30812 30821->30818 30823 6ce59e86 SetDlgItemTextA 30824 6ce59ec7 SetDlgItemTextA 30823->30824 30825 6ce59e9f GetLastError 30823->30825 30827 6ce59ede GetLastError 30824->30827 30824->30830 30840 6ce56391 167 API calls 3 library calls 30825->30840 30841 6ce56391 167 API calls 3 library calls 30827->30841 30828 6ce59ec4 30828->30824 30830->30812 30830->30820 30832 6ce59d66 PeekMessageA 30831->30832 30833 6ce59d74 30832->30833 30834 6ce59d41 GetMessageA 30832->30834 30833->29529 30833->29530 30833->29531 30834->30832 30835 6ce59d52 TranslateMessage DispatchMessageA 30834->30835 30835->30832 30836->29523 30837->29531 30838->29542 30839->30823 30840->30828 30841->30830 30843 6ce59fac 30842->30843 30844 6ce59f6e GetLastError 30842->30844 30846 6ce5a02f DeleteFileA 30843->30846 30852 6ce59fb5 _strnlen 30843->30852 30845 6ce59f79 30844->30845 30855 6ce59f9a 30844->30855 30845->30855 30856 6ce56391 167 API calls 3 library calls 30845->30856 30847 6ce5a037 30846->30847 30850 6ce5a03b GetLastError 30847->30850 30847->30855 30849 6ce5fc2e ___ansicp 4 API calls 30851 6ce5a06f 30849->30851 30857 6ce56391 167 API calls 3 library calls 30850->30857 30851->29548 30854 6ce59fd4 SHFileOperationA 30852->30854 30854->30847 30855->30849 30856->30855 30857->30855 30859 6ce58c05 30858->30859 30860 6ce58c10 GetVersionExA 30858->30860 30863 6ce5fc2e ___ansicp 4 API calls 30859->30863 30861 6ce58c30 30860->30861 30862 6ce58c47 30860->30862 30861->30862 30916 6ce57089 182 API calls 30861->30916 30862->30859 30864 6ce58c5f 30863->30864 30864->29564 30864->29566 30867 6ce588d3 30866->30867 30868 6ce588de GetVersionExA 30866->30868 30870 6ce5fc2e ___ansicp 4 API calls 30867->30870 30869 6ce5892c 30868->30869 30874 6ce588fe 30868->30874 30871 6ce56dab 178 API calls 30869->30871 30873 6ce58935 30869->30873 30872 6ce58958 30870->30872 30871->30873 30872->29575 30872->29576 30875 6ce5893e 30873->30875 30917 6ce5691d 9 API calls ___ansicp 30873->30917 30874->30869 30876 6ce56eaf 178 API calls 30874->30876 30875->30867 30878 6ce58923 30876->30878 30878->30869 30879 6ce56f9c 178 API calls 30878->30879 30879->30869 30881 6ce58ad0 30880->30881 30882 6ce58adb GetVersionExA 30880->30882 30885 6ce5fc2e ___ansicp 4 API calls 30881->30885 30883 6ce58afb 30882->30883 30889 6ce58b12 30882->30889 30887 6ce56f9c 178 API calls 30883->30887 30883->30889 30884 6ce56eaf 178 API calls 30888 6ce58b1b 30884->30888 30886 6ce58b3e 30885->30886 30886->29566 30892 6ce58b45 30886->30892 30887->30889 30891 6ce58b24 30888->30891 30918 6ce5691d 9 API calls ___ansicp 30888->30918 30889->30884 30889->30888 30891->30881 30893 6ce58b64 30892->30893 30894 6ce58b6f GetVersionExA 30892->30894 30898 6ce5fc2e ___ansicp 4 API calls 30893->30898 30895 6ce58b90 30894->30895 30896 6ce58b9e 30895->30896 30897 6ce56f9c 178 API calls 30895->30897 30896->30893 30897->30896 30899 6ce58bdf 30898->30899 30899->29566 30919 6ce5871f GetSystemDefaultLCID 30901->30919 30903 6ce58770 30906 6ce56210 160 API calls 30903->30906 30904 6ce58753 30904->30903 30926 6ce586f0 GetKeyboardType GetKeyboardType 30904->30926 30908 6ce5877a 30906->30908 30907 6ce5875d 30907->30903 30909 6ce58761 30907->30909 30908->29563 30910 6ce56210 160 API calls 30909->30910 30911 6ce5876b 30910->30911 30911->29563 30912->29574 30913->29574 30916->30862 30917->30875 30918->30891 30920 6ce5872c 30919->30920 30921 6ce5873b 30919->30921 30922 6ce56210 160 API calls 30920->30922 30923 6ce56210 160 API calls 30921->30923 30924 6ce58736 30922->30924 30925 6ce58745 30923->30925 30924->30904 30925->30904 30926->30907 30927 733f67a9 30928 733f67cc GetVersionExA 30927->30928 30929 733f68aa 30927->30929 30930 733f67ee 30928->30930 30946 733f67e7 30928->30946 30931 733f68e5 30929->30931 30932 733f68b0 30929->30932 30979 733f8962 HeapCreate 30930->30979 30933 733f68ea 30931->30933 30934 733f6936 30931->30934 30937 733f68cf 30932->30937 30932->30946 30998 733f79b9 61 API calls _doexit 30932->30998 31002 733f7b06 6 API calls __amsg_exit 30933->31002 30934->30946 31006 733f7e20 73 API calls 2 library calls 30934->31006 30937->30946 30999 733f83bf 62 API calls __getstream 30937->30999 30938 733f6df2 ___ansicp 4 API calls 30943 733f6951 30938->30943 30939 733f68ef 30945 733f813a ___crtLCMapStringA 61 API calls 30939->30945 30941 733f6840 30941->30946 30947 733f6845 30941->30947 30950 733f68fb 30945->30950 30946->30938 30989 733f7e93 71 API calls 5 library calls 30947->30989 30949 733f68d9 31000 733f7b35 64 API calls 2 library calls 30949->31000 30950->30946 30953 733f6907 30950->30953 30951 733f684a 30954 733f684e 30951->30954 30955 733f6855 GetCommandLineA 30951->30955 31003 733f7a8d TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress 30953->31003 30990 733f89c7 VirtualFree HeapFree HeapFree HeapDestroy 30954->30990 30991 733f87c4 70 API calls 2 library calls 30955->30991 30956 733f68de 31001 733f89c7 VirtualFree HeapFree HeapFree HeapDestroy 30956->31001 30961 733f6919 30964 733f692a 30961->30964 30965 733f6920 30961->30965 30962 733f6865 30992 733f8180 66 API calls 3 library calls 30962->30992 31005 733f6f02 61 API calls 4 library calls 30964->31005 31004 733f7b77 61 API calls 3 library calls 30965->31004 30966 733f686f 30976 733f6873 30966->30976 30994 733f8704 105 API calls 2 library calls 30966->30994 30969 733f6853 30969->30946 30972 733f687f 30978 733f6893 30972->30978 30995 733f8412 104 API calls 5 library calls 30972->30995 30975 733f6888 30975->30978 30996 733f784d 4 API calls 2 library calls 30975->30996 30993 733f7b35 64 API calls 2 library calls 30976->30993 30978->30969 30997 733f83bf 62 API calls __getstream 30978->30997 30980 733f898a 30979->30980 30981 733f8986 30979->30981 31007 733f8900 61 API calls 3 library calls 30980->31007 30981->30941 30983 733f898f 30984 733f89bd 30983->30984 30985 733f8999 30983->30985 30984->30941 31008 733fae11 HeapAlloc 30985->31008 30987 733f89a3 30987->30984 30988 733f89a8 HeapDestroy 30987->30988 30988->30981 30989->30951 30990->30969 30991->30962 30992->30966 30993->30954 30994->30972 30995->30975 30996->30978 30997->30976 30998->30937 30999->30949 31000->30956 31001->30946 31002->30939 31003->30961 31004->30969 31005->30969 31006->30946 31007->30983 31008->30987 26550 733f4f9c 26564 733f6383 26550->26564 26553 733f4fce GetLastError 26554 733f5012 26553->26554 26555 733f4fdb 26553->26555 26556 733f504c 26554->26556 26557 733f5019 CloseHandle 26554->26557 26571 733f4b10 26555->26571 26557->26556 26559 733f5024 GetLastError 26557->26559 26613 733f64d5 167 API calls 3 library calls 26559->26613 26562 733f4ffe iDirectXSetup 26562->26554 26563 733f5049 26563->26556 26614 733f61d6 26564->26614 26570 733f4fb6 CreateMutexA 26570->26553 26570->26554 26572 733f4c93 26571->26572 26573 733f4b36 GetCurrentDirectoryW 26571->26573 26576 733f4ced 26572->26576 26577 733f4cb7 GetProcAddress 26572->26577 26574 733f4b4d GetLastError 26573->26574 26575 733f4b78 GetModuleFileNameW 26573->26575 26578 733f4b64 26574->26578 26579 733f4ba9 26575->26579 26580 733f4b90 GetLastError 26575->26580 26582 733f4d2b 26576->26582 26583 733f4cf5 GetProcAddress 26576->26583 26577->26576 26581 733f4ccd GetLastError 26577->26581 27484 733f64d5 167 API calls 3 library calls 26578->27484 26579->26572 26593 733f4bc1 SetCurrentDirectoryW 26579->26593 26580->26578 26581->26576 26586 733f4d33 GetProcAddress 26582->26586 26587 733f4d71 26582->26587 26583->26582 26584 733f4d0b GetLastError 26583->26584 26584->26582 26588 733f4d69 26586->26588 26589 733f4d49 GetLastError 26586->26589 26590 733f4daf 26587->26590 26591 733f4d79 GetProcAddress 26587->26591 26588->26587 26589->26588 26594 733f4ded 26590->26594 26595 733f4db7 GetProcAddress 26590->26595 26591->26590 26592 733f4d8f GetLastError 26591->26592 26592->26590 26599 733f4bd9 GetLastError 26593->26599 26600 733f4bf5 26593->26600 26596 733f4e2b 26594->26596 26597 733f4df5 GetProcAddress 26594->26597 26595->26594 26601 733f4dcd GetLastError 26595->26601 26598 733f4b6e 26596->26598 26603 733f4e33 GetProcAddress 26596->26603 26597->26596 26602 733f4e0b GetLastError 26597->26602 26604 733f6df2 ___ansicp 4 API calls 26598->26604 26599->26578 26607 733f4c3a LoadLibraryW SetCurrentDirectoryW 26600->26607 26608 733f4c11 26600->26608 26601->26594 26602->26596 26603->26598 26605 733f4e49 GetLastError 26603->26605 26606 733f4e79 26604->26606 26605->26598 26606->26554 26606->26562 26610 733f4c6f 26607->26610 26611 733f4c53 GetLastError 26607->26611 27485 733f64d5 167 API calls 3 library calls 26608->27485 26610->26572 26612 733f4c77 GetLastError 26610->26612 26611->26610 26612->26572 26613->26563 26616 733f61e2 26614->26616 26615 733f6208 26618 733f6212 26615->26618 26616->26615 26652 733f618b 97 API calls _vswprintf_s 26616->26652 26619 733f623b GetWindowsDirectoryA 26618->26619 26620 733f62d2 26618->26620 26622 733f6262 26619->26622 26623 733f6252 OutputDebugStringA 26619->26623 26620->26623 26657 733f7579 26620->26657 26653 733f4a54 26622->26653 26647 733f636d 26623->26647 26627 733f62f6 26660 733f747f 26627->26660 26630 733f6df2 ___ansicp 4 API calls 26633 733f637c 26630->26633 26631 733f628e CreateDirectoryA 26634 733f62b5 26631->26634 26635 733f62a1 GetLastError 26631->26635 26648 733f6df2 26633->26648 26636 733f4a54 97 API calls 26634->26636 26635->26623 26635->26634 26636->26620 26639 733f6337 26641 733f4a54 97 API calls 26639->26641 26640 733f6311 26642 733f4a54 97 API calls 26640->26642 26643 733f6332 26641->26643 26642->26643 26666 733f71bc 26643->26666 26645 733f6367 26699 733f713b 26645->26699 26647->26630 26649 733f6dfc SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 26648->26649 26650 733f6dfa 26648->26650 26649->26570 26650->26570 26652->26615 26654 733f4a62 26653->26654 26656 733f4a8c 26654->26656 26712 733f6cd5 97 API calls _vswprintf_s 26654->26712 26656->26623 26656->26631 26713 733f74a0 26657->26713 26659 733f62e4 26659->26623 26659->26627 27260 733f73d0 26660->27260 26663 733f73af 27274 733f7309 26663->27274 26669 733f71c8 __calloc_impl 26666->26669 26667 733f71d6 27310 733f9c85 61 API calls _raise 26667->27310 26669->26667 26671 733f729c 26669->26671 27312 733fbf5a 26669->27312 26670 733f71db 27311 733f9b83 5 API calls ___ansicp 26670->27311 27288 733fc247 26671->27288 26676 733fbf5a __fileno 61 API calls 26680 733f7220 26676->26680 26677 733f71eb __calloc_impl 26677->26645 26678 733f723c 26678->26667 26682 733fbf5a __fileno 61 API calls 26678->26682 26679 733f72b4 27294 733fc315 26679->27294 26680->26678 26684 733fbf5a __fileno 61 API calls 26680->26684 26685 733f7259 26682->26685 26687 733f722c 26684->26687 26688 733f7281 26685->26688 26692 733fbf5a __fileno 61 API calls 26685->26692 26691 733fbf5a __fileno 61 API calls 26687->26691 26688->26667 26688->26671 26691->26678 26694 733f7265 26692->26694 26693 733f72d8 27319 733f72fc LeaveCriticalSection LeaveCriticalSection __fcloseall 26693->27319 26694->26688 26696 733fbf5a __fileno 61 API calls 26694->26696 26697 733f7271 26696->26697 26698 733fbf5a __fileno 61 API calls 26697->26698 26698->26688 26700 733f7147 __calloc_impl 26699->26700 26701 733f715b 26700->26701 26702 733f7178 26700->26702 27426 733f9c85 61 API calls _raise 26701->27426 26705 733fc247 __fcloseall 62 API calls 26702->26705 26709 733f7170 __calloc_impl 26702->26709 26704 733f7160 27427 733f9b83 5 API calls ___ansicp 26704->27427 26706 733f7190 26705->26706 27410 733f70bf 26706->27410 26709->26647 26712->26656 26714 733f74ac __calloc_impl 26713->26714 26715 733f74bf 26714->26715 26716 733f74d1 26714->26716 26776 733f9c85 61 API calls _raise 26715->26776 26718 733f74df 26716->26718 26720 733f7504 26716->26720 26777 733f9c85 61 API calls _raise 26718->26777 26735 733fc7ad 26720->26735 26721 733f74e4 26778 733f9b83 5 API calls ___ansicp 26721->26778 26724 733f7509 26725 733f751d 26724->26725 26726 733f7510 26724->26726 26727 733f7544 26725->26727 26728 733f7524 26725->26728 26779 733f9c85 61 API calls _raise 26726->26779 26754 733fc506 26727->26754 26780 733f9c85 61 API calls _raise 26728->26780 26732 733f74c4 __calloc_impl @_EH4_CallFilterFunc@8 26732->26659 26736 733fc7b9 __calloc_impl 26735->26736 26782 733fadd9 26736->26782 26738 733fc834 26789 733fc8ca 26738->26789 26739 733fc838 26823 733fb6f5 61 API calls 5 library calls 26739->26823 26742 733fc8bf __calloc_impl 26742->26724 26743 733fc842 26743->26738 26824 733fcfd8 61 API calls 4 library calls 26743->26824 26747 733fc867 26750 733fc885 EnterCriticalSection 26747->26750 26751 733fc872 26747->26751 26748 733fc7c7 26748->26738 26748->26739 26792 733fad11 26748->26792 26821 733fc281 62 API calls __calloc_impl 26748->26821 26822 733fc2e8 LeaveCriticalSection LeaveCriticalSection _doexit 26748->26822 26750->26738 26825 733f6f02 61 API calls 4 library calls 26751->26825 26753 733fc87a 26753->26738 26755 733fc528 26754->26755 26756 733fc53c 26755->26756 26768 733fc55b 26755->26768 26841 733f9c85 61 API calls _raise 26756->26841 26757 733fc6f7 26761 733fc747 26757->26761 26762 733fc761 26757->26762 26759 733fc541 26842 733f9b83 5 API calls ___ansicp 26759->26842 26847 733f9c85 61 API calls _raise 26761->26847 26838 733ffeb1 26762->26838 26765 733fc74c 26848 733f9b83 5 API calls ___ansicp 26765->26848 26766 733f754f 26781 733f756a LeaveCriticalSection LeaveCriticalSection __fcloseall 26766->26781 26768->26757 26768->26761 26843 73400283 71 API calls __fassign 26768->26843 26770 733fc6dc 26770->26761 26844 734000f7 96 API calls 26770->26844 26772 733fc6f1 26772->26757 26845 734000f7 96 API calls 26772->26845 26774 733fc70e 26774->26757 26846 734000f7 96 API calls 26774->26846 26776->26732 26777->26721 26778->26732 26779->26732 26780->26732 26781->26732 26783 733fadee 26782->26783 26784 733fae01 EnterCriticalSection 26782->26784 26785 733fad11 __mtinitlocknum 60 API calls 26783->26785 26784->26748 26786 733fadf4 26785->26786 26786->26784 26826 733f7729 61 API calls 2 library calls 26786->26826 26788 733fae00 26788->26784 26827 733facf5 LeaveCriticalSection 26789->26827 26791 733fc8d1 26791->26742 26793 733fad1d __calloc_impl 26792->26793 26794 733fad2d 26793->26794 26795 733fad45 26793->26795 26828 733fcbba 61 API calls 2 library calls 26794->26828 26803 733fad53 __calloc_impl 26795->26803 26810 733fad43 26795->26810 26798 733fad32 26829 733fca30 61 API calls 3 library calls 26798->26829 26799 733fad5e 26801 733fad65 26799->26801 26802 733fad74 26799->26802 26832 733f9c85 61 API calls _raise 26801->26832 26806 733fadd9 __calloc_impl 61 API calls 26802->26806 26803->26748 26804 733fad39 26830 733f7787 GetModuleHandleA GetProcAddress ExitProcess ___crtCorExitProcess 26804->26830 26809 733fad7b 26806->26809 26808 733fad6a 26808->26803 26811 733fadaf 26809->26811 26812 733fad83 26809->26812 26810->26795 26831 733fb6f5 61 API calls 5 library calls 26810->26831 26836 733f6f02 61 API calls 4 library calls 26811->26836 26833 733fcfd8 61 API calls 4 library calls 26812->26833 26815 733fada0 26837 733fadcb LeaveCriticalSection _doexit 26815->26837 26816 733fad8e 26816->26815 26834 733f6f02 61 API calls 4 library calls 26816->26834 26819 733fad9a 26835 733f9c85 61 API calls _raise 26819->26835 26821->26748 26822->26748 26823->26743 26824->26747 26825->26753 26826->26788 26827->26791 26828->26798 26829->26804 26831->26799 26832->26808 26833->26816 26834->26819 26835->26815 26836->26815 26837->26808 26849 733ffdf4 26838->26849 26840 733ffecc 26840->26766 26841->26759 26842->26766 26843->26770 26844->26772 26845->26774 26846->26757 26847->26765 26848->26766 26851 733ffe00 __calloc_impl 26849->26851 26850 733ffe0c 26936 733f9c85 61 API calls _raise 26850->26936 26851->26850 26853 733ffe3d 26851->26853 26860 733ff7a6 26853->26860 26854 733ffe11 26937 733f9b83 5 API calls ___ansicp 26854->26937 26859 733ffe20 __calloc_impl 26859->26840 26861 733ff7d1 26860->26861 26939 73401d71 26861->26939 26864 733ff7fc 26945 733f77c6 26864->26945 26869 733ff84d 27058 733f9c9d 61 API calls _raise 26869->27058 26871 733ff852 27059 733f9c85 61 API calls _raise 26871->27059 26872 733ff817 26872->26869 26876 733ff8fb 26872->26876 26874 733ff85c 27060 733f9b83 5 API calls ___ansicp 26874->27060 26951 733ff473 26876->26951 26878 733ff9a1 26879 733ff9bf CreateFileA 26878->26879 26880 733ff9a8 26878->26880 26881 733ffa1b GetFileType 26879->26881 26882 733ff9e7 26879->26882 27061 733f9c9d 61 API calls _raise 26880->27061 26885 733ffa4a 26881->26885 26886 733ffa26 CloseHandle 26881->26886 26884 733ffa02 GetLastError 26882->26884 27063 733f9cb5 61 API calls 3 library calls 26884->27063 26970 733ff1f9 26885->26970 26886->26884 26887 733ff9ad 27062 733f9c85 61 API calls _raise 26887->27062 26893 733ffa6d CloseHandle 26894 733ff86b 26893->26894 26938 733ffe7e LeaveCriticalSection __lseeki64 26894->26938 26895 733ffa7c 26895->26894 26897 733ffaee 26895->26897 26979 73401c38 26895->26979 26897->26894 26910 733ffbea 26897->26910 26911 733ffc79 26897->26911 26933 733ffaf6 26897->26933 26905 733ffc2e 26905->26933 26910->26894 26910->26905 26918 733ffc8e 26910->26918 27082 733fdbf5 26910->27082 26911->26894 26915 733fdbf5 __lseeki64 63 API calls 26911->26915 26911->26918 26913 733ff9b7 27064 733f9c85 61 API calls _raise 26913->27064 26916 733ffcca 26915->26916 26916->26918 26918->26894 26918->26933 27093 733fe47e 26918->27093 26933->26894 27066 733fbdab 26933->27066 26936->26854 26937->26859 26938->26859 26940 73401d80 26939->26940 26941 733ff7ed 26939->26941 27118 733f9c85 61 API calls _raise 26940->27118 26941->26864 27056 733f9b83 5 API calls ___ansicp 26941->27056 26943 73401d85 27119 733f9b83 5 API calls ___ansicp 26943->27119 26946 733f77d5 26945->26946 26948 733f77ea 26946->26948 27120 733f9c85 61 API calls _raise 26946->27120 26948->26872 27057 733f9b83 5 API calls ___ansicp 26948->27057 26949 733f77da 27121 733f9b83 5 API calls ___ansicp 26949->27121 26952 733ff47f __calloc_impl 26951->26952 26953 733fad11 __mtinitlocknum 61 API calls 26952->26953 26954 733ff48f 26953->26954 26955 733fadd9 __calloc_impl 61 API calls 26954->26955 26956 733ff494 __calloc_impl 26954->26956 26965 733ff4a3 26955->26965 26956->26878 26957 733ff5f0 27143 733ff60e LeaveCriticalSection _doexit 26957->27143 26959 733ff582 27124 733f813a 26959->27124 26961 733ff525 EnterCriticalSection 26963 733ff535 LeaveCriticalSection 26961->26963 26961->26965 26962 733fadd9 __calloc_impl 61 API calls 26962->26965 26963->26965 26965->26957 26965->26959 26965->26961 26965->26962 26969 733ff4f9 26965->26969 27123 733ff547 LeaveCriticalSection _doexit 26965->27123 26969->26965 27122 733fcfd8 61 API calls 4 library calls 26969->27122 26971 733ff207 26970->26971 26972 733ff260 26970->26972 26971->26972 26975 733ff22b 26971->26975 27144 733f9c85 61 API calls _raise 26972->27144 26974 733ff265 27145 733f9c9d 61 API calls _raise 26974->27145 26977 733ff256 26975->26977 26978 733ff250 SetStdHandle 26975->26978 26977->26893 26977->26895 26978->26977 27146 733ff30a 26979->27146 27056->26864 27057->26872 27058->26871 27059->26874 27060->26894 27061->26887 27062->26913 27063->26913 27064->26894 27083 733ff30a __lseeki64 61 API calls 27082->27083 27118->26943 27119->26941 27120->26949 27121->26948 27122->26969 27123->26965 27125 733f8017 __calloc_impl 61 API calls 27124->27125 27126 733f8154 27125->27126 27127 733f8173 27126->27127 27128 733f9c85 __calloc_impl 61 API calls 27126->27128 27127->26957 27131 733ff3a1 27127->27131 27129 733f816a 27128->27129 27129->27127 27130 733f9c85 __calloc_impl 61 API calls 27129->27130 27130->27127 27132 733ff3ad __calloc_impl 27131->27132 27133 733ff40a 27132->27133 27134 733fadd9 __calloc_impl 61 API calls 27132->27134 27135 733ff42d __calloc_impl 27133->27135 27136 733ff410 EnterCriticalSection 27133->27136 27137 733ff3d8 27134->27137 27135->26957 27136->27135 27138 733ff3fe 27137->27138 27139 733ff3e3 27137->27139 27141 733ff439 __lseeki64 LeaveCriticalSection 27138->27141 27140 733fcfd8 ___crtInitCritSecAndSpinCount 61 API calls 27139->27140 27142 733ff3f1 27140->27142 27141->27133 27142->27138 27143->26956 27144->26974 27145->26977 27147 733ff327 27146->27147 27155 733ff317 27146->27155 27261 733f745d 27260->27261 27262 733f73e3 27260->27262 27272 733f9c85 61 API calls _raise 27261->27272 27262->27261 27263 733f73e8 27262->27263 27265 733f73f9 GetLocalTime 27263->27265 27266 733f73f0 27263->27266 27269 733f62ff 27265->27269 27271 733f9c85 61 API calls _raise 27266->27271 27267 733f73f5 27273 733f9b83 5 API calls ___ansicp 27267->27273 27269->26663 27271->27267 27272->27267 27273->27269 27275 733f738d 27274->27275 27276 733f731c 27274->27276 27286 733f9c85 61 API calls _raise 27275->27286 27276->27275 27277 733f7321 27276->27277 27280 733f732a 27277->27280 27281 733f7333 GetLocalTime 27277->27281 27279 733f732f 27287 733f9b83 5 API calls ___ansicp 27279->27287 27285 733f9c85 61 API calls _raise 27280->27285 27284 733f6308 27281->27284 27284->26639 27284->26640 27285->27279 27286->27279 27287->27284 27289 733fc258 27288->27289 27290 733fc270 EnterCriticalSection 27288->27290 27289->27290 27291 733fc25f 27289->27291 27290->26679 27292 733fadd9 __calloc_impl 61 API calls 27291->27292 27293 733fc26d 27292->27293 27293->26679 27295 733fbf5a __fileno 61 API calls 27294->27295 27296 733fc324 27295->27296 27320 733fe5b3 27296->27320 27298 733fc32a 27299 733fc368 27298->27299 27301 733f72be 27298->27301 27329 733fb6f5 61 API calls 5 library calls 27299->27329 27303 733fc3e5 27301->27303 27302 733fc36e 27302->27301 27304 733fc407 ___crtGetEnvironmentStringsA 27303->27304 27307 733f72ce 27303->27307 27304->27307 27308 733fbf5a __fileno 61 API calls 27304->27308 27309 733fe47e __locking 95 API calls 27304->27309 27333 733f8cc1 27304->27333 27354 733fbfc7 27304->27354 27318 733fc3ad 95 API calls __fclose_nolock 27307->27318 27308->27304 27309->27304 27310->26670 27311->26677 27313 733fbf69 27312->27313 27315 733f7214 27312->27315 27408 733f9c85 61 API calls _raise 27313->27408 27315->26676 27315->26678 27316 733fbf6e 27409 733f9b83 5 API calls ___ansicp 27316->27409 27318->26693 27319->26677 27321 733fe5cf 27320->27321 27322 733fe5c0 27320->27322 27327 733fe5f3 27321->27327 27331 733f9c85 61 API calls _raise 27321->27331 27330 733f9c85 61 API calls _raise 27322->27330 27324 733fe5c5 27324->27298 27326 733fe5e3 27332 733f9b83 5 API calls ___ansicp 27326->27332 27327->27298 27329->27302 27330->27324 27331->27326 27332->27327 27334 733fbf5a __fileno 61 API calls 27333->27334 27335 733f8cd0 27334->27335 27336 733f8cdb 27335->27336 27337 733f8cf2 27335->27337 27395 733f9c85 61 API calls _raise 27336->27395 27339 733f8cf6 27337->27339 27342 733f8d03 27337->27342 27396 733f9c85 61 API calls _raise 27339->27396 27341 733f8d54 27343 733f8d5e 27341->27343 27344 733f8ddd 27341->27344 27342->27341 27345 733f8d49 27342->27345 27346 733fe5b3 __locking 61 API calls 27342->27346 27351 733f8ce0 27342->27351 27348 733f8d75 27343->27348 27352 733f8d91 27343->27352 27347 733fe47e __locking 95 API calls 27344->27347 27345->27341 27360 733fe55f 27345->27360 27346->27345 27347->27351 27350 733fe47e __locking 95 API calls 27348->27350 27350->27351 27351->27304 27352->27351 27363 733fdc7f 27352->27363 27355 733fbfe0 27354->27355 27359 733fc001 27354->27359 27356 733fbf5a __fileno 61 API calls 27355->27356 27355->27359 27357 733fbffa 27356->27357 27358 733fe47e __locking 95 API calls 27357->27358 27358->27359 27359->27304 27361 733f813a ___crtLCMapStringA 61 API calls 27360->27361 27362 733fe576 27361->27362 27362->27341 27364 733fdc8b __calloc_impl 27363->27364 27365 733fdc9c 27364->27365 27366 733fdcb8 27364->27366 27397 733f9c9d 61 API calls _raise 27365->27397 27368 733fdcc6 27366->27368 27370 733fdce7 27366->27370 27399 733f9c9d 61 API calls _raise 27368->27399 27369 733fdca1 27398 733f9c85 61 API calls _raise 27369->27398 27372 733fdd2d 27370->27372 27373 733fdd07 27370->27373 27377 733ff3a1 __lseeki64 62 API calls 27372->27377 27402 733f9c9d 61 API calls _raise 27373->27402 27375 733fdccb 27400 733f9c85 61 API calls _raise 27375->27400 27380 733fdd33 27377->27380 27379 733fdd0c 27381 733fdcd2 27383 733fdca9 __calloc_impl 27383->27351 27395->27351 27396->27351 27397->27369 27398->27383 27399->27375 27400->27381 27402->27379 27408->27316 27409->27315 27411 733f70ef 27410->27411 27412 733f70d3 27410->27412 27415 733fbfc7 __fclose_nolock 95 API calls 27411->27415 27424 733f70e8 27411->27424 27468 733f9c85 61 API calls _raise 27412->27468 27414 733f70d8 27469 733f9b83 5 API calls ___ansicp 27414->27469 27417 733f70fb 27415->27417 27429 733fbf91 27417->27429 27420 733fbf5a __fileno 61 API calls 27421 733f7109 27420->27421 27433 733fbe49 27421->27433 27423 733f710f 27423->27424 27470 733f6f02 61 API calls 4 library calls 27423->27470 27428 733f71af LeaveCriticalSection LeaveCriticalSection __fcloseall 27424->27428 27426->26704 27427->26709 27428->26709 27430 733f7103 27429->27430 27431 733fbfa1 27429->27431 27430->27420 27431->27430 27471 733f6f02 61 API calls 4 library calls 27431->27471 27434 733fbe55 __calloc_impl 27433->27434 27435 733fbe5f 27434->27435 27436 733fbe79 27434->27436 27472 733f9c85 61 API calls _raise 27435->27472 27437 733fbe7e 27436->27437 27438 733fbe93 27436->27438 27474 733f9c9d 61 API calls _raise 27437->27474 27442 733fbea1 27438->27442 27445 733fbec2 27438->27445 27440 733fbe64 27473 733f9c9d 61 API calls _raise 27440->27473 27476 733f9c9d 61 API calls _raise 27442->27476 27444 733fbe83 27475 733f9c85 61 API calls _raise 27444->27475 27447 733fbf06 27445->27447 27448 733fbee2 27445->27448 27452 733ff3a1 __lseeki64 62 API calls 27447->27452 27479 733f9c9d 61 API calls _raise 27448->27479 27450 733fbea6 27477 733f9c85 61 API calls _raise 27450->27477 27456 733fbf0c 27452->27456 27454 733fbead 27478 733f9b83 5 API calls ___ansicp 27454->27478 27455 733fbee7 27480 733f9c85 61 API calls _raise 27455->27480 27460 733fbf19 27456->27460 27461 733fbf27 27456->27461 27459 733fbe6f __calloc_impl 27459->27423 27464 733fbdab __fclose_nolock 64 API calls 27460->27464 27482 733f9c85 61 API calls _raise 27461->27482 27463 733fbeee 27481 733f9b83 5 API calls ___ansicp 27463->27481 27465 733fbf21 27464->27465 27468->27414 27469->27424 27470->27424 27471->27430 27472->27440 27473->27459 27474->27444 27475->27459 27476->27450 27477->27454 27478->27459 27479->27455 27480->27463 27481->27459 27482->27465 27484->26598 27485->26598 31011 6ce5d948 31012 6ce5d94f 31011->31012 31013 6ce5d96b 31012->31013 31014 6ce56210 160 API calls 31012->31014 31041 6ce56391 167 API calls 3 library calls 31013->31041 31015 6ce5d98e 31014->31015 31017 6ce57269 183 API calls 31015->31017 31018 6ce5d995 31017->31018 31019 6ce5d99d CreateFileA 31018->31019 31023 6ce5dabd 31018->31023 31021 6ce5da96 GetLastError 31019->31021 31022 6ce5d9bf GetFileTime 31019->31022 31020 6ce5dae9 31024 6ce5fc2e ___ansicp 4 API calls 31020->31024 31021->31013 31025 6ce5d9ef LocalFileTimeToFileTime 31022->31025 31026 6ce5da4b GetLastError 31022->31026 31023->31020 31042 6ce5b8f8 197 API calls _strrchr 31023->31042 31027 6ce5e3ae 31024->31027 31028 6ce5da35 GetLastError 31025->31028 31029 6ce5da07 SetFileTime 31025->31029 31030 6ce5da5f 31026->31030 31028->31030 31031 6ce5da20 GetLastError 31029->31031 31032 6ce5da68 CloseHandle 31029->31032 31039 6ce56391 167 API calls 3 library calls 31030->31039 31031->31030 31032->31023 31036 6ce5da78 GetLastError 31032->31036 31035 6ce5da65 31035->31032 31040 6ce56391 167 API calls 3 library calls 31036->31040 31038 6ce5da91 31038->31023 31039->31035 31040->31038 31041->31023 31042->31020 29025 6ce5f250 29026 6ce5f351 29025->29026 29027 6ce5f273 GetVersionExA 29025->29027 29029 6ce5f357 29026->29029 29030 6ce5f38c 29026->29030 29028 6ce5f295 29027->29028 29043 6ce5f28e 29027->29043 29077 6ce62139 HeapCreate 29028->29077 29035 6ce5f376 29029->29035 29029->29043 29096 6ce61190 61 API calls _doexit 29029->29096 29031 6ce5f391 29030->29031 29032 6ce5f3dd 29030->29032 29100 6ce612dd 6 API calls _raise 29031->29100 29032->29043 29111 6ce615f7 73 API calls 2 library calls 29032->29111 29035->29043 29097 6ce61b96 62 API calls __getstream 29035->29097 29036 6ce5fc2e ___ansicp 4 API calls 29041 6ce5f3f8 29036->29041 29037 6ce5f396 29101 6ce61911 29037->29101 29039 6ce5f2e7 29039->29043 29044 6ce5f2ec 29039->29044 29043->29036 29087 6ce6166a 71 API calls 5 library calls 29044->29087 29048 6ce5f380 29098 6ce6130c 64 API calls 2 library calls 29048->29098 29049 6ce5f3ae 29108 6ce61264 TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress 29049->29108 29050 6ce5f2f1 29053 6ce5f2fc GetCommandLineA 29050->29053 29069 6ce5f2f5 29050->29069 29089 6ce61f9b 70 API calls 2 library calls 29053->29089 29054 6ce5f385 29099 6ce6219e VirtualFree HeapFree HeapFree HeapDestroy 29054->29099 29056 6ce5f3c0 29061 6ce5f3c7 29056->29061 29062 6ce5f3d1 29056->29062 29059 6ce5f30c 29090 6ce61957 66 API calls 3 library calls 29059->29090 29109 6ce6134e 61 API calls 3 library calls 29061->29109 29110 6ce6037b 61 API calls 4 library calls 29062->29110 29064 6ce5f316 29065 6ce5f31a 29064->29065 29092 6ce61edb 105 API calls 2 library calls 29064->29092 29091 6ce6130c 64 API calls 2 library calls 29065->29091 29088 6ce6219e VirtualFree HeapFree HeapFree HeapDestroy 29069->29088 29070 6ce5f326 29071 6ce5f33a 29070->29071 29093 6ce61be9 104 API calls 5 library calls 29070->29093 29076 6ce5f2fa 29071->29076 29095 6ce61b96 62 API calls __getstream 29071->29095 29074 6ce5f32f 29074->29071 29094 6ce61024 4 API calls 2 library calls 29074->29094 29076->29043 29078 6ce62161 29077->29078 29079 6ce6215d 29077->29079 29112 6ce620d7 61 API calls 3 library calls 29078->29112 29079->29039 29081 6ce62166 29082 6ce62194 29081->29082 29083 6ce62170 29081->29083 29082->29039 29113 6ce64a5c HeapAlloc 29083->29113 29085 6ce6217a 29085->29082 29086 6ce6217f HeapDestroy 29085->29086 29086->29079 29087->29050 29088->29076 29089->29059 29090->29064 29091->29069 29092->29070 29093->29074 29094->29071 29095->29065 29096->29035 29097->29048 29098->29054 29099->29043 29100->29037 29114 6ce617ee 29101->29114 29103 6ce6192b 29107 6ce5f3a2 29103->29107 29127 6ce633d9 61 API calls __getptd 29103->29127 29105 6ce61941 29105->29107 29128 6ce633d9 61 API calls __getptd 29105->29128 29107->29043 29107->29049 29108->29056 29109->29076 29110->29076 29111->29043 29112->29081 29113->29085 29115 6ce617fa __getstream 29114->29115 29116 6ce61812 29115->29116 29126 6ce61831 _memset 29115->29126 29129 6ce633d9 61 API calls __getptd 29116->29129 29118 6ce61817 29130 6ce632d7 5 API calls ___ansicp 29118->29130 29120 6ce618a3 RtlAllocateHeap 29120->29126 29121 6ce61827 __getstream 29121->29103 29126->29120 29126->29121 29131 6ce64a24 29126->29131 29138 6ce652a7 5 API calls 2 library calls 29126->29138 29139 6ce618ea LeaveCriticalSection _doexit 29126->29139 29140 6ce641b6 TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress _raise 29126->29140 29127->29105 29128->29107 29129->29118 29130->29121 29132 6ce64a4c EnterCriticalSection 29131->29132 29133 6ce64a39 29131->29133 29132->29126 29141 6ce6495c 29133->29141 29135 6ce64a3f 29135->29132 29170 6ce60f00 61 API calls 2 library calls 29135->29170 29137 6ce64a4b 29137->29132 29138->29126 29139->29126 29140->29126 29142 6ce64968 __getstream 29141->29142 29143 6ce64990 29142->29143 29144 6ce64978 29142->29144 29147 6ce640d3 __getstream 61 API calls 29143->29147 29150 6ce6499e __getstream 29143->29150 29171 6ce67c80 61 API calls 2 library calls 29144->29171 29146 6ce6497d 29172 6ce67af6 61 API calls 3 library calls 29146->29172 29149 6ce649a9 29147->29149 29152 6ce649b0 29149->29152 29153 6ce649bf 29149->29153 29150->29135 29151 6ce64984 29173 6ce60f5e GetModuleHandleA GetProcAddress ExitProcess ___crtCorExitProcess 29151->29173 29174 6ce633d9 61 API calls __getptd 29152->29174 29155 6ce64a24 __getstream 61 API calls 29153->29155 29157 6ce649c6 29155->29157 29159 6ce649ce 29157->29159 29160 6ce649fa 29157->29160 29175 6ce680a8 61 API calls 4 library calls 29159->29175 29178 6ce6037b 61 API calls 4 library calls 29160->29178 29163 6ce64a00 29179 6ce64a16 LeaveCriticalSection _doexit 29163->29179 29164 6ce649d9 29165 6ce649eb 29164->29165 29176 6ce6037b 61 API calls 4 library calls 29164->29176 29165->29163 29168 6ce649e5 29177 6ce633d9 61 API calls __getptd 29168->29177 29170->29137 29171->29146 29172->29151 29174->29150 29175->29164 29176->29168 29177->29165 29178->29163 29179->29150 31009 6ce5f41c 212 API calls __getstream

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 275 e74d57-e74d73 CreateMutexA 276 e75159-e75167 EnumWindows 275->276 277 e74d79-e74d84 GetLastError 275->277 280 e75168-e7516a 276->280 278 e75150-e75153 CloseHandle 277->278 279 e74d8a-e74da3 call e74b1b 277->279 278->276 283 e74da5-e74dcd call e7390a call e747af 279->283 284 e74dcf-e74dda call e74c60 279->284 296 e74e11-e74e18 283->296 289 e74eb0 284->289 290 e74de0-e74de2 284->290 292 e74eb2-e74eb9 289->292 293 e74de4-e74de6 290->293 294 e74e1d-e74e24 call e7422e 290->294 297 e74ecc-e74ecf 292->297 298 e74ebb-e74ecb call e747af 292->298 293->294 299 e74de8-e74e0e call e7390a call e747af 293->299 307 e74e26-e74e4a call e7390a 294->307 308 e74e5d-e74e64 call e73c3f 294->308 303 e75141-e7514e CloseHandle 296->303 297->303 298->297 299->296 303->280 315 e74e54-e74e58 307->315 316 e74e4c-e74e53 call e747af 307->316 317 e74e66-e74e86 call e7390a 308->317 318 e74e88-e74e90 call e73f72 308->318 315->303 316->315 317->292 325 e74ed4-e74efe SetErrorMode LoadLibraryA SetErrorMode 318->325 326 e74e92-e74ead call e7390a 318->326 327 e74f04-e74f41 GetProcAddress * 3 325->327 328 e75110-e75134 GetLastError call e7390a call e7495a 325->328 326->289 332 e74f47-e74f4f 327->332 333 e750b4-e750ec GetLastError call e7390a FreeLibrary 327->333 340 e75139 328->340 332->333 335 e74f55-e74f57 332->335 333->340 341 e750ee-e750f6 GetLastError 333->341 335->333 338 e74f5d-e74f6c 335->338 346 e74f6e-e74f74 338->346 347 e74f79-e74f7f 338->347 343 e75140 340->343 341->340 342 e750f8-e7510e call e7390a 341->342 342->340 343->303 346->347 351 e74f76 346->351 349 e75005-e75008 347->349 350 e74f85-e74f9f DirectXSetupA call e74090 347->350 353 e7500e-e75011 349->353 354 e7509a-e750a7 DirectXSetupA 349->354 358 e74fa1-e74fb4 call e747af GetAsyncKeyState 350->358 359 e74fe0-e74fe3 350->359 351->347 353->354 356 e75017-e7501d 353->356 357 e750aa call e74090 354->357 356->354 360 e7501f-e75021 356->360 367 e750af 357->367 378 e74fb6-e74fc0 call e737b8 358->378 379 e74fc2-e74fdb call e737b8 call e74163 ExitWindowsEx 358->379 362 e74fe5-e74fea call e7495a 359->362 363 e74fef-e74ffa call e747af 359->363 365 e75077-e75095 call e7390a 360->365 366 e75023-e75030 #17 360->366 362->343 376 e74fff-e75000 363->376 365->343 372 e75032-e7503b FreeLibrary 366->372 373 e7506d-e75075 call e76964 366->373 367->343 380 e75067 372->380 381 e7503d-e75045 GetLastError 372->381 373->357 376->343 378->376 379->343 380->373 381->380 385 e75047-e75065 call e7390a 381->385 385->373
        APIs
        • CreateMutexA.KERNEL32(00000000,00000000,DirectX Setup), ref: 00E74D68
        • GetLastError.KERNEL32 ref: 00E74D79
        • SetErrorMode.KERNEL32(00008001), ref: 00E74EE0
        • LoadLibraryA.KERNEL32(dsetup.dll), ref: 00E74EE9
        • SetErrorMode.KERNEL32(00000000), ref: 00E74EF5
        • GetProcAddress.KERNEL32(733F0000,DirectXSetupA), ref: 00E74F10
        • GetProcAddress.KERNEL32(DirectXSetupSetCallback), ref: 00E74F22
        • GetProcAddress.KERNEL32(DirectXSetupShowEULA), ref: 00E74F34
        • DirectXSetupA.DSETUP(00000000,00000000,02010098), ref: 00E74F8C
        • ExitWindowsEx.USER32(00000002,00000000), ref: 00E74FD5
        • GetAsyncKeyState.USER32(00000010), ref: 00E74FAB
          • Part of subcall function 00E7390A: GetLastError.KERNEL32 ref: 00E73AC7
          • Part of subcall function 00E74163: GetCurrentProcess.KERNEL32 ref: 00E74176
          • Part of subcall function 00E74163: OpenProcessToken.ADVAPI32(00000000,000F01FF,?), ref: 00E74186
          • Part of subcall function 00E74163: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00E7419C
          • Part of subcall function 00E74163: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00E741CB
          • Part of subcall function 00E74163: CloseHandle.KERNEL32(?), ref: 00E741D4
          • Part of subcall function 00E74163: FreeLibrary.KERNEL32(733F0000), ref: 00E741E4
          • Part of subcall function 00E74163: GetLastError.KERNEL32 ref: 00E741EE
        • CloseHandle.KERNEL32(?), ref: 00E75144
          • Part of subcall function 00E7390A: __wstrtime.LIBCMT ref: 00E7393B
          • Part of subcall function 00E7390A: __wstrtime.LIBCMT ref: 00E73944
          • Part of subcall function 00E7390A: _strrchr.LIBCMT ref: 00E7398A
          • Part of subcall function 00E747AF: LoadStringW.USER32(00000064,?,00000104), ref: 00E747F5
          • Part of subcall function 00E747AF: GetLastError.KERNEL32(00000000), ref: 00E7480C
          • Part of subcall function 00E747AF: LoadStringW.USER32(?,?,00000104), ref: 00E74858
          • Part of subcall function 00E747AF: GetLastError.KERNEL32(String ID: %d,?), ref: 00E7486A
          • Part of subcall function 00E7422E: GetVersionExA.KERNEL32(?), ref: 00E74254
          • Part of subcall function 00E7390A: FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00E73A9A
          • Part of subcall function 00E7390A: LocalFree.KERNEL32(?), ref: 00E73ABF
          • Part of subcall function 00E747AF: LoadStringW.USER32(0000006F,?,00000104), ref: 00E748A6
          • Part of subcall function 00E747AF: GetLastError.KERNEL32(String ID: %d,0000006F), ref: 00E748B7
          • Part of subcall function 00E747AF: ___swprintf_l.LIBCMT ref: 00E7491E
          • Part of subcall function 00E747AF: MessageBoxW.USER32(?,?,?), ref: 00E74940
          • Part of subcall function 00E73F72: RegCreateKeyExA.KERNEL32(80000002,Software\Microsoft\DirectX,00000000,00000000,00000000,00000002,00000000,?,00000000), ref: 00E73F98
        • CloseHandle.KERNEL32(?), ref: 00E75153
        • EnumWindows.USER32(Function_00004288,00000000), ref: 00E7515F
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: Error$Last$Load$AddressCloseHandleProcString$CreateFreeLibraryMessageModeProcessTokenWindows__wstrtime$AdjustAsyncCurrentDirectEnumExitFormatLocalLookupMutexOpenPrivilegePrivilegesSetupStateValueVersion___swprintf_l_strrchr
        • String ID: Current logon user doesn't have the Administrator privilege.$DirectX Setup$DirectXSetupA$DirectXSetupSetCallback$DirectXSetupShowEULA$FreeLibrary()$GetProcAddress()$Invalid command line switch, using command ID %d without flat image.$Invalid command line switch.$LoadLibrary()$Module: dsetup.dll$SetDXSetupRegValue() failed.$This version of DirectX is not compatible with WindowsNT 4.0.$Unknown install command.$User did not reboot$User rebooted$WinMain$dsetup.dll$e:\bt\382730\setup\deliverables\dxsetup\dxsetup.cpp
        • API String ID: 1300868845-2194485137
        • Opcode ID: 725cdd17364f38e037b1da28e75380d96c0aacac1328a05a9c19c71f75238dac
        • Instruction ID: 6e4fbc9ca0fe48c236e35e2014fbc4bda3c4b09eb18be8c4f5e5adab8484005f
        • Opcode Fuzzy Hash: 725cdd17364f38e037b1da28e75380d96c0aacac1328a05a9c19c71f75238dac
        • Instruction Fuzzy Hash: 6D918EB2E80B04BFC7206B7E5C0BD6F3A64EB91B11B24F64AF51CB51D2D7A0494097E2

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 717 e73647-e7366a 718 e73670-e73685 GetWindowsDirectoryA 717->718 719 e7370e-e7371f call e77642 717->719 720 e73697-e736ba call e7360c 718->720 721 e73687 718->721 726 e73721-e73726 719->726 727 e7372b-e73744 call e77548 call e77478 719->727 732 e736c3-e736d4 CreateDirectoryA 720->732 733 e736bc-e736c1 720->733 724 e7368c-e73692 OutputDebugStringA 721->724 728 e737a5-e737b2 call e7765e 724->728 726->724 743 e73746-e7376a call e7360c 727->743 744 e7376c-e7378c call e7360c 727->744 736 e736d6-e736e1 GetLastError 732->736 737 e736ea-e7370c call e7360c 732->737 733->724 736->737 739 e736e3-e736e8 736->739 737->719 737->733 739->724 749 e7378f-e7379d call e77285 call e77204 743->749 744->749 753 e737a2 749->753 753->728
        APIs
        • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00E7367D
        • OutputDebugStringA.KERNEL32(DXSETUP_DPF(): Unable to open log file.), ref: 00E7368C
        • CreateDirectoryA.KERNEL32(?,00000000), ref: 00E736CC
        • GetLastError.KERNEL32 ref: 00E736D6
        • __wstrtime.LIBCMT ref: 00E7372F
        • __wstrtime.LIBCMT ref: 00E73738
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: Directory__wstrtime$CreateDebugErrorLastOutputStringWindows
        • String ID: %s %s: %s: %s$%s %s: %s: (null)$%s%s$%s%s%s$C:\Windows\Logs\DirectX.log$DXSETUP_DPF(): GetWindowsDirectory() failed.$DXSETUP_DPF(): Unable to open log file.$DXSETUP_DPF(): failed to create log directory.$DXSETUP_DPF(): path name too long.$DXSetup$Logs\DirectX.log$\Logs$b:
        • API String ID: 1979891910-370489754
        • Opcode ID: 799a7eab0b1b784c2168bc210d8347910086592aa6237c718f23068ae10eff66
        • Instruction ID: 25c94edb587168752c6d0a33b9b0e68c7e2b9a1320a19b793a87f0efc6e053f8
        • Opcode Fuzzy Hash: 799a7eab0b1b784c2168bc210d8347910086592aa6237c718f23068ae10eff66
        • Instruction Fuzzy Hash: CE31D6F1A44304BAD710E6F99C4AEEB77AC9B04700F51A0A6F58DF2141E770DB486665

        Control-flow Graph

        APIs
        • FindFirstFileA.KERNEL32(?,?,?,?,Logs\DirectX.log), ref: 6CE5B2AF
        • GetLastError.KERNEL32(00000000), ref: 6CE5B2BB
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563C2
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563CB
          • Part of subcall function 6CE56391: _strrchr.LIBCMT ref: 6CE56411
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: __wstrtime$ErrorFileFindFirstLast_strrchr
        • String ID: $$CSetup::CheckOnLogFile$FindFirstFile()$Logs\DirectX.log$Out of memory.$Unable to create path string, %s%s.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp$fopen()$fread() returned zero.
        • API String ID: 1269276653-3498366787
        • Opcode ID: c3c972ed0d6022dd007b09e6468233dc4cff74eeaaa24bb4ce2b1ec8f1708bb6
        • Instruction ID: 59885b0324dc31b81da60ab18460e1b6e62b296d40034a4b2006adcf08da1a69
        • Opcode Fuzzy Hash: c3c972ed0d6022dd007b09e6468233dc4cff74eeaaa24bb4ce2b1ec8f1708bb6
        • Instruction Fuzzy Hash: 3851F772D817187ADB304AA58C49FCB327CDB05318FF005A9F608B6E80EB779AB44A55
        APIs
        • GetVersionExA.KERNEL32(?), ref: 00E73C6C
        • LoadLibraryA.KERNEL32(advpack.dll), ref: 00E73CA8
        • GetProcAddress.KERNEL32(00000000,IsNTAdmin), ref: 00E73CBC
        • GetLastError.KERNEL32(Module: %s, Function: %s,advpack.dll,IsNTAdmin), ref: 00E73CE7
        • FreeLibrary.KERNEL32(00000000), ref: 00E73D08
        • GetLastError.KERNEL32(Unable to load %s.,advpack.dll), ref: 00E73D17
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorLastLibrary$AddressFreeLoadProcVersion
        • String ID: GetProcAddress()$IsAdmin$IsNTAdmin$LoadLibrary()$Module: %s, Function: %s$Unable to load %s.$advpack.dll$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
        • API String ID: 3600083760-2055996021
        • Opcode ID: 0eea656185bf1d20bcc687c02c4e650f0bd9d90ec56b54c93bee1a8968af13c1
        • Instruction ID: 24c193c7bc8c563aea481329b59db3cdda38a6761718f2e9c508308f2382b4bb
        • Opcode Fuzzy Hash: 0eea656185bf1d20bcc687c02c4e650f0bd9d90ec56b54c93bee1a8968af13c1
        • Instruction Fuzzy Hash: 7D21D671E50314EFEB709BB99C4AFAAB6B8AB54715F4490D8B10DB1182CB704E88DF31
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 60de959c58babf37300feb73c40c10c0f6dec7db7a16c3fb58f28f202276fb1b
        • Instruction ID: d58c0beb46a46597caed1c42b4b6b88d538dd3249af6ed2dddc960043ea8a33b
        • Opcode Fuzzy Hash: 60de959c58babf37300feb73c40c10c0f6dec7db7a16c3fb58f28f202276fb1b
        • Instruction Fuzzy Hash: EF125E31D0062A8FDB31DF25CD44BAAB7B9EF05312F8442DAE84AE7180D7719A85CF51
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 8fda340e69d54a193554c855338b02a65b263020eb8c67b885e6803ab65327a5
        • Instruction ID: 53abb550d74ba7ddac567eaee22f4d5dc9cb89548c2208d0b3cdcfc71ba09ee0
        • Opcode Fuzzy Hash: 8fda340e69d54a193554c855338b02a65b263020eb8c67b885e6803ab65327a5
        • Instruction Fuzzy Hash: 5A1248319006299FDB20DF28DC44BAAB7B4AF04316F44A1E6E95DF7281EB308E81DF51
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: df00d67d9964162129502ca6de4a42fddafe1847cad1993179884fd607f4af72
        • Instruction ID: 7a50c429afd444c98b3bb42329f6cf8a5210e1c34deb25ba92157d5893e18269
        • Opcode Fuzzy Hash: df00d67d9964162129502ca6de4a42fddafe1847cad1993179884fd607f4af72
        • Instruction Fuzzy Hash: AC125E319A4628CFDB60CF26CC447AAB7B9EF0531AF6041D9D859E7A80DB319E81CF51
        APIs
        • FindFirstFileA.KERNEL32(?,?,?,00000104,?,\ntkrnlpa.exe,00000104), ref: 6CE56D8F
        • FindClose.KERNEL32(00000000), ref: 6CE56D9B
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563C2
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563CB
          • Part of subcall function 6CE56391: _strrchr.LIBCMT ref: 6CE56411
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: Find__wstrtime$CloseFileFirst_strrchr
        • String ID: IsFileAvailable$StringCchCopy()$Unable to create path string, %s%s.$\ntkrnlpa.exe$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
        • API String ID: 317478765-446419479
        • Opcode ID: cd0dd03fef39239de22a1fe0fe43b1ff6de384bbd2fbf80db3cc5e2ff8b45973
        • Instruction ID: 3de97c1eaefa2f020c480490fb6896e899bab94eea8a7d71c9713823d85455fc
        • Opcode Fuzzy Hash: cd0dd03fef39239de22a1fe0fe43b1ff6de384bbd2fbf80db3cc5e2ff8b45973
        • Instruction Fuzzy Hash: 6311E971A4020476DB10AEA58C49EEF737CDBA6319FF40E25B414E7780EA72E9644760
        APIs
        • FindFirstFileA.KERNEL32(?,?), ref: 00E74554
        • FindClose.KERNEL32(00000000), ref: 00E74560
          • Part of subcall function 00E7390A: __wstrtime.LIBCMT ref: 00E7393B
          • Part of subcall function 00E7390A: __wstrtime.LIBCMT ref: 00E73944
          • Part of subcall function 00E7390A: _strrchr.LIBCMT ref: 00E7398A
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: Find__wstrtime$CloseFileFirst_strrchr
        • String ID: IsFileAvailable$StringCchCopy()$Unable to create path string, %s%s.$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
        • API String ID: 317478765-495664935
        • Opcode ID: 56845cdd0cce51e13e2d9fdc2c60f1833784d95249a856b88fa0a6626040ec9d
        • Instruction ID: 84981913dcf5a88549b6b4effffad359c512820fa469ca6572a68fe2e8fe52c8
        • Opcode Fuzzy Hash: 56845cdd0cce51e13e2d9fdc2c60f1833784d95249a856b88fa0a6626040ec9d
        • Instruction Fuzzy Hash: 0B11E9F5A803087BD710AE795C0BEEF73EC9B95714F00A691B90DF60C0EAB09A459670

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 0 6ce5e873-6ce5e8d2 call 6ce5b23f call 6ce56210 * 2 call 6ce5ac14 9 6ce5e8d4-6ce5e8db call 6ce593df 0->9 10 6ce5e8ec-6ce5e908 RegOpenKeyExA 0->10 9->10 22 6ce5e8dd-6ce5e8e7 9->22 12 6ce5e97a-6ce5e986 10->12 13 6ce5e90a-6ce5e942 RegQueryValueExA 10->13 14 6ce5e98b-6ce5e991 call 6ce56391 12->14 16 6ce5e944-6ce5e951 call 6ce56210 13->16 17 6ce5e957-6ce5e965 RegCloseKey 13->17 19 6ce5e994-6ce5e9a6 call 6ce56210 14->19 16->17 17->19 20 6ce5e967-6ce5e978 17->20 29 6ce5e9ab-6ce5e9ca call 6ce5b5f6 call 6ce58c66 19->29 20->14 26 6ce5ea58-6ce5ea6b 22->26 27 6ce5ea71-6ce5ea77 26->27 28 6ce5ecf0-6ce5ecf6 26->28 30 6ce5eaa7-6ce5eaba call 6ce572fc 27->30 31 6ce5ea79-6ce5eaa2 call 6ce56b4f call 6ce585ae call 6ce5a3ce 27->31 32 6ce5ecfc-6ce5ed02 28->32 33 6ce5edbe-6ce5ee0e call 6ce56210 call 6ce5b5f6 28->33 63 6ce5e9d0 29->63 64 6ce5ea52 29->64 52 6ce5eac0-6ce5eac2 30->52 53 6ce5ec69-6ce5ec86 call 6ce591c4 30->53 31->30 32->33 36 6ce5ed08-6ce5ed27 RegOpenKeyExA 32->36 92 6ce5ee17-6ce5ee1c 33->92 93 6ce5ee10-6ce5ee12 call 6ce572fc 33->93 41 6ce5eda0-6ce5edac 36->41 42 6ce5ed29-6ce5ed3c RegDeleteValueA 36->42 46 6ce5edb1-6ce5edbb call 6ce56391 41->46 48 6ce5ed6c-6ce5ed7c call 6ce56210 42->48 49 6ce5ed3e-6ce5ed41 42->49 46->33 60 6ce5ed7d-6ce5ed8b RegCloseKey 48->60 59 6ce5ed43-6ce5ed6a call 6ce56391 49->59 49->60 54 6ce5ebb1-6ce5ebbe call 6ce5b4e4 52->54 55 6ce5eac8-6ce5eacb 52->55 85 6ce5eccc-6ce5eceb call 6ce5b5f6 53->85 107 6ce5ec88-6ce5ec9f call 6ce591c4 53->107 54->85 111 6ce5ebc4-6ce5ebc7 54->111 84 6ce5ead1-6ce5eaec call 6ce591c4 55->84 55->85 59->60 60->33 87 6ce5ed8d-6ce5ed9e 60->87 63->64 66 6ce5eb84 63->66 67 6ce5eb47-6ce5eb4e call 6ce5ab73 63->67 68 6ce5ea26-6ce5ea2b 63->68 69 6ce5e9e1-6ce5e9e6 63->69 70 6ce5eb61-6ce5eb66 63->70 71 6ce5eb2d-6ce5eb34 call 6ce5aad4 63->71 72 6ce5eb6f-6ce5eb74 63->72 73 6ce5ea09-6ce5ea10 call 6ce58484 63->73 74 6ce5eb68-6ce5eb6d 63->74 75 6ce5e9eb-6ce5e9f0 63->75 76 6ce5e9f5-6ce5e9fa 63->76 77 6ce5e9d7-6ce5e9dc 63->77 78 6ce5eb76-6ce5eb7b 63->78 79 6ce5ea30-6ce5ea35 63->79 80 6ce5eb13-6ce5eb1a call 6ce5aa25 63->80 81 6ce5eb7d-6ce5eb82 63->81 82 6ce5e9ff-6ce5ea04 63->82 83 6ce5ea3a-6ce5ea41 call 6ce5a978 63->83 64->26 100 6ce5eb89-6ce5eb96 call 6ce56210 66->100 127 6ce5eb50-6ce5eb55 67->127 128 6ce5eb5a-6ce5eb5f 67->128 68->100 69->100 70->100 125 6ce5eb36-6ce5eb3b 71->125 126 6ce5eb40-6ce5eb45 71->126 72->100 134 6ce5ea12-6ce5ea17 73->134 135 6ce5ea1c-6ce5ea21 73->135 74->100 75->100 76->100 77->100 78->100 79->100 123 6ce5eb26-6ce5eb2b 80->123 124 6ce5eb1c-6ce5eb21 80->124 81->100 82->100 136 6ce5ea47 83->136 137 6ce5eb0c-6ce5eb11 83->137 121 6ce5eaf2-6ce5eb07 call 6ce56210 84->121 122 6ce5eb9b-6ce5ebac 84->122 85->28 87->46 102 6ce5ee54-6ce5ee65 call 6ce5a365 92->102 103 6ce5ee1e-6ce5ee27 DestroyWindow 92->103 93->92 100->26 143 6ce5ee67-6ce5ee86 call 6ce585ae call 6ce5a5d2 102->143 144 6ce5eee2-6ce5eeea 102->144 108 6ce5ee51 103->108 109 6ce5ee29-6ce5ee4e GetLastError call 6ce56391 103->109 148 6ce5eca1-6ce5eca6 call 6ce56210 107->148 149 6ce5ecae-6ce5ecba 107->149 108->102 109->108 131 6ce5ebdf-6ce5ebe5 111->131 132 6ce5ebc9-6ce5ebda call 6ce56210 111->132 121->85 139 6ce5ecbf-6ce5ecc9 call 6ce56391 122->139 123->100 147 6ce5ea4c-6ce5ea51 call 6ce56210 124->147 125->147 126->100 127->147 128->100 145 6ce5ebe7-6ce5ebef call 6ce5cec8 131->145 146 6ce5ec02-6ce5ec14 call 6ce59ca1 131->146 132->85 134->100 135->100 136->147 137->100 139->85 177 6ce5eeaf-6ce5eecd call 6ce56391 143->177 178 6ce5ee88-6ce5eea1 call 6ce56210 143->178 157 6ce5eeec-6ce5ef13 call 6ce56be5 144->157 158 6ce5eecf-6ce5eee1 call 6ce5fc82 144->158 162 6ce5ebf4-6ce5ebfc 145->162 146->85 169 6ce5ec1a-6ce5ec37 call 6ce591c4 146->169 147->64 167 6ce5ecab-6ce5ecac 148->167 149->139 174 6ce5eff1 157->174 175 6ce5ef19 157->175 158->144 162->85 162->146 167->85 169->85 203 6ce5ec3d-6ce5ec47 call 6ce591c4 169->203 176 6ce5eff6 174->176 175->174 180 6ce5ef66-6ce5ef6b 175->180 181 6ce5ef20-6ce5ef25 175->181 182 6ce5efe3-6ce5efe8 175->182 183 6ce5efae-6ce5efb3 175->183 184 6ce5ef48-6ce5ef4d 175->184 185 6ce5efea-6ce5efef 175->185 186 6ce5ef2a-6ce5ef2f 175->186 187 6ce5efd5-6ce5efda 175->187 188 6ce5efb5-6ce5efba 175->188 189 6ce5ef94 175->189 190 6ce5ef34-6ce5ef39 175->190 191 6ce5ef77-6ce5ef8b call 6ce5d3b0 175->191 192 6ce5ef70-6ce5ef75 175->192 193 6ce5ef52-6ce5ef57 175->193 194 6ce5efdc-6ce5efe1 175->194 195 6ce5efbc-6ce5efd3 call 6ce56b8b 175->195 196 6ce5ef5c-6ce5ef61 175->196 197 6ce5ef3e-6ce5ef43 175->197 204 6ce5effc-6ce5effe call 6ce56b8b 176->204 177->144 178->144 214 6ce5eea3-6ce5eead 178->214 180->176 181->176 182->176 183->176 184->176 185->176 186->176 187->176 188->176 199 6ce5ef9a-6ce5efac call 6ce56b4f 189->199 190->176 191->199 212 6ce5ef8d-6ce5ef92 191->212 192->176 193->176 194->176 195->176 196->176 197->176 216 6ce5f003-6ce5f00a call 6ce56210 199->216 215 6ce5ec4c-6ce5ec54 203->215 204->216 212->204 214->144 215->148 218 6ce5ec56-6ce5ec67 215->218 219 6ce5f00f-6ce5f02b call 6ce5e409 call 6ce5fc2e 216->219 218->139
        APIs
        • RegOpenKeyExA.KERNEL32(80000002,Software\Microsoft\DirectX,00000000,00000001,?), ref: 6CE5E900
        • RegQueryValueExA.KERNEL32(?,DXSetup,00000000,?,?,?), ref: 6CE5E93A
        • RegCloseKey.ADVAPI32(?), ref: 6CE5E95D
          • Part of subcall function 6CE593DF: GetVersionExA.KERNEL32(?), ref: 6CE5940C
          • Part of subcall function 6CE593DF: LoadLibraryA.KERNEL32(advpack.dll), ref: 6CE59448
          • Part of subcall function 6CE593DF: GetProcAddress.KERNEL32(00000000,IsNTAdmin), ref: 6CE5945C
          • Part of subcall function 6CE593DF: FreeLibrary.KERNEL32(00000000), ref: 6CE594A8
        • RegOpenKeyExA.KERNEL32(80000002,Software\Microsoft\DirectX,00000000,00020006,?,00000012,00000000,00000000,00000000,?), ref: 6CE5ED1F
        • RegDeleteValueA.KERNEL32(?,ManagedDirectXVersion), ref: 6CE5ED34
        • RegCloseKey.ADVAPI32(?), ref: 6CE5ED83
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563C2
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563CB
          • Part of subcall function 6CE56391: _strrchr.LIBCMT ref: 6CE56411
          • Part of subcall function 6CE56391: FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 6CE56521
          • Part of subcall function 6CE56391: LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00066BDB), ref: 6CE56546
        • DestroyWindow.USER32(?,00000012,00000000,00000000,00000000,?,00000012,00000000,00000000,00000000,?), ref: 6CE5EE1F
        • GetLastError.KERNEL32(Not fatal...), ref: 6CE5EE2E
          • Part of subcall function 6CE572FC: LoadStringA.USER32(?,000003E9,?,00000040), ref: 6CE5736D
          • Part of subcall function 6CE572FC: GetLastError.KERNEL32(00000000), ref: 6CE57378
          • Part of subcall function 6CE56391: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00066BDB,00000000), ref: 6CE5654E
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorLast$CloseFreeLibraryLoadOpenValue__wstrtime$AddressDeleteDestroyFormatLocalMessageProcQueryStringVersionWindow_strrchr
        • String ID: %s %s$%s will be removed at reboot.$.NETframework is not installed.$04:38:03$=== SetupForDirectX() start ===$A cabinet file necessary for installation cannot be trusted.$CSetup::SetupForDirectX$Can't find a directory$Can't find inf file$Could not find $Current logon user doesn't have the Administrator privilege$DXRemoveFileAtReboot() failed. (Not fatal...)$DXSetup$DXSetupCommand = %d.$DXTempFolder$DestroyWindow()$Downloading failed, need to run setup again.$Feb2005_MDX_x86.MSI$File not copied$Found Alpha$InstallPlugIn() failed.$Installation ended with value %d = $Installation succeeded$Installation succeeded need restart$Installing on NEC OPK$Installing on NEC Win2K$Installing on NEC Win95$Installing on NEC Win98$Installing on NEC WinXP$Installing on Win2K$Installing on Win2K Server$Installing on Win95$Installing on Win98$Installing on WinNT 4.0$Installing on WinXP$Installing on WinXP (64bit)$Installing on WinXP SP (64bit)$Installing on WinXP SP1$Installing on WinXP SP2 (64bit)$Installing on WinXP SP2/SP3$Installing on Windows ME$Installing on Windows ME NEC$Installing on Windows Server 2003$Installing on Windows Server 2003 (64bit)$Installing on Windows Server 2003 SP1 (64bit)$Installing on Windows Server 2003 SP1/SP2$Internal or unsupported error$ManagedDirectXVersion$Mar 30 2011$Newer version already installed$Not fatal...$One or more DirectX component files are being used, need to exit all applications.$Out of disk space$Processor type is unsupported by DirectX 8$RegCloseKey()$RegDeleteValue()$RegOpenKeyEx()$SetupForDirectX(): %s is removed from DirectX key.$SetupForDirectX(): query dxsetup command: result = %d.$SetupForDirectX: InstallPlugIn() Succeeded.$SetupfForDirectX(): IA64 is not supported.$Software\Microsoft\DirectX$Source file not found$Unable to remove %s from DirectX key$Unknown OS$Unknown error$Unsupported window version$Version$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp$start finalizing: phase: %d - %d, total: %d - %d
        • API String ID: 3617327385-668854391
        • Opcode ID: 734502e9773cfb168d427ef4184d3b0ac02b68bc54aeec3c62ff6a3721abc00a
        • Instruction ID: de5d69779a932703464060fb1393d45ef393beff426c52b3e04b7b1fa79279cf
        • Opcode Fuzzy Hash: 734502e9773cfb168d427ef4184d3b0ac02b68bc54aeec3c62ff6a3721abc00a
        • Instruction Fuzzy Hash: 6202D8B5948A157AD7205A648C81FDB77B8AB02308FF00D5FF115A3E80DF3B59758BA2

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 224 733f4b10-733f4b30 225 733f4ca9-733f4cb5 224->225 226 733f4b36-733f4b4b GetCurrentDirectoryW 224->226 229 733f4ced-733f4cf3 225->229 230 733f4cb7-733f4ccb GetProcAddress 225->230 227 733f4b4d-733f4b5f GetLastError 226->227 228 733f4b78-733f4b8e GetModuleFileNameW 226->228 231 733f4b64-733f4b6e call 733f64d5 227->231 232 733f4ba9-733f4bbb call 733f6e8f 228->232 233 733f4b90-733f4ba7 GetLastError 228->233 235 733f4d2b-733f4d31 229->235 236 733f4cf5-733f4d09 GetProcAddress 229->236 230->229 234 733f4ccd-733f4ce3 GetLastError 230->234 248 733f4b71-733f4b73 231->248 250 733f4c93-733f4c9f 232->250 251 733f4bc1-733f4bd7 SetCurrentDirectoryW 232->251 233->231 234->229 239 733f4d33-733f4d47 GetProcAddress 235->239 240 733f4d71-733f4d77 235->240 236->235 237 733f4d0b-733f4d21 GetLastError 236->237 237->235 243 733f4d69 239->243 244 733f4d49-733f4d5f GetLastError 239->244 245 733f4daf-733f4db5 240->245 246 733f4d79-733f4d8d GetProcAddress 240->246 243->240 244->243 252 733f4ded-733f4df3 245->252 253 733f4db7-733f4dcb GetProcAddress 245->253 246->245 249 733f4d8f-733f4da5 GetLastError 246->249 256 733f4e6c-733f4e7a call 733f6df2 248->256 249->245 250->225 257 733f4bd9-733f4bf0 GetLastError 251->257 258 733f4bf5-733f4c0f call 733f49bf 251->258 254 733f4e2b-733f4e31 252->254 255 733f4df5-733f4e09 GetProcAddress 252->255 253->252 259 733f4dcd-733f4de3 GetLastError 253->259 261 733f4e69-733f4e6b 254->261 262 733f4e33-733f4e47 GetProcAddress 254->262 255->254 260 733f4e0b-733f4e21 GetLastError 255->260 257->231 268 733f4c3a-733f4c51 LoadLibraryW SetCurrentDirectoryW 258->268 269 733f4c11-733f4c35 call 733f64d5 258->269 259->252 260->254 261->256 262->261 265 733f4e49-733f4e5f GetLastError 262->265 265->261 271 733f4c6f-733f4c75 268->271 272 733f4c53-733f4c65 GetLastError 268->272 269->248 271->225 274 733f4c77-733f4c89 GetLastError 271->274 272->271 274->250
        APIs
        • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 733F4B43
        • GetLastError.KERNEL32(00000000), ref: 733F4B4E
        • GetModuleFileNameW.KERNEL32(?,00000104), ref: 733F4B86
        • GetLastError.KERNEL32(00000000), ref: 733F4B91
        • SetCurrentDirectoryW.KERNEL32(?), ref: 733F4BD3
        • GetLastError.KERNEL32(00000000), ref: 733F4BDA
        • LoadLibraryW.KERNEL32(?,?,00000104,\DSETUP32.DLL), ref: 733F4C3B
        • SetCurrentDirectoryW.KERNEL32(?), ref: 733F4C4D
        • GetLastError.KERNEL32(00000000), ref: 733F4C54
        • GetLastError.KERNEL32(00000000), ref: 733F4C78
        • GetProcAddress.KERNEL32(iDirectXSetup), ref: 733F4CC2
        • GetLastError.KERNEL32(Module: dsetup32.dll, Function: iDirectXSetup), ref: 733F4CD2
        • GetProcAddress.KERNEL32(DirectXSetupCallback), ref: 733F4D00
        • GetLastError.KERNEL32(Module: dsetup32.dll, Function: DirectXSetupCallback), ref: 733F4D10
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorLast$CurrentDirectory$AddressProc$FileLibraryLoadModuleName
        • String ID: DirectXLoadString$DirectXSetupCallback$DirectXSetupSetCallback$DirectXSetupShowEULA$GetCurrentDirectory()$GetModuleFileName()$GetProcAddress()$LoadDSetup32$LoadLibrary()$Module: dsetup32.dll, Function: iDirectXSetupGetEULAA$Module: dsetup32.dll, Function: iDirectXSetupGetEULAW$Module: dsetup32.dll, Function: DirectXLoadString$Module: dsetup32.dll, Function: DirectXSetupCallback$Module: dsetup32.dll, Function: DirectXSetupSetCallback$Module: dsetup32.dll, Function: DirectXSetupShowEULA$Module: dsetup32.dll, Function: iDirectXSetup$SetCurrentDirectory()$Unable to create path string, %s%s.$Unable to find backslash.$\DSETUP32.DLL$\DSETUP32.DLL$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c$iDirectXSetup$iDirectXSetupGetEULAA$iDirectXSetupGetEULAW
        • API String ID: 3381434992-2627784856
        • Opcode ID: 1376c542de71636bad572f86240bdccc3521832ec3f98422717f6a9f5e303304
        • Instruction ID: 75e9233b4bb8017b27205bba6019efb96c22e7b1d68b3bbdcaca8b354fc9f697
        • Opcode Fuzzy Hash: 1376c542de71636bad572f86240bdccc3521832ec3f98422717f6a9f5e303304
        • Instruction Fuzzy Hash: 487163B6F04217BEE7317B62AF44F6A36BCEB14349BD046A6F999F9043D76048808F50

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 392 6ce5cec8-6ce5cf07 call 6ce56b4f call 6ce57269 397 6ce5cf40-6ce5cf46 392->397 398 6ce5cf09-6ce5cf18 call 6ce5ac39 392->398 399 6ce5cf5d-6ce5cf6d GetModuleHandleA call 6ce59a79 397->399 400 6ce5cf48-6ce5cf4b 397->400 398->397 405 6ce5cf1a-6ce5cf3b call 6ce56391 398->405 407 6ce5cf72-6ce5cf74 399->407 400->399 402 6ce5cf4d-6ce5cf5b call 6ce56b4f 400->402 411 6ce5cf7a-6ce5cf89 call 6ce585ae call 6ce5a078 402->411 415 6ce5d39b-6ce5d3a8 call 6ce5fc2e 405->415 410 6ce5d379-6ce5d37c 407->410 407->411 414 6ce5d39a 410->414 421 6ce5cfa1-6ce5cfa9 call 6ce5a303 411->421 422 6ce5cf8b-6ce5cf9c 411->422 414->415 427 6ce5cfc5 421->427 428 6ce5cfab-6ce5cfb4 421->428 423 6ce5d2be-6ce5d2cb call 6ce56391 422->423 423->410 432 6ce5cfc7-6ce5cfcc 427->432 430 6ce5cfb6-6ce5cfb9 428->430 431 6ce5cfc0-6ce5cfc3 428->431 430->431 433 6ce5cfbb-6ce5cfbe 430->433 431->432 434 6ce5cfdf-6ce5cff1 call 6ce5ac14 432->434 435 6ce5cfce-6ce5cfda call 6ce56b4f 432->435 433->427 433->431 440 6ce5cff3-6ce5d006 call 6ce56c43 434->440 441 6ce5d03a-6ce5d044 GetTempPathA 434->441 442 6ce5d395 call 6ce5a77b 435->442 451 6ce5d00c-6ce5d035 call 6ce56391 440->451 452 6ce5d1cf-6ce5d1ed call 6ce585ae call 6ce601ea 440->452 445 6ce5d0b5-6ce5d0bc call 6ce57269 441->445 446 6ce5d046-6ce5d06e GetLastError call 6ce56210 ExpandEnvironmentStringsA 441->446 442->414 455 6ce5d0be-6ce5d0c5 call 6ce581fa 445->455 456 6ce5d0cb-6ce5d0d2 445->456 446->452 458 6ce5d074-6ce5d089 ExpandEnvironmentStringsA 446->458 451->410 473 6ce5d260-6ce5d26f call 6ce5a078 452->473 474 6ce5d1ef-6ce5d1f8 call 6ce56cec 452->474 455->452 455->456 456->452 462 6ce5d0d8-6ce5d0e8 GetCurrentDirectoryA 456->462 458->452 463 6ce5d08f-6ce5d0b0 call 6ce56210 call 6ce575af 458->463 466 6ce5d1bc-6ce5d1cd GetLastError call 6ce56210 462->466 467 6ce5d0ee-6ce5d101 call 6ce5a078 462->467 463->452 482 6ce5d1ce 466->482 480 6ce5d103-6ce5d114 467->480 481 6ce5d119-6ce5d12e call 6ce566cc 467->481 487 6ce5d284-6ce5d2a6 GetTempFileNameA 473->487 488 6ce5d271-6ce5d282 473->488 485 6ce5d1fd-6ce5d1ff 474->485 480->423 481->452 495 6ce5d134-6ce5d13b 481->495 482->452 485->473 489 6ce5d201-6ce5d211 CreateDirectoryA 485->489 491 6ce5d2d0-6ce5d2e2 call 6ce5a365 487->491 492 6ce5d2a8-6ce5d2b9 GetLastError 487->492 488->423 493 6ce5d213-6ce5d21e GetLastError 489->493 494 6ce5d24d-6ce5d25f call 6ce56210 489->494 511 6ce5d2e4-6ce5d2f7 call 6ce56391 491->511 512 6ce5d2fa-6ce5d30a CreateDirectoryA 491->512 492->423 493->473 499 6ce5d220-6ce5d24b call 6ce56210 call 6ce575af 493->499 494->473 497 6ce5d146-6ce5d15c GetDriveTypeA 495->497 498 6ce5d13d-6ce5d144 495->498 503 6ce5d1b0-6ce5d1ba call 6ce56210 497->503 504 6ce5d15e-6ce5d161 497->504 498->497 502 6ce5d16d-6ce5d18d call 6ce56c43 498->502 499->473 502->452 524 6ce5d18f-6ce5d1ab 502->524 503->482 504->503 507 6ce5d163-6ce5d166 504->507 507->502 515 6ce5d168-6ce5d16b 507->515 511->512 513 6ce5d33c-6ce5d344 512->513 514 6ce5d30c-6ce5d33a GetLastError call 6ce56391 512->514 522 6ce5d354-6ce5d359 513->522 523 6ce5d346-6ce5d353 call 6ce601ea 513->523 514->414 515->452 515->502 529 6ce5d37e-6ce5d38f call 6ce56b8b 522->529 530 6ce5d35b-6ce5d370 522->530 523->522 528 6ce5d371-6ce5d376 call 6ce56391 524->528 528->410 529->442 530->528
        APIs
          • Part of subcall function 6CE5AC39: RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion,00000000,00000001,?), ref: 6CE5AC6E
        • GetModuleHandleA.KERNEL32(00000000,?,?,?,00000104,?,?,?), ref: 6CE5CF66
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563C2
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563CB
          • Part of subcall function 6CE56391: _strrchr.LIBCMT ref: 6CE56411
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: __wstrtime$HandleModuleOpen_strrchr
        • String ID: %temp%$%tmp%$BuildPaths(): GetCurrentDirectory() failed, error = %d, continue...$BuildPaths(): GetTempPath(): Unable to get temp path due to code:%d, try to scan environment value.$BuildPaths(): Unable to get temp path from environment value, use system drive.$BuildPaths(): temp directory %s is created.$BuildPaths(): unable to create temp directory: %s, error = %d, use system drive.$BuildPaths(): unable to detect drive type, continue...$CSetup::BuildPaths$CreateDirectory()$DeleteTempDir() failed. (Not fatal...)$DirectX$GetTempFileName()$New temp path is too long, %s.$Unable to create path string, %s%s.$Unable to create path string, %stemp\.$Unable to find Program Files directory.$\$\$appendSlash() failed.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp$temp\
        • API String ID: 3670481093-1835560824
        • Opcode ID: f95ed0f390a2c7de42dd9102d270fa7681e6529024fc37c5c1d3cf299cc75b28
        • Instruction ID: b867800a01c735a82e2aebc472cf1d270f53e418d69c3a44d4a3e30bfdbfb430
        • Opcode Fuzzy Hash: f95ed0f390a2c7de42dd9102d270fa7681e6529024fc37c5c1d3cf299cc75b28
        • Instruction Fuzzy Hash: 8EC1C6BA5442047AE7119AB18E45FEB77BC9B0630CFF00959F515E2A81EB33DB748631

        Control-flow Graph

        APIs
        • _strnlen.LIBCMT ref: 6CE5A7A9
        • _strnlen.LIBCMT ref: 6CE5A7BD
        • CreateDirectoryA.KERNEL32(?,00000000,?,00000104,system,?,00000104,?,CSetup::BuildPaths,e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp,00000104), ref: 6CE5A82B
        • CreateDirectoryA.KERNEL32(?,00000000,?,00000104,inf,?,00000104,?), ref: 6CE5A85E
        • CreateDirectoryA.KERNEL32(?,00000000,?,00000104,help,?,00000104,?), ref: 6CE5A891
        • CreateDirectoryA.KERNEL32(?,00000000,?,00000104,directx,?,00000104,?), ref: 6CE5A8C4
        • CreateDirectoryA.KERNEL32(?,00000000,?,00000104,drivers,?,00000104,?), ref: 6CE5A8F3
        • CreateDirectoryA.KERNEL32(?,00000000,?,00000104,sysbckup,?,00000104,?), ref: 6CE5A922
        • GetLastError.KERNEL32 ref: 6CE5A928
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: CreateDirectory$_strnlen$ErrorLast
        • String ID: CSetup::BuildPaths$CreateDirectory()$MakeTempSubDirectorys$Temp directory is too long, %s%s.$directx$drivers$e:\bt\382730\setup\deliverables\dsetup\dsetup32\inline.h$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp$help$inf$sysbckup$system
        • API String ID: 2702963399-732964606
        • Opcode ID: 073f86eb9f172ca32a73dec9f18adb1e88ad927d586bcd005709fcc90b0c6e32
        • Instruction ID: c1732e54d142422e8bcb9da690fbf49deebd35dcbc06665c376d3821d008530b
        • Opcode Fuzzy Hash: 073f86eb9f172ca32a73dec9f18adb1e88ad927d586bcd005709fcc90b0c6e32
        • Instruction Fuzzy Hash: D951C2B2D442287ADB509AA09C84FDF73BC9F55358FA008A5B584E3680DE76DAD48B70

        Control-flow Graph

        APIs
        • CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000003,00000000,00000000), ref: 6CE5D9AA
        • GetFileTime.KERNEL32(?,?,?,?,?,40000000,00000000,00000000,00000003,00000000,00000000), ref: 6CE5D9DA
        • LocalFileTimeToFileTime.KERNEL32(?,?,?,40000000,00000000,00000000,00000003,00000000,00000000), ref: 6CE5D9FD
        • SetFileTime.KERNEL32(?,?,?,?,?,40000000,00000000,00000000,00000003,00000000,00000000), ref: 6CE5DA16
        • GetLastError.KERNEL32(00000000,?,40000000,00000000,00000000,00000003,00000000,00000000), ref: 6CE5DA21
        • GetLastError.KERNEL32(00000000,?,40000000,00000000,00000000,00000003,00000000,00000000), ref: 6CE5DA37
        • GetLastError.KERNEL32(00000000,?,40000000,00000000,00000000,00000003,00000000,00000000), ref: 6CE5DA4D
        • CloseHandle.KERNEL32(?), ref: 6CE5DA6E
        • GetLastError.KERNEL32(00000000), ref: 6CE5DA79
        • GetLastError.KERNEL32(Unable to open %s.,?,?,40000000,00000000,00000000,00000003,00000000,00000000), ref: 6CE5DA9D
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorFileLast$Time$CloseCreateHandleLocal
        • String ID: CabCallback$CloseHandle()$CreateFile()$Extracted file %s from cab$GetFileTime()$LocalFileTimeToFileTime()$SPFILENOTIFY_FILEEXTRACTED: error = %d.$SetFileTime()$Unable to open %s.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
        • API String ID: 2084486756-1895325444
        • Opcode ID: ab134ff6103662f834fb62a2b1cda2326256e08e18923a0301c60b1dc2ff01ae
        • Instruction ID: 2b3814956455609f02bcc0a001bd75fe562294c803ca547be482f26bb48821fe
        • Opcode Fuzzy Hash: ab134ff6103662f834fb62a2b1cda2326256e08e18923a0301c60b1dc2ff01ae
        • Instruction Fuzzy Hash: CE41E479604224ABDB118B61CD44FAB7B7CEF06618FF00956F514EAA91DA23DA70CA60

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 623 6ce595fd-6ce5963a LoadLibraryA 624 6ce59640-6ce59657 GetProcAddress 623->624 625 6ce5997a-6ce59985 GetLastError 623->625 626 6ce5965d-6ce59672 624->626 627 6ce5984e-6ce5985d GetProcAddress 624->627 628 6ce59987-6ce5998a 625->628 629 6ce599be-6ce599c8 call 6ce56210 625->629 626->627 640 6ce59678-6ce59693 626->640 631 6ce59960 627->631 632 6ce59863-6ce5987a 627->632 628->629 633 6ce5998c-6ce5998f 628->633 639 6ce599c9-6ce599dc call 6ce5fc2e 629->639 637 6ce59965-6ce5996a call 6ce56210 631->637 646 6ce59880-6ce598dd call 6ce60721 * 3 632->646 647 6ce59959-6ce5995e 632->647 633->629 634 6ce59991-6ce59996 633->634 634->629 638 6ce59998-6ce599bc GetLastError call 6ce56391 634->638 652 6ce5996b-6ce59978 FreeLibrary 637->652 638->639 654 6ce5983d-6ce59849 640->654 655 6ce59699-6ce596b7 640->655 666 6ce598df-6ce598e5 646->666 667 6ce59939-6ce59957 call 6ce56391 646->667 647->637 652->639 654->652 661 6ce59831-6ce59839 655->661 662 6ce596bd 655->662 661->654 664 6ce596c2-6ce596ca 662->664 664->661 665 6ce596d0-6ce596f0 664->665 673 6ce596f6-6ce59752 call 6ce60721 * 3 665->673 674 6ce59801-6ce5982b 665->674 666->667 669 6ce598e7-6ce598e9 666->669 667->652 669->667 672 6ce598eb-6ce598f1 669->672 675 6ce598f3-6ce598f6 672->675 676 6ce598f8 672->676 673->674 692 6ce59758-6ce5975e 673->692 674->661 674->664 675->676 678 6ce598fb-6ce59937 call 6ce606fa * 3 call 6ce56210 675->678 676->678 678->652 692->674 694 6ce59764-6ce59766 692->694 694->674 696 6ce5976c-6ce59772 694->696 697 6ce59774-6ce59777 696->697 698 6ce59779 696->698 697->698 699 6ce5977c-6ce597b8 call 6ce606fa * 3 call 6ce56210 697->699 698->699 707 6ce597bd-6ce597ca 699->707 708 6ce597d1-6ce597d3 707->708 709 6ce597cc-6ce597cf 707->709 711 6ce597d5-6ce597d7 708->711 712 6ce597e2-6ce597eb 708->712 709->708 710 6ce597ff 709->710 710->674 713 6ce597dd-6ce597e0 711->713 712->713 714 6ce597ed-6ce597f0 712->714 715 6ce597f2 713->715 714->715 716 6ce597f5 714->716 715->716 716->710
        APIs
        • LoadLibraryA.KERNEL32(mscoree.dll), ref: 6CE5962C
        • GetProcAddress.KERNEL32(00000000,CLRCreateInstance), ref: 6CE5964D
        • GetProcAddress.KERNEL32(?,GetCORVersion), ref: 6CE59859
        • FreeLibrary.KERNEL32(?), ref: 6CE59971
        • GetLastError.KERNEL32 ref: 6CE59980
        • GetLastError.KERNEL32(Unable to load mscoree.dll.), ref: 6CE5999D
        Strings
        • mscoree.dll is not available., xrefs: 6CE599BE
        • CLRCreateInstance, xrefs: 6CE59647
        • e:\bt\382730\setup\deliverables\dsetup\dsetup32\inline.h, xrefs: 6CE5994A, 6CE599AF
        • CLR version number = %d.%d.%d, xrefs: 6CE59920
        • mscoree.dll, xrefs: 6CE59619
        • Unable to get CLR build number., xrefs: 6CE59939
        • CLR version number = %d.%d.%d, xrefs: 6CE597B3
        • GetCORVersion() failed, function deprecated for .NET Framework 4.0., xrefs: 6CE59959
        • GetCORVersion not found in mscoree.dll, function deprecated for .NET Framework 4.0., xrefs: 6CE59960
        • LoadLibrary(), xrefs: 6CE599A0
        • Unable to load mscoree.dll., xrefs: 6CE59998
        • GetCORVersion, xrefs: 6CE5984E
        • GetDotNETFrameworkVersion, xrefs: 6CE59940, 6CE599A5
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: AddressErrorLastLibraryProc$FreeLoad
        • String ID: CLR version number = %d.%d.%d$CLR version number = %d.%d.%d$CLRCreateInstance$GetCORVersion$GetCORVersion not found in mscoree.dll, function deprecated for .NET Framework 4.0.$GetCORVersion() failed, function deprecated for .NET Framework 4.0.$GetDotNETFrameworkVersion$LoadLibrary()$Unable to get CLR build number.$Unable to load mscoree.dll.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\inline.h$mscoree.dll$mscoree.dll is not available.
        • API String ID: 1490555712-1049337429
        • Opcode ID: aba4f44a97ada542d04f1e807c1ee7ee1a78a650a34536e0dda88df6c9fab11d
        • Instruction ID: 0ce56d04b1fc260b3616969f43b1506cd40fdd5efb400d9e89d6c517d42a8652
        • Opcode Fuzzy Hash: aba4f44a97ada542d04f1e807c1ee7ee1a78a650a34536e0dda88df6c9fab11d
        • Instruction Fuzzy Hash: A7A143F19012149BDB60CF95CC84ED9B7B8BF45308FB0489EE60AA7A00DB36D995CF14

        Control-flow Graph

        APIs
        • GetWindowsDirectoryA.KERNEL32(?,00000104,?,00000258), ref: 733F6248
        • OutputDebugStringA.KERNEL32(DXSETUP_DPF(): Unable to open log file.,?,00000258), ref: 733F6257
        • CreateDirectoryA.KERNEL32(?,00000000), ref: 733F6297
        • GetLastError.KERNEL32 ref: 733F62A1
        • __wstrtime.LIBCMT ref: 733F62FA
        • __wstrtime.LIBCMT ref: 733F6303
          • Part of subcall function 733F4A54: _vswprintf_s.LIBCMT ref: 733F4A87
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: Directory__wstrtime$CreateDebugErrorLastOutputStringWindows_vswprintf_s
        • String ID: %s %s: %s: %s$%s %s: %s: (null)$%s%s$%s%s%s$C:\Windows\Logs\DirectX.log$DSETUP$DXSETUP_DPF(): GetWindowsDirectory() failed.$DXSETUP_DPF(): Unable to open log file.$DXSETUP_DPF(): failed to create log directory.$DXSETUP_DPF(): path name too long.$Logs\DirectX.log$\Logs$pg?s
        • API String ID: 2971342511-1765272655
        • Opcode ID: beb47dbc393e13e42470d8a3167acf324926a4c79c62a768e7804d04440c3603
        • Instruction ID: e4621d31cc991bb62448a7a55229c3307719536892338937ad331bda8c2df90b
        • Opcode Fuzzy Hash: beb47dbc393e13e42470d8a3167acf324926a4c79c62a768e7804d04440c3603
        • Instruction Fuzzy Hash: B031DBB2E0421FBBE731E6A19D48FDF377C9B44240FC4016AFA55E6041E738D6494A55

        Control-flow Graph

        APIs
        • GetWindowsDirectoryA.KERNEL32(?,00000104,?,00000258), ref: 6CE560D5
        • OutputDebugStringA.KERNEL32(DXSETUP_DPF(): Unable to open log file.,?,00000258), ref: 6CE560E4
        • CreateDirectoryA.KERNEL32(?,00000000), ref: 6CE56124
        • GetLastError.KERNEL32 ref: 6CE5612E
        • __wstrtime.LIBCMT ref: 6CE56187
        • __wstrtime.LIBCMT ref: 6CE56190
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: Directory__wstrtime$CreateDebugErrorLastOutputStringWindows
        • String ID: %s %s: %s: %s$%s %s: %s: (null)$%s%s$%s%s%s$,fl$C:\Windows\Logs\DirectX.log$DXSETUP_DPF(): GetWindowsDirectory() failed.$DXSETUP_DPF(): Unable to open log file.$DXSETUP_DPF(): failed to create log directory.$DXSETUP_DPF(): path name too long.$Logs\DirectX.log$\Logs$dsetup32
        • API String ID: 1979891910-153879820
        • Opcode ID: dad18a24f95e29b9272df667c7a5694f171abbbe4bb2333fe4ebf453bb181b6c
        • Instruction ID: 6260d719c69ddf6dcfe0b5bd1543d870402f8e3ff8f6d825ea1e17a6ac07276a
        • Opcode Fuzzy Hash: dad18a24f95e29b9272df667c7a5694f171abbbe4bb2333fe4ebf453bb181b6c
        • Instruction Fuzzy Hash: A731C6B2D04518BBD7109EE18D44EEF73BC9B05348FF049A9E604E2F01E737DA294665

        Control-flow Graph

        APIs
        • OutputDebugStringA.KERNEL32(DLL_PROCESS_ATTACH), ref: 733F377E
        • CreateMutexA.KERNEL32(00000000,00000000,DSETUP DLL Mutex), ref: 733F378B
        • GetLastError.KERNEL32(?,?,DSETUP DLL Mutex), ref: 733F37A3
        • GetLastError.KERNEL32(00000000), ref: 733F37D2
        • CloseHandle.KERNEL32(00000000), ref: 733F37FA
        • GetLastError.KERNEL32(00000000), ref: 733F3809
        • OutputDebugStringA.KERNEL32(DLL_PROCESS_DETACH), ref: 733F381F
        • CloseHandle.KERNEL32 ref: 733F3839
        • GetLastError.KERNEL32(00000000), ref: 733F3855
        • FreeLibrary.KERNEL32(6CE50000), ref: 733F3876
        • GetLastError.KERNEL32 ref: 733F3880
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorLast$CloseDebugHandleOutputString$CreateFreeLibraryMutex
        • String ID: CloseHandle()$CreateMutex()$DLL_PROCESS_ATTACH$DLL_PROCESS_DETACH$DSETUP DLL Mutex$DllMain$FreeLibrary()$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c
        • API String ID: 619473299-1708209621
        • Opcode ID: 15616f90f49277fe0f14927a605ee75117464df3a41c7d8307ec209435b5368c
        • Instruction ID: 8ef245a0f0f1ed2fe847ab629add444300940b7c4b6010e8d613b6e83927ea4f
        • Opcode Fuzzy Hash: 15616f90f49277fe0f14927a605ee75117464df3a41c7d8307ec209435b5368c
        • Instruction Fuzzy Hash: 8E31D572F04213BFE3307BB69E48F1E376CE705671BE44155FD0EE6181D72A84048AA4

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 919 6ce58ee0-6ce58f11 920 6ce58f13-6ce58f1c call 6ce5cec8 919->920 921 6ce58f2d-6ce58f48 call 6ce56cec 919->921 920->921 926 6ce58f1e-6ce58f28 SetLastError 920->926 927 6ce58f4e-6ce58f57 call 6ce56cec 921->927 928 6ce5913b-6ce59156 call 6ce56210 call 6ce5fc92 921->928 929 6ce591af-6ce591bc call 6ce5fc2e 926->929 936 6ce58f5d-6ce58f71 call 6ce56cec 927->936 937 6ce590c8-6ce590cf call 6ce56210 927->937 942 6ce59164 928->942 943 6ce59158 928->943 949 6ce58f90-6ce58f97 936->949 950 6ce58f73-6ce58f7c call 6ce56cec 936->950 945 6ce590d4-6ce590e3 call 6ce5fc92 937->945 948 6ce59166-6ce5916a 942->948 947 6ce59159-6ce5915b call 6ce58d2e 943->947 945->942 958 6ce590e5-6ce590e6 945->958 959 6ce59160-6ce59162 947->959 955 6ce59174-6ce59194 call 6ce56391 948->955 956 6ce5916c-6ce5916e 948->956 954 6ce58f9b-6ce58fab call 6ce56c43 949->954 963 6ce58f7e-6ce58f8b call 6ce56210 950->963 964 6ce58f99-6ce58f9a 950->964 969 6ce58fad-6ce58fb3 954->969 970 6ce58fdf-6ce58ff3 call 6ce5e432 954->970 971 6ce591a4 955->971 972 6ce59196-6ce5919d call 6ce585e5 955->972 956->955 961 6ce59170-6ce59172 956->961 958->947 959->948 966 6ce591ae 961->966 974 6ce591a6-6ce591ac SetLastError 963->974 964->954 966->929 976 6ce58fb5 969->976 977 6ce58fbb-6ce58fda call 6ce56391 969->977 982 6ce58ff5-6ce58ffa 970->982 983 6ce58fff-6ce59020 call 6ce56210 call 6ce5fc92 970->983 971->974 985 6ce5919e-6ce591a3 call 6ce5fc82 972->985 974->966 976->977 977->974 982->974 992 6ce59022-6ce59024 call 6ce5d6cd 983->992 993 6ce5902d 983->993 985->971 996 6ce59029-6ce5902b 992->996 995 6ce5902f-6ce59033 993->995 997 6ce5910f-6ce5912f call 6ce56391 995->997 998 6ce59039-6ce5903b 995->998 996->995 997->971 1006 6ce59131-6ce59139 call 6ce585e5 997->1006 998->997 1000 6ce59041-6ce59068 SetupIterateCabinetA 998->1000 1002 6ce590af-6ce590bf call 6ce585e5 call 6ce5fc82 call 6ce56cec 1000->1002 1003 6ce5906a-6ce590aa GetLastError call 6ce56391 call 6ce585e5 call 6ce5fc82 1000->1003 1018 6ce590c4-6ce590c6 1002->1018 1003->974 1006->985 1018->937 1019 6ce590e8-6ce5910a call 6ce56391 1018->1019 1019->974
        APIs
        • SetLastError.KERNEL32(00000003,00000000), ref: 6CE58F20
        • SetLastError.KERNEL32(00000001,?,?,?,?,?,?,?), ref: 6CE591A6
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorLast
        • String ID: CSetup::GetCDXUpdate$GetCDXUpdate(): Extracting %s from %s.$GetCDXUpdate(): Loading %s in %s.$GetCDXUpdate(): no DXUpdate.$SetupIterateCabinet()$Unable to create path string, %s%s.$Unable to find dxupdate.dll.$Unable to initialize CDXUpdate.$Unable to initialize CSetupAPI.$Unable to iterate through %s. The file may be damaged.$dxupdate.cab$dxupdate.dll$e:\bt\382730\setup\deliverables\dsetup\dsetup32\dxupdate.cpp
        • API String ID: 1452528299-2091673329
        • Opcode ID: 7a014f3ac577046bf4246cae0b7ac583fe02e649111a7a57263cb7c20dce23cb
        • Instruction ID: 285621221aa7f0199c834c136aea3a1da074d552feb3d6c62c3c2257aca38265
        • Opcode Fuzzy Hash: 7a014f3ac577046bf4246cae0b7ac583fe02e649111a7a57263cb7c20dce23cb
        • Instruction Fuzzy Hash: 5F6167B2A801143AE72416258D0AFEB237C9F9234CFF10559F505E6F80FF739A7586A1

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1022 6ce569f7-6ce56a09 1023 6ce56a13-6ce56a28 LoadLibraryA 1022->1023 1024 6ce56a0b-6ce56a0e 1022->1024 1026 6ce56ad4-6ce56af7 GetLastError call 6ce56391 1023->1026 1027 6ce56a2e-6ce56a65 GetProcAddress * 3 1023->1027 1025 6ce56aff-6ce56b01 1024->1025 1034 6ce56afa-6ce56afe 1026->1034 1029 6ce56a67-6ce56a6d 1027->1029 1030 6ce56a7c-6ce56ab4 GetLastError call 6ce56391 FreeLibrary 1027->1030 1029->1030 1032 6ce56a6f-6ce56a71 1029->1032 1037 6ce56ab6-6ce56ac8 GetLastError call 6ce56391 1030->1037 1038 6ce56acb-6ce56ad2 1030->1038 1032->1030 1035 6ce56a73-6ce56a7a 1032->1035 1034->1025 1035->1034 1037->1038 1038->1034
        APIs
        • LoadLibraryA.KERNEL32(sfc.dll), ref: 6CE56A1B
        • GetProcAddress.KERNEL32(00000000,00000008), ref: 6CE56A37
        • GetProcAddress.KERNEL32(00000009), ref: 6CE56A46
        • GetProcAddress.KERNEL32(SRSetRestorePoint), ref: 6CE56A58
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: AddressProc$LibraryLoad
        • String ID: FreeLibrary()$GetProcAddress()$LoadLibrary()$LoadSfcDLL$Module: %s$SRSetRestorePoint$Unable to load %s.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\instcat.cpp$sfc.dll
        • API String ID: 2238633743-316262473
        • Opcode ID: fd14f2bd62afe646e497dbed65ac7c6f4c8113b269fabb64e05259bd5505ccde
        • Instruction ID: 1072baf78292c67bb8da943c29852fcc68b94b435f58ef95813d48bc53aa67e5
        • Opcode Fuzzy Hash: fd14f2bd62afe646e497dbed65ac7c6f4c8113b269fabb64e05259bd5505ccde
        • Instruction Fuzzy Hash: 012195BAA50240BFDB105FD68C85A6B3A7CE747648BA04929F501D7781E7739C208A91

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1041 6ce5b021-6ce5b043 call 6ce571e9 1044 6ce5b045 1041->1044 1045 6ce5b063-6ce5b06a call 6ce570ae 1041->1045 1046 6ce5b04a-6ce5b04f 1044->1046 1050 6ce5b073 call 6ce57157 1045->1050 1051 6ce5b06c-6ce5b071 1045->1051 1049 6ce5b055-6ce5b061 call 6ce56b4f 1046->1049 1056 6ce5b09f-6ce5b164 call 6ce56b4f GetWindowsDirectoryA 1049->1056 1055 6ce5b078-6ce5b085 1050->1055 1051->1046 1057 6ce5b087-6ce5b08c 1055->1057 1058 6ce5b08e-6ce5b09a call 6ce56b4f 1055->1058 1063 6ce5b166-6ce5b18d GetLastError call 6ce56391 1056->1063 1064 6ce5b18f-6ce5b1aa call 6ce585ae call 6ce5a078 1056->1064 1057->1049 1058->1056 1070 6ce5b1c7 1063->1070 1072 6ce5b1ca-6ce5b1da GetSystemDirectoryA 1064->1072 1073 6ce5b1ac-6ce5b1c2 call 6ce56391 1064->1073 1070->1072 1074 6ce5b205-6ce5b214 call 6ce5a078 1072->1074 1075 6ce5b1dc-6ce5b203 GetLastError call 6ce56391 1072->1075 1073->1070 1082 6ce5b234-6ce5b239 1074->1082 1083 6ce5b216-6ce5b22c call 6ce56391 1074->1083 1081 6ce5b231 1075->1081 1081->1082 1083->1081
        APIs
        • GetWindowsDirectoryA.KERNEL32(0000028C,00000104,0000069C,00000104,DirectX.cab,00000598,00000104,directX.inf,?,?,?,6CE5F10C), ref: 6CE5B15C
        • GetLastError.KERNEL32(00000000,?,?,?,6CE5F10C), ref: 6CE5B167
        • GetSystemDirectoryA.KERNEL32(00000390,00000104), ref: 6CE5B1D2
        • GetLastError.KERNEL32(00000000,?,?,?,6CE5F10C), ref: 6CE5B1DD
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: DirectoryErrorLast$SystemWindows
        • String ID: CSetup::CSetup$DXNT.cab$DirectX.cab$GetSystemDirectory()$GetWindowsDirectory()$appendSlash() failed.$directX.inf$dxnetsrv.inf$dxnt.inf$dxxp.inf$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
        • API String ID: 3455926257-880669496
        • Opcode ID: 2d405dd11e467f9d95a6f3402b225b5be92ae7f2b6c9f6702a544351aa4f567f
        • Instruction ID: 4ec7f80cc52b6bd6278ad9fe97ac1d01a5f13c1c4222acddf1967fd6daeaad73
        • Opcode Fuzzy Hash: 2d405dd11e467f9d95a6f3402b225b5be92ae7f2b6c9f6702a544351aa4f567f
        • Instruction Fuzzy Hash: 3751E4B1905B409FD3608F6B8985A87FBFCBF59204FE4492EA59ED3E01D736A0148B21
        APIs
        • RegCreateKeyExA.KERNEL32(80000002,Software\Microsoft\DirectX,00000000,00000000,00000000,00000002,00000000,?,00000000), ref: 00E73F98
        • RegSetValueExA.KERNEL32(?,command,00000000,00000004,00000001,00000004), ref: 00E73FDA
        • RegSetValueExA.KERNEL32(?,DXSetup,00000000,00000004,00000001,00000004), ref: 00E73FFF
        • RegDeleteValueA.ADVAPI32(?,Command), ref: 00E74027
        • RegCloseKey.KERNEL32(?), ref: 00E74061
          • Part of subcall function 00E7390A: __wstrtime.LIBCMT ref: 00E7393B
          • Part of subcall function 00E7390A: __wstrtime.LIBCMT ref: 00E73944
          • Part of subcall function 00E7390A: _strrchr.LIBCMT ref: 00E7398A
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: Value$__wstrtime$CloseCreateDelete_strrchr
        • String ID: Command$DXSetup$RegCloseKey()$RegCreateKeyEx()$RegDeleteValue()$RegSetValueEx()$SetDXSetupRegValue$Software\Microsoft\DirectX$command$e:\bt\382730\setup\deliverables\dxsetup\dxsetup.cpp
        • API String ID: 3730219414-2970793184
        • Opcode ID: ec38d2ee4dbfa69ec02c33de4e073d34a1490d2098fbbf26ccb2a11dd4906445
        • Instruction ID: 3bd71975577ff2e22fb7dd7504c6755c910dc163286313ad8e15190269231b7e
        • Opcode Fuzzy Hash: ec38d2ee4dbfa69ec02c33de4e073d34a1490d2098fbbf26ccb2a11dd4906445
        • Instruction Fuzzy Hash: DA21A3F1680348BEF7245A599CC7EBF396DDB42B89F1094A9F70CB10D1D3A04E4496B2
        APIs
        • _memset.LIBCMT ref: 6CE5E4A7
        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104,?,dxupdate.cab,?), ref: 6CE5E4D1
        • GetLastError.KERNEL32(00000000,?,dxupdate.cab,?), ref: 6CE5E4DC
        Strings
        • CSetup::DXCheckTrust, xrefs: 6CE5E4E8, 6CE5E5DF, 6CE5E60A, 6CE5E627, 6CE5E657
        • DXCheckTrust(): %s is trusted., xrefs: 6CE5E5B4
        • MultiByteToWideChar(), xrefs: 6CE5E4E3
        • %s is not trusted due to certificate problem. Please check valid certificate is installed and Cryptographic Services are enabled., xrefs: 6CE5E61C
        • Unable to initialize CWinTrust., xrefs: 6CE5E650
        • WinVerifyTrust(), xrefs: 6CE5E5DA, 6CE5E605, 6CE5E622
        • 0, xrefs: 6CE5E52B
        • e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp, xrefs: 6CE5E4F2, 6CE5E631, 6CE5E661
        • %s is not trusted. The file may be damaged. Please check valid certificate is installed and Cryptographic Services are enabled., xrefs: 6CE5E5FF
        • %s is not trusted. The file is not signed properly., xrefs: 6CE5E5D4
        • dxupdate.cab, xrefs: 6CE5E467
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: ByteCharErrorLastMultiWide_memset
        • String ID: %s is not trusted due to certificate problem. Please check valid certificate is installed and Cryptographic Services are enabled.$%s is not trusted. The file is not signed properly.$%s is not trusted. The file may be damaged. Please check valid certificate is installed and Cryptographic Services are enabled.$0$CSetup::DXCheckTrust$DXCheckTrust(): %s is trusted.$MultiByteToWideChar()$Unable to initialize CWinTrust.$WinVerifyTrust()$dxupdate.cab$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
        • API String ID: 1545292163-1626623308
        • Opcode ID: b4254dc09e2d0f7b2150d1bd1ad87f4ab9e2a2aa3d2b8ec3ad51ad3eeb49d6a1
        • Instruction ID: 2fb4b49829ee58b6d2916cc2c7482159456af5e3bb1fd4c5a84f4adb0d399497
        • Opcode Fuzzy Hash: b4254dc09e2d0f7b2150d1bd1ad87f4ab9e2a2aa3d2b8ec3ad51ad3eeb49d6a1
        • Instruction Fuzzy Hash: 7351DC719442187ADB104F54CC88BED73B8AB44348FF005EFE508A7680EB769EB48F91
        APIs
        • OutputDebugStringA.KERNEL32(DLL_PROCESS_ATTACH), ref: 6CE5E74B
          • Part of subcall function 6CE5B021: GetWindowsDirectoryA.KERNEL32(0000028C,00000104,0000069C,00000104,DirectX.cab,00000598,00000104,directX.inf,?,?,?,6CE5F10C), ref: 6CE5B15C
          • Part of subcall function 6CE5B021: GetLastError.KERNEL32(00000000,?,?,?,6CE5F10C), ref: 6CE5B167
          • Part of subcall function 6CE5B021: GetSystemDirectoryA.KERNEL32(00000390,00000104), ref: 6CE5B1D2
          • Part of subcall function 6CE5B021: GetLastError.KERNEL32(00000000,?,?,?,6CE5F10C), ref: 6CE5B1DD
        • CreateMutexA.KERNEL32(00000000,00000000,DSETUP32 DLL Mutex), ref: 6CE5E78A
        • GetLastError.KERNEL32 ref: 6CE5E79C
        • CloseHandle.KERNEL32(00000000), ref: 6CE5E7C5
        • GetLastError.KERNEL32(00000000), ref: 6CE5E7D0
        • OutputDebugStringA.KERNEL32(DLL_PROCESS_DETACH), ref: 6CE5E7F3
        • CloseHandle.KERNEL32(?), ref: 6CE5E81B
        • GetLastError.KERNEL32(00000000), ref: 6CE5E826
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorLast$CloseDebugDirectoryHandleOutputString$CreateMutexSystemWindows
        • String ID: CloseHandle()$DLL_PROCESS_ATTACH$DLL_PROCESS_DETACH$DSETUP32 DLL Mutex$DllMain$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
        • API String ID: 3404843948-3774820900
        • Opcode ID: f4ee6eae5abf82f4d056c098c234d00d5f3ed34d0ae03ffd4a3ff9150c6c23e3
        • Instruction ID: 10a1df4886137acf944b58b93fec34765a125ea5303c822e7160e82c5f020918
        • Opcode Fuzzy Hash: f4ee6eae5abf82f4d056c098c234d00d5f3ed34d0ae03ffd4a3ff9150c6c23e3
        • Instruction Fuzzy Hash: E8318171754B00AFCB046FB68C8883A7778E71635D7F4492AE601D7B41EB3B98218AD1
        APIs
        • GetVersionExA.KERNEL32(?), ref: 6CE5D7DC
        • GetCurrentProcess.KERNEL32(?,00000000,00000000,WinNT@64), ref: 6CE5D84B
        • GetLastError.KERNEL32(00000000), ref: 6CE5D86E
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: CurrentErrorLastProcessVersion
        • String ID: ($IsWow64$IsWow64(): Windows 2000 or Windows 9x.$IsWow64(): not Wow64 process.$IsWow64(): running on Wow64.$IsWow64Process()$Unable to initialize CKernel32.$WinNT@64$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
        • API String ID: 722992446-1906961222
        • Opcode ID: 46c408b543f1c6899a11b9f5c25c85026c49e1822d5f1baca3a7775774486b9f
        • Instruction ID: 739e673f2948da03632b5f876197b99b583c114ebaaaae124fac1992d1183581
        • Opcode Fuzzy Hash: 46c408b543f1c6899a11b9f5c25c85026c49e1822d5f1baca3a7775774486b9f
        • Instruction Fuzzy Hash: 03310E39654200DBDB205BB98E45BDA73B8D747B2DFF0096DE115E3B80DB3B46A48B21
        APIs
        • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\DirectX,00000000,00000002,?), ref: 00E740AA
        • RegDeleteValueA.KERNEL32(?,DXSetup), ref: 00E740C1
        • RegDeleteValueA.KERNEL32(?,Command), ref: 00E740FA
        • RegCloseKey.ADVAPI32(?), ref: 00E7411F
          • Part of subcall function 00E7390A: __wstrtime.LIBCMT ref: 00E7393B
          • Part of subcall function 00E7390A: __wstrtime.LIBCMT ref: 00E73944
          • Part of subcall function 00E7390A: _strrchr.LIBCMT ref: 00E7398A
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: DeleteValue__wstrtime$CloseOpen_strrchr
        • String ID: Command$DXSetup$DelDXSetupRegValue$RegCloseKey().$RegDeleteValue()$RegOpenKeyEx()$Software\Microsoft\DirectX$e:\bt\382730\setup\deliverables\dxsetup\dxsetup.cpp
        • API String ID: 1208366470-3975958792
        • Opcode ID: 2349a9867811e05ff0e5c0eb8964d501dffc3f688f82ce173701419d3b444af5
        • Instruction ID: e3637214dd4f3b7fd72fd4969c2dac89a72808738d4e8dbabba75f51f7e52fce
        • Opcode Fuzzy Hash: 2349a9867811e05ff0e5c0eb8964d501dffc3f688f82ce173701419d3b444af5
        • Instruction Fuzzy Hash: 731182B17803047AF724665A5C0BFAB295DDB92B85F54A0A9FF0CF40D2E7908E40D1B5
        APIs
        • GetModuleFileNameA.KERNEL32(?,00000104), ref: 00E74C87
        • GetLastError.KERNEL32(00000000), ref: 00E74C92
          • Part of subcall function 00E7390A: __wstrtime.LIBCMT ref: 00E7393B
          • Part of subcall function 00E7390A: __wstrtime.LIBCMT ref: 00E73944
          • Part of subcall function 00E7390A: _strrchr.LIBCMT ref: 00E7398A
        • _strrchr.LIBCMT ref: 00E74CC6
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: __wstrtime_strrchr$ErrorFileLastModuleName
        • String ID: GetModuleFileName()$IsFlatImage$IsFlatImage(): TRUE.$IsFlatImage(): path does not have back slash.$directx.cab$directx.inf$dxnt.cab$dxntunp.inf$e:\bt\382730\setup\deliverables\dxsetup\dxsetup.cpp
        • API String ID: 3943934939-995788670
        • Opcode ID: 6f8bdaaa06aa52a23def3ae0026fb0975a88e9d28a625b175b8e970c0e9fe4e7
        • Instruction ID: 418684425226cc10883394e48475aedeada2e01dbdb249647da96a488ee02018
        • Opcode Fuzzy Hash: 6f8bdaaa06aa52a23def3ae0026fb0975a88e9d28a625b175b8e970c0e9fe4e7
        • Instruction Fuzzy Hash: 1921EBB46843096EE754E7F8DD42EE673EC9B10344F40A095F99DF50C1EFA0C9885611
        APIs
        • CreateMutexA.KERNEL32(00000000,00000000,***DirectXSetupA***), ref: 733F4FC2
        • GetLastError.KERNEL32 ref: 733F4FCE
        • iDirectXSetup.DSETUP32(?,?), ref: 733F5008
        • CloseHandle.KERNEL32(00000000), ref: 733F501A
        • GetLastError.KERNEL32(Not fatal...), ref: 733F5029
        Strings
        • Not fatal..., xrefs: 733F5024
        • DirectXSetupA(): hWnd: %08X dwFlags: %08X, xrefs: 733F4FAC
        • e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c, xrefs: 733F503F
        • CloseHandle(), xrefs: 733F5030
        • ***DirectXSetupA***, xrefs: 733F4FB9
        • DirectXSetupA, xrefs: 733F5035
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorLast$CloseCreateDirectHandleMutexSetup
        • String ID: ***DirectXSetupA***$CloseHandle()$DirectXSetupA$DirectXSetupA(): hWnd: %08X dwFlags: %08X$Not fatal...$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c
        • API String ID: 1105574552-1566507652
        • Opcode ID: 1a359415c05acad449e7f3dbc81819f59637d7c0b710222765effd7eee071cdb
        • Instruction ID: cc2e16b906fad741d50b85713a33c8a1890c16d55702974efbc5d06be3038a19
        • Opcode Fuzzy Hash: 1a359415c05acad449e7f3dbc81819f59637d7c0b710222765effd7eee071cdb
        • Instruction Fuzzy Hash: B211C673F00213BBF7303AA7AE04F9A7A6CEB55260BD44162FD1AA6181D76489004BE1
        APIs
        • __get_daylight.LIBCMT ref: 00E7FFA9
        • __get_wpgmptr.LIBCMT ref: 00E7FFC4
        • CreateFileA.KERNEL32(?,00000080,?,0000000C,00000001,00000080,00000000,00000109,00000000,00000000), ref: 00E8019B
        • GetLastError.KERNEL32 ref: 00E801C3
        • __dosmaperr.LIBCMT ref: 00E801CA
        • GetFileType.KERNEL32(00000000), ref: 00E801DD
        • CloseHandle.KERNEL32(00000000), ref: 00E80203
        • CloseHandle.KERNEL32(00000000), ref: 00E8022F
        • __locking.LIBCMT ref: 00E80523
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: CloseFileHandle$CreateErrorLastType__dosmaperr__get_daylight__get_wpgmptr__locking
        • String ID: @
        • API String ID: 690964824-2766056989
        • Opcode ID: 729187dffe075dbd168712a701761c1b2390f016bfe59b2256f8e11b4b0f6375
        • Instruction ID: daa4be9de16dc0f2675a440042267497b7edcc5375b5c77c97b9106699820fa8
        • Opcode Fuzzy Hash: 729187dffe075dbd168712a701761c1b2390f016bfe59b2256f8e11b4b0f6375
        • Instruction Fuzzy Hash: C30246319002489FEF65AF68CC8A7AD7BB0EB01318F286669E56DB71E1D3758D48CB11
        APIs
        • __get_daylight.LIBCMT ref: 6CE68D39
        • __get_wpgmptr.LIBCMT ref: 6CE68D54
        • CreateFileA.KERNEL32(6CE57D8D,00000080,6CE57D8D,0000000C,00000001,00000080,00000000,00000109,00000000,00000000), ref: 6CE68F2B
        • GetLastError.KERNEL32 ref: 6CE68F53
        • __dosmaperr.LIBCMT ref: 6CE68F5A
        • GetFileType.KERNEL32(00000000), ref: 6CE68F6D
        • CloseHandle.KERNEL32(00000000), ref: 6CE68F93
        • CloseHandle.KERNEL32(00000000), ref: 6CE68FBF
        • __locking.LIBCMT ref: 6CE692B3
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: CloseFileHandle$CreateErrorLastType__dosmaperr__get_daylight__get_wpgmptr__locking
        • String ID: @
        • API String ID: 690964824-2766056989
        • Opcode ID: 133fe0113fe0c14266597725470bc8413a580ad210d3443a3bdd172ec7a7ed9f
        • Instruction ID: 0f306941a8e533f3cde81147684c42ac3bb95be35d6100e34c0b47da5d5b86c7
        • Opcode Fuzzy Hash: 133fe0113fe0c14266597725470bc8413a580ad210d3443a3bdd172ec7a7ed9f
        • Instruction Fuzzy Hash: 6C0205319E4249DAEB218F6BCC857AE7BB4EB0232CF34065AE56097FD0D7368945C711
        APIs
          • Part of subcall function 00E7390A: __wstrtime.LIBCMT ref: 00E7393B
          • Part of subcall function 00E7390A: __wstrtime.LIBCMT ref: 00E73944
          • Part of subcall function 00E7390A: _strrchr.LIBCMT ref: 00E7398A
        • CharLowerA.USER32(00000004), ref: 00E74BC6
        • lstrcmpiA.KERNEL32(00000000,00E88000), ref: 00E74BE5
        • _strtok.LIBCMT ref: 00E74C24
          • Part of subcall function 00E77D7D: __getptd.LIBCMT ref: 00E77D9B
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: __wstrtime$CharLower__getptd_strrchr_strtoklstrcmpi
        • String ID: CommandLine: %s$No command line switch$ParseCommandLine$StringCchCopyA()$Unable to allocate memory block.$Unable to copy string %s.$e:\bt\382730\setup\deliverables\dxsetup\dxsetup.cpp
        • API String ID: 1047108780-590517559
        • Opcode ID: 3e097ace34175141c7cdfc09846298653bf61b05c806042af043cc4ea434baa2
        • Instruction ID: 9767406110b96e1f210e685886674f544d9f5ca5b34210d3ec91a595950789c7
        • Opcode Fuzzy Hash: 3e097ace34175141c7cdfc09846298653bf61b05c806042af043cc4ea434baa2
        • Instruction Fuzzy Hash: 4A31F9F1900349FFEB219F58CC86EAEBBA8DB41714F20E46AF50DB6190E3719D849761
        APIs
        • GetModuleFileNameA.KERNEL32(?,?,00000104,?), ref: 6CE59AA4
        • GetLastError.KERNEL32(00000000), ref: 6CE59AAF
        • GetShortPathNameA.KERNEL32(?,?,00000104), ref: 6CE59AE0
        • _strnlen.LIBCMT ref: 6CE59AF2
        • GetLastError.KERNEL32(00000000), ref: 6CE59B00
        • _strnlen.LIBCMT ref: 6CE59B1E
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorLastName_strnlen$FileModulePathShort
        • String ID: GetModuleFileName()$GetShortPathName()$e:\bt\382730\setup\deliverables\dsetup\dsetup32\inline.h$getWorkingDirectory
        • API String ID: 1941469614-905520932
        • Opcode ID: dccc3b23c25ab2f79edb3d7698d0fdf6e562d3caaa2203b1749cedc3bd5491b9
        • Instruction ID: a9e3be97c0a8391764ad59ebf781c82aebdb6e34cbda950e27edbe8a265a6331
        • Opcode Fuzzy Hash: dccc3b23c25ab2f79edb3d7698d0fdf6e562d3caaa2203b1749cedc3bd5491b9
        • Instruction Fuzzy Hash: E8213AB6A152146AF7409AB58C88FEB7B7DDB4231CFF00419F909D2B40EF23D5128664
        APIs
        • GetFileAttributesA.KERNEL32(00000104,00000000), ref: 6CE59F63
        • GetLastError.KERNEL32 ref: 6CE59F6E
        • _strnlen.LIBCMT ref: 6CE59FCF
        • SHFileOperationA.SHELL32(?,?,00000104,00000104,?,00000104), ref: 6CE5A020
        • DeleteFileA.KERNEL32(00000104,?,00000104), ref: 6CE5A02F
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563C2
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563CB
          • Part of subcall function 6CE56391: _strrchr.LIBCMT ref: 6CE56411
        • GetLastError.KERNEL32(Unable to remove %s.,00000104,?,00000104), ref: 6CE5A041
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: File$ErrorLast__wstrtime$AttributesDeleteOperation_strnlen_strrchr
        • String ID: DXRemoveFile$GetFileAttributes()$Unable to remove %s.$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
        • API String ID: 3110083123-1900097680
        • Opcode ID: 72016ebc008f508b7a754693e951caa945ac1590b72a51365c27659dc6206ef3
        • Instruction ID: a1e6d37186bbd6fb3bc16d4d832d6edfe845e504ea0617f21151a0cc27454a19
        • Opcode Fuzzy Hash: 72016ebc008f508b7a754693e951caa945ac1590b72a51365c27659dc6206ef3
        • Instruction Fuzzy Hash: FB21F872944118ABDB109FA48C45FEEB7B8EF0A358FF005A9E645E7640D7335E608FA0
        APIs
        • GetVersionExA.KERNEL32(?), ref: 6CE5B518
        • GetNativeSystemInfo.KERNEL32(?), ref: 6CE5B57F
        Strings
        • IsIA64(): IA64., xrefs: 6CE5B59D
        • e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp, xrefs: 6CE5B5CF
        • Unable to initialize CKernel32., xrefs: 6CE5B5BC
        • IsIA64(): Windows 2000 or Windows 9x, xrefs: 6CE5B540
        • IsIA64, xrefs: 6CE5B5C5
        • IsIA64(): not IA64., xrefs: 6CE5B5AD
        • (, xrefs: 6CE5B534
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: InfoNativeSystemVersion
        • String ID: ($IsIA64$IsIA64(): IA64.$IsIA64(): Windows 2000 or Windows 9x$IsIA64(): not IA64.$Unable to initialize CKernel32.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
        • API String ID: 2296905803-181654248
        • Opcode ID: 5dc4c124555f8c5bd64f5fec6c694b3a38e8eacda2c9723bdcd5389af376594b
        • Instruction ID: 4cc541c143bc06c204ac077917db9ed5302bd370a80f3db3be14c26cca79f534
        • Opcode Fuzzy Hash: 5dc4c124555f8c5bd64f5fec6c694b3a38e8eacda2c9723bdcd5389af376594b
        • Instruction Fuzzy Hash: 4D210730D44614AADB289B788C05BCA73B69B0532CFF0096DE015E7FC4EF735AA88B15
        APIs
          • Part of subcall function 00E7935E: GetModuleHandleA.KERNEL32(00000000), ref: 00E79365
        • GetStartupInfoA.KERNEL32(?), ref: 00E76EED
        • GetVersionExA.KERNEL32(00000094), ref: 00E76F0B
        • _fast_error_exit.LIBCMT ref: 00E76F81
        • _fast_error_exit.LIBCMT ref: 00E76F92
        • __amsg_exit.LIBCMT ref: 00E76FA6
        • GetCommandLineA.KERNEL32 ref: 00E76FAC
        • ___crtGetEnvironmentStringsA.LIBCMT ref: 00E76FB7
        • __amsg_exit.LIBCMT ref: 00E76FCC
        • __amsg_exit.LIBCMT ref: 00E76FDD
        • __amsg_exit.LIBCMT ref: 00E76FEF
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: __amsg_exit$_fast_error_exit$CommandEnvironmentHandleInfoLineModuleStartupStringsVersion___crt
        • String ID:
        • API String ID: 4221928475-0
        • Opcode ID: 4f7502d5e371bc42b9fd475595ba2a707b729e3aa3d838efae515720b29c127c
        • Instruction ID: 38d75c9803d84cb6a4a442505dd5521846ded9dd0d090a35ac8c4958bd429c4f
        • Opcode Fuzzy Hash: 4f7502d5e371bc42b9fd475595ba2a707b729e3aa3d838efae515720b29c127c
        • Instruction Fuzzy Hash: B231D370A447059EDB24AF75ED06B6D37F4AF00314F10E09AF54DBA1D2DF748A848B11
        APIs
        • __get_daylight.LIBCMT ref: 733FF7E8
        • __get_wpgmptr.LIBCMT ref: 733FF803
        • CreateFileA.KERNEL32(00000000,00000080,00000000,0000000C,00000001,00000080,00000000,00000109,00000000,00000000), ref: 733FF9DA
        • GetLastError.KERNEL32 ref: 733FFA02
        • __dosmaperr.LIBCMT ref: 733FFA09
        • GetFileType.KERNEL32(00000000), ref: 733FFA1C
        • CloseHandle.KERNEL32(00000000), ref: 733FFA42
        • CloseHandle.KERNEL32(00000000), ref: 733FFA6E
        • __locking.LIBCMT ref: 733FFD62
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: CloseFileHandle$CreateErrorLastType__dosmaperr__get_daylight__get_wpgmptr__locking
        • String ID:
        • API String ID: 690964824-0
        • Opcode ID: 9454e4d0cc5ab71f481bfe62656fdeea5a4268393092e997f6b210144ed7cdbe
        • Instruction ID: 681e236b9fa4644b9fb135cb259c6d3c3d4564b69169f1b755250cf053bbff59
        • Opcode Fuzzy Hash: 9454e4d0cc5ab71f481bfe62656fdeea5a4268393092e997f6b210144ed7cdbe
        • Instruction Fuzzy Hash: C2022932D0160B9BEB328F64CC8179E7BB9EF01314F9846A9EC53972E4D7758945CB41
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 7d375b30cb8034d6505f944aac7a4d00900ecc9158009ffa2ce635031de3ffa2
        • Instruction ID: 524be5922dcaec54ccb20c241277ce7ccde013cd47a53e15e104f52a53ae5699
        • Opcode Fuzzy Hash: 7d375b30cb8034d6505f944aac7a4d00900ecc9158009ffa2ce635031de3ffa2
        • Instruction Fuzzy Hash: 1012D238B04286CFDB1A8F68C8807AA7BF5EF42304F1845E9E4A39B3D5E3749542CB55
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: db0b741c6a0d39ce9a8a153974c0e08afbec142aa00f53647d7f7a5c0d1839d3
        • Instruction ID: eec75379bb53b6800ed29a6d18c9bb773b25823c619a975c2d745cf95c0e279c
        • Opcode Fuzzy Hash: db0b741c6a0d39ce9a8a153974c0e08afbec142aa00f53647d7f7a5c0d1839d3
        • Instruction Fuzzy Hash: CF121530AA8285CFDB118F6AC8447AEBBB1BF0331CF344699D4618BF91D7749885CB52
        APIs
        • GetVersionExA.KERNEL32(?), ref: 733F67DD
        • __heap_term.LIBCMT ref: 733F684E
        • GetCommandLineA.KERNEL32 ref: 733F6855
        • ___crtGetEnvironmentStringsA.LIBCMT ref: 733F6860
          • Part of subcall function 733F87C4: GetEnvironmentStringsW.KERNEL32(?,?,?,733F6865), ref: 733F87E2
          • Part of subcall function 733F87C4: GetEnvironmentStringsW.KERNEL32(?,?,?,733F6865), ref: 733F881D
          • Part of subcall function 733F8180: GetStartupInfoA.KERNEL32(?), ref: 733F8195
          • Part of subcall function 733F8180: GetFileType.KERNEL32(00000024), ref: 733F82A3
          • Part of subcall function 733F8180: ___crtInitCritSecAndSpinCount.LIBCMT ref: 733F82D7
        • __mtterm.LIBCMT ref: 733F6873
          • Part of subcall function 733F7B35: TlsFree.KERNEL32(00000005,733F68DE), ref: 733F7B60
          • Part of subcall function 733F7B35: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,733F68DE), ref: 733FACB6
          • Part of subcall function 733F7B35: DeleteCriticalSection.KERNEL32(00000005,?,?,733F68DE), ref: 733FACE0
        • __mtterm.LIBCMT ref: 733F68D9
        • __heap_term.LIBCMT ref: 733F68DE
        • ___set_flsgetvalue.LIBCMT ref: 733F68EA
          • Part of subcall function 733F7B06: TlsGetValue.KERNEL32(733F7C41), ref: 733F7B0C
          • Part of subcall function 733F7B06: TlsSetValue.KERNEL32(00000000), ref: 733F7B29
          • Part of subcall function 733F813A: __calloc_impl.LIBCMT ref: 733F814F
          • Part of subcall function 733F6F02: ___sbh_find_block.LIBCMT ref: 733F6F2B
          • Part of subcall function 733F6F02: HeapFree.KERNEL32(00000000,00000000,734026A0,0000000C,733FADB5,00000000,734027E8,0000000C,733FADF4,00000000,-0000000F,?,733F8098,00000004,73402788,0000000C), ref: 733F6F6A
          • Part of subcall function 733F6F02: GetLastError.KERNEL32(?,733F8098,00000004,73402788,0000000C,733FDAD8,00000000,00000000,00000000,00000000,00000000,?,733F7C67,00000001,00000214), ref: 733F6F7B
        • __freeptd.LIBCMT ref: 733F693C
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: EnvironmentStrings$CriticalDeleteFreeSectionValue___crt__heap_term__mtterm$CommandCountCritErrorFileHeapInfoInitLastLineSpinStartupTypeVersion___sbh_find_block___set_flsgetvalue__calloc_impl__freeptd
        • String ID:
        • API String ID: 4055056290-0
        • Opcode ID: 9293f3b611958ae50225af98b4cf521d8add45333e944326be2f9afb6c4cbb53
        • Instruction ID: 6170e4e792d10b63652c393d9c7e31bf72439a949982742cea576df9667a6140
        • Opcode Fuzzy Hash: 9293f3b611958ae50225af98b4cf521d8add45333e944326be2f9afb6c4cbb53
        • Instruction Fuzzy Hash: 9641DE72E043139BE739AB728E00B4E73F9EF41255FE050AEE51AE6180DF70C4468B51
        APIs
        • GetVersionExA.KERNEL32(?), ref: 6CE5F284
        • __heap_term.LIBCMT ref: 6CE5F2F5
        • GetCommandLineA.KERNEL32 ref: 6CE5F2FC
        • ___crtGetEnvironmentStringsA.LIBCMT ref: 6CE5F307
          • Part of subcall function 6CE61F9B: GetEnvironmentStringsW.KERNEL32(?,?,?,6CE5F30C), ref: 6CE61FB9
          • Part of subcall function 6CE61F9B: GetEnvironmentStringsW.KERNEL32(?,?,?,6CE5F30C), ref: 6CE61FF4
          • Part of subcall function 6CE61957: GetStartupInfoA.KERNEL32(?), ref: 6CE6196C
          • Part of subcall function 6CE61957: GetFileType.KERNEL32(00000024), ref: 6CE61A7A
          • Part of subcall function 6CE61957: ___crtInitCritSecAndSpinCount.LIBCMT ref: 6CE61AAE
        • __mtterm.LIBCMT ref: 6CE5F31A
          • Part of subcall function 6CE6130C: TlsFree.KERNEL32(00000011,6CE5F385), ref: 6CE61337
          • Part of subcall function 6CE6130C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,6CE5F385), ref: 6CE64901
          • Part of subcall function 6CE6130C: DeleteCriticalSection.KERNEL32(00000011,?,?,6CE5F385), ref: 6CE6492B
        • __mtterm.LIBCMT ref: 6CE5F380
        • __heap_term.LIBCMT ref: 6CE5F385
        • ___set_flsgetvalue.LIBCMT ref: 6CE5F391
          • Part of subcall function 6CE612DD: TlsGetValue.KERNEL32(6CE61418,?,?,6CE5FCAF,6CE57D8D,?,?,6CE5770E,00066BDC,?,?,00000000,?,?,6CE577A6,SETUP_AGREEMENT_ENG), ref: 6CE612E3
          • Part of subcall function 6CE612DD: TlsSetValue.KERNEL32(00000000,?,6CE5FCAF,6CE57D8D,?,?,6CE5770E,00066BDC,?,?,00000000,?,?,6CE577A6,SETUP_AGREEMENT_ENG,000012F1), ref: 6CE61300
          • Part of subcall function 6CE61911: __calloc_impl.LIBCMT ref: 6CE61926
          • Part of subcall function 6CE6037B: ___sbh_find_block.LIBCMT ref: 6CE603A4
          • Part of subcall function 6CE6037B: HeapFree.KERNEL32(00000000,6CE57D8D,6CE6B418,0000000C,6CE64A00,00000000,6CE6B5E8,0000000C,6CE64A3F,6CE57D8D,00066BCC,?,6CE6186F,00000004,6CE6B500,0000000C), ref: 6CE603E3
          • Part of subcall function 6CE6037B: GetLastError.KERNEL32(?,6CE6186F,00000004,6CE6B500,0000000C,6CE681A1,6CE57D8D,00066BDB,00000000,00000000,00000000,?,6CE6143E,00000001,00000214), ref: 6CE603F4
        • __freeptd.LIBCMT ref: 6CE5F3E3
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: EnvironmentStrings$CriticalDeleteFreeSectionValue___crt__heap_term__mtterm$CommandCountCritErrorFileHeapInfoInitLastLineSpinStartupTypeVersion___sbh_find_block___set_flsgetvalue__calloc_impl__freeptd
        • String ID:
        • API String ID: 4055056290-0
        • Opcode ID: 2717c7b6d8fed7acec581a4308542bf2956a886446ab1e76809cdc2c621e61bf
        • Instruction ID: 73fbbe98b1258568360bb5f64f6b93f6b8ae9cbc73dcd8093a45db3cf0958739
        • Opcode Fuzzy Hash: 2717c7b6d8fed7acec581a4308542bf2956a886446ab1e76809cdc2c621e61bf
        • Instruction Fuzzy Hash: BC41E875AA46018AEB15AFF38C4469E33B4AF4335DFB4452ED804D3F80EB3AC5568B91
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: __fassign__wsopen_s
        • String ID: UNICODE$UTF-16LE$UTF-8$`"?s$ccs=
        • API String ID: 2488987356-3208883724
        • Opcode ID: 70311e7b8a455b080d757c900e9dd0f9b42480abd30bacc79b56c7e5c557eb12
        • Instruction ID: 2e5423002616ffa67e10440186c3f0a04b8298e0a61929af0ae14bb6daeabbf5
        • Opcode Fuzzy Hash: 70311e7b8a455b080d757c900e9dd0f9b42480abd30bacc79b56c7e5c557eb12
        • Instruction Fuzzy Hash: FF7109B198820BEFDB268F55C9047997BB8AF01314FD8D86EE8DF96290D3758245CF10
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: __fassign__wsopen_s
        • String ID: $UNICODE$UTF-16LE$UTF-8$ccs=
        • API String ID: 2488987356-1656882147
        • Opcode ID: cb9aa8953e3dba167d842df278933ce9dddcc1b0f329f9abd116dbcd0305170b
        • Instruction ID: 7d6294a517bb92c7ea92aebcce1043f791aea657e6867f75e75a503628ab5d3b
        • Opcode Fuzzy Hash: cb9aa8953e3dba167d842df278933ce9dddcc1b0f329f9abd116dbcd0305170b
        • Instruction Fuzzy Hash: 4871C4B1904209EEDB299F5584493ED7BE0EF81319F2CE07EE85EB6151D3B48A84DF42
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: __fassign__wsopen_s
        • String ID: $UNICODE$UTF-16LE$UTF-8$ccs=
        • API String ID: 2488987356-1656882147
        • Opcode ID: 4c11aafef20592dc0e7d47ef93cfe1c52de2a4b34ec5883d7dc0ec4af8641b71
        • Instruction ID: e668e551552860d7fd2ef55b5802e280192362c5e2c9db3cab5ace47f8fc52e1
        • Opcode Fuzzy Hash: 4c11aafef20592dc0e7d47ef93cfe1c52de2a4b34ec5883d7dc0ec4af8641b71
        • Instruction Fuzzy Hash: DA71A6718E5209AADB108F6B89447997FB0AF0232CF34C16DF86597E51D379C681DF60
        APIs
        • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 6CE56DE7
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: DirectorySystem
        • String ID: DXGetFileVersion() failed.$FRunningOnWinXP$GetSystemDirectory()$\ntkrnlpa.exe$e:\bt\382730\setup\deliverables\dsetup\dsetup32\inline.h
        • API String ID: 2188284642-531677455
        • Opcode ID: e7e873c1bb5e4d05c681f968386add840dc8b2c0c4a620e4c22c4b1c1eda2145
        • Instruction ID: ccf7463dae92d46a2715738b2be23f2c94dba68b3c466e42a58591d52b6fbdb7
        • Opcode Fuzzy Hash: e7e873c1bb5e4d05c681f968386add840dc8b2c0c4a620e4c22c4b1c1eda2145
        • Instruction Fuzzy Hash: 85210175B0220467DB509AA9CC04FDB33FC8B4A318FF00469A544E2B80EE72EBA58B50
        APIs
        • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 6CE56EEB
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: DirectorySystem
        • String ID: DXGetFileVersion() failed.$FRunningOnNETServer$GetSystemDirectory()$\ntkrnlpa.exe$e:\bt\382730\setup\deliverables\dsetup\dsetup32\inline.h
        • API String ID: 2188284642-3175186359
        • Opcode ID: 161418b821532fd4938f70afbe0ee5dd19af421efe037930b972bf3386b79da0
        • Instruction ID: 6381d903501efc055375525ec43aefe025232a7e37c7b61c2e98e354b8b4ab7a
        • Opcode Fuzzy Hash: 161418b821532fd4938f70afbe0ee5dd19af421efe037930b972bf3386b79da0
        • Instruction Fuzzy Hash: BC210675F151046BDB50DEA5CC46FDB33BC9B46318FF004A6A448E2B80DB73DAA98A60
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: __fileno
        • String ID:
        • API String ID: 1873356214-0
        • Opcode ID: 4ac88dd82abb8f9241145351d9ecdebbf6de4e791fceada5dc7bbaaa473484c1
        • Instruction ID: 53db8684b845d9a3ecbacffe353ad6caa7c89351b5c97f496cb202e937d19c58
        • Opcode Fuzzy Hash: 4ac88dd82abb8f9241145351d9ecdebbf6de4e791fceada5dc7bbaaa473484c1
        • Instruction Fuzzy Hash: 0E313831D00717ABE7255F748C40B8D37B9AF013B5BA84764F42DEA0D1DB38D6978A94
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: __fileno
        • String ID:
        • API String ID: 1873356214-0
        • Opcode ID: 7fdb19231fdee5e38612ee33c80422d0cc8b4064cfca91bc3885f30ac51c2d9f
        • Instruction ID: 5b0de708001bfd706437dc3c8aacba2c8e6a42c689295736143e5b2f1f7b8350
        • Opcode Fuzzy Hash: 7fdb19231fdee5e38612ee33c80422d0cc8b4064cfca91bc3885f30ac51c2d9f
        • Instruction Fuzzy Hash: 71312632409615ABC7156B748C86A9D37E09F41338B2CE635F86DFA0E2DB388A419696
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: __fileno
        • String ID:
        • API String ID: 1873356214-0
        • Opcode ID: eeff1f55b903fc61e35428c20b7a29dd1983daebd823a0d77c2fdc116e1c1250
        • Instruction ID: 203fac6cf196408f96462c661c54fed54dfedcd47230d57341330a74c2283459
        • Opcode Fuzzy Hash: eeff1f55b903fc61e35428c20b7a29dd1983daebd823a0d77c2fdc116e1c1250
        • Instruction Fuzzy Hash: 513136328609146AC7019F768C826DD77B09F0636CF74562AE034DBFD0EF3ED69A8658
        APIs
        • GetLastError.KERNEL32(?,?,?,00000104,?,?,00000104,?), ref: 6CE5934B
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorLast
        • String ID: CSetup::InstallPlugIn$DirectXUpdateInstallPlugIn() failed.$GetCDXUpdate() failed.$Temporary directory name is not initialized.$Working directory name is not initialized.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\dxupdate.cpp
        • API String ID: 1452528299-1736279303
        • Opcode ID: 42084153539017de98c9bc4298af44456b87e57c3fa25d5daa9f7b0db0945bf6
        • Instruction ID: 227a7d1d28cd1b7a2f96a04d76a16def08fb0a26cb5d468173a8f6ece4f91bbe
        • Opcode Fuzzy Hash: 42084153539017de98c9bc4298af44456b87e57c3fa25d5daa9f7b0db0945bf6
        • Instruction Fuzzy Hash: B6512FF1940208AFD7109F64CC84EDEB7BCAB1530CFB009ADE155E2A40DB765EA58B51
        APIs
        • LoadStringA.USER32(?,000003E9,?,00000040), ref: 6CE5736D
        • GetLastError.KERNEL32(00000000), ref: 6CE57378
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563C2
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563CB
          • Part of subcall function 6CE56391: _strrchr.LIBCMT ref: 6CE56411
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: __wstrtime$ErrorLastLoadString_strrchr
        • String ID: DXSetRestorePoint$LoadString()$e$e:\bt\382730\setup\deliverables\dsetup\dsetup32\instcat.cpp
        • API String ID: 2420349584-3812728853
        • Opcode ID: 7c1db74b81689108a76ddf0ff467f9a06b5de682d76c4d7cd4c45f06b7b974d8
        • Instruction ID: e223cecc5493204961a8f53da7ce9dcaf28af6e536bdc1e4fa55235f02d63468
        • Opcode Fuzzy Hash: 7c1db74b81689108a76ddf0ff467f9a06b5de682d76c4d7cd4c45f06b7b974d8
        • Instruction Fuzzy Hash: C921B9B0A206559BDB11DFA68C045AE7BB8EB0675CFB0812AEC01D7B80E775CD36C791
        APIs
        • LoadLibraryA.KERNEL32(?,?,00000104,?), ref: 6CE5886C
        • GetLastError.KERNEL32(Unable to load %s.,?), ref: 6CE58881
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563C2
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563CB
          • Part of subcall function 6CE56391: _strrchr.LIBCMT ref: 6CE56411
        Strings
        • Unable to load %s., xrefs: 6CE5887C
        • LoadLibrary(), xrefs: 6CE58888
        • e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h, xrefs: 6CE58897
        • CDllLoader::LoadLibraryA, xrefs: 6CE5888D
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: __wstrtime$ErrorLastLibraryLoad_strrchr
        • String ID: CDllLoader::LoadLibraryA$LoadLibrary()$Unable to load %s.$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
        • API String ID: 108046663-2531695590
        • Opcode ID: 911002a113f8d7e27e9ad9c9b861370a59a133182a4869abbb840e04a26854b8
        • Instruction ID: 332cc3188cb84a37616cbd57b86fd17c57c77f96b55fafd940d03675dce5c7d2
        • Opcode Fuzzy Hash: 911002a113f8d7e27e9ad9c9b861370a59a133182a4869abbb840e04a26854b8
        • Instruction Fuzzy Hash: FEF0E5365403047FDB102EE5CC04CC63F7CDB523957E40826F944D6A40E673D5718AA0
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: __locking$__fileno__lseeki64
        • String ID: Fcl
        • API String ID: 3501863086-3810545802
        • Opcode ID: 5071cef52269c42eed21df5b2803c97bbfb815727224044a98f9b37c9e5142ca
        • Instruction ID: 971ad0b30267dd6cdc5baac692ff6cf8c5e8fcb5e3bd41bf7b1dec9e708a1c51
        • Opcode Fuzzy Hash: 5071cef52269c42eed21df5b2803c97bbfb815727224044a98f9b37c9e5142ca
        • Instruction Fuzzy Hash: 2241A2715A06019FC7308F6BC855A967BB4AB6633CB30C61DE8B98BF91D734D9418B11
        APIs
        • FreeLibrary.KERNEL32(00000000,00000000,6CE5919D,?,?,?,?,?,?,?), ref: 6CE585F1
        • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 6CE585FB
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563C2
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563CB
          • Part of subcall function 6CE56391: _strrchr.LIBCMT ref: 6CE56411
        Strings
        • CDllLoader::FreeLibrary, xrefs: 6CE5860D
        • e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h, xrefs: 6CE58617
        • FreeLibrary(), xrefs: 6CE58608
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: __wstrtime$ErrorFreeLastLibrary_strrchr
        • String ID: CDllLoader::FreeLibrary$FreeLibrary()$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
        • API String ID: 2808663981-1330908120
        • Opcode ID: 6aa20b4f7f1658685bb302d3b0600054d33d629878e98c69ff0cb7dc78df51f7
        • Instruction ID: b708db035be4971b8ba084e83a8cd183904b83602f43d7d0208a8c4928d9bbb2
        • Opcode Fuzzy Hash: 6aa20b4f7f1658685bb302d3b0600054d33d629878e98c69ff0cb7dc78df51f7
        • Instruction Fuzzy Hash: B8E0D8327541105BF7242DB96D09BD222FCCB4061DFF408E6B541D1AC0FAB3C8114550
        APIs
        • FreeLibrary.KERNEL32(00000000,6CE573FF), ref: 6CE56B11
        • GetLastError.KERNEL32 ref: 6CE56B1B
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563C2
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563CB
          • Part of subcall function 6CE56391: _strrchr.LIBCMT ref: 6CE56411
        Strings
        • e:\bt\382730\setup\deliverables\dsetup\dsetup32\instcat.cpp, xrefs: 6CE56B34
        • UnLoadSfcDLL, xrefs: 6CE56B2D
        • FreeLibrary(), xrefs: 6CE56B28
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: __wstrtime$ErrorFreeLastLibrary_strrchr
        • String ID: FreeLibrary()$UnLoadSfcDLL$e:\bt\382730\setup\deliverables\dsetup\dsetup32\instcat.cpp
        • API String ID: 2808663981-3437185699
        • Opcode ID: 9d4cf1b7727b9a2ca218299dc1836c1ed79c664ee40e413fac13e1b66638295c
        • Instruction ID: 8d4e1bf2f580bbc4d337ff64f2364972a54a3c6e625d35c2b876a483549c0b2c
        • Opcode Fuzzy Hash: 9d4cf1b7727b9a2ca218299dc1836c1ed79c664ee40e413fac13e1b66638295c
        • Instruction Fuzzy Hash: 45E01275B046016BFF601EE68D05FBA327CAB12B4EFF40598B401E1AC0F737D9208550
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: __locking$__fileno__lseeki64
        • String ID:
        • API String ID: 3501863086-0
        • Opcode ID: 482110bb146547b0eb0b4c58b5ca5e7d74b0f578710e9bb4ec16eed9b34be0e8
        • Instruction ID: 422938676bfb1f4548865d295abe11447d928f7ffe76cab04bc90624e72ba6ee
        • Opcode Fuzzy Hash: 482110bb146547b0eb0b4c58b5ca5e7d74b0f578710e9bb4ec16eed9b34be0e8
        • Instruction Fuzzy Hash: 6F41AC72500B069FD7398F68CC40B567BA9AF55334B948A2DF8BAAF6E0D734E4418B50
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: __locking$__fileno__lseeki64
        • String ID:
        • API String ID: 3501863086-0
        • Opcode ID: dcce6b1e857a342efee4685e08330c151da85e44e961805cdbc15459f9f8c188
        • Instruction ID: 9b5d3547dff7751578d2ea0c6fd06aff38a3b8dfa0998505f36e39a82a1ee6a2
        • Opcode Fuzzy Hash: dcce6b1e857a342efee4685e08330c151da85e44e961805cdbc15459f9f8c188
        • Instruction Fuzzy Hash: 2C41C871510B005FC7389F69C885A6677E4EF45338B14E72AF8BEAB2E2D734D8408B51
        APIs
        • __fileno.LIBCMT ref: 6CE609E4
        • __locking.LIBCMT ref: 6CE609EB
          • Part of subcall function 6CE6364D: __fileno.LIBCMT ref: 6CE6367B
          • Part of subcall function 6CE6364D: __locking.LIBCMT ref: 6CE63682
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: __fileno__locking
        • String ID: Fcl
        • API String ID: 2385650056-3810545802
        • Opcode ID: 02e2f43521c7a4e35838aa8e8277f96aefa119708a2ac267273df05b4f0f5f54
        • Instruction ID: 7191acdd9131a3b0e9d98ff3a5bca353f4e6583c2bffa0d75a3c67aaebbf7019
        • Opcode Fuzzy Hash: 02e2f43521c7a4e35838aa8e8277f96aefa119708a2ac267273df05b4f0f5f54
        • Instruction Fuzzy Hash: C531D731691754DFDB15CF5BC480A9E7BB6EF813A8B34852EE85A87F40D770DA408B44
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: __fileno__locking
        • String ID: Fcl
        • API String ID: 2385650056-3810545802
        • Opcode ID: 50394860220720d4416018d745a5e50297c336960fa7dd4b146ab0390e6b35af
        • Instruction ID: fce8e3a3043e7d7df68866521a30548ad7dd7690a35e28da0d89f2f9eee25f86
        • Opcode Fuzzy Hash: 50394860220720d4416018d745a5e50297c336960fa7dd4b146ab0390e6b35af
        • Instruction Fuzzy Hash: 5C01A232254B005FE711CA6FC845A57B7F9DF81378F308A2EE4E983F80DA64E8454A50
        APIs
        • GetSystemDefaultLCID.KERNEL32(6CE58753,6CE58D1D,?,6CE58E5E,?,6CE592F0), ref: 6CE5871F
        Strings
        • DirectXSetupIsJapanese == 1, xrefs: 6CE5872C
        • DirectXSetupIsJapanese == 0, xrefs: 6CE5873B
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: DefaultSystem
        • String ID: DirectXSetupIsJapanese == 0$DirectXSetupIsJapanese == 1
        • API String ID: 511829978-1705903668
        • Opcode ID: 75385953f26c67f216b0234e7f97685d2f89503c427e64b559a719d80c77e7d7
        • Instruction ID: 7de793013ef3c9d88896c8e8bae5f6131494ee1c280ddc3f8d223f3127744c56
        • Opcode Fuzzy Hash: 75385953f26c67f216b0234e7f97685d2f89503c427e64b559a719d80c77e7d7
        • Instruction Fuzzy Hash: D7C08C765A811008AA4822B01E488CA0339836121EBF00C6BE303C0E40CF6380312012
        APIs
        • FindCloseChangeNotification.KERNEL32(00000000,00000000,00000109,?,733FFAFD,00000109), ref: 733FBDFA
        • GetLastError.KERNEL32(?,733FFAFD,00000109), ref: 733FBE04
        • __dosmaperr.LIBCMT ref: 733FBE33
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: ChangeCloseErrorFindLastNotification__dosmaperr
        • String ID:
        • API String ID: 490808831-0
        • Opcode ID: a7774d3b07f9de1c7a49663d13a9b08062bd5a8ea249d07d21caed675fb3df3c
        • Instruction ID: fa786ef8a550360121c5b46d602271516dfb8950d5701e904a469995edda785f
        • Opcode Fuzzy Hash: a7774d3b07f9de1c7a49663d13a9b08062bd5a8ea249d07d21caed675fb3df3c
        • Instruction Fuzzy Hash: C0016B33905327A7D735263AAE05B4626AE8F81378FA90057FD5B971F1CE50C8428291
        APIs
        • FindCloseChangeNotification.KERNEL32(00000000,00000000,00000109,?,00E802BE,00000109), ref: 00E7A68D
        • GetLastError.KERNEL32(?,00E802BE,00000109), ref: 00E7A697
        • __dosmaperr.LIBCMT ref: 00E7A6C6
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: ChangeCloseErrorFindLastNotification__dosmaperr
        • String ID:
        • API String ID: 490808831-0
        • Opcode ID: b7a97bb4aa7a9f95a7333dd42cb35d10929ff5f075368d26d207fd776d316fd7
        • Instruction ID: 94ba2e78bf0b479158e59a7776e9ff13ac5f3b6d39cbe01858686bca97b2b185
        • Opcode Fuzzy Hash: b7a97bb4aa7a9f95a7333dd42cb35d10929ff5f075368d26d207fd776d316fd7
        • Instruction Fuzzy Hash: A40126325017101ACA20A6BD5809BAE37888FC13B8F2DE136F81CF71D2CE61DC808693
        APIs
        • FindCloseChangeNotification.KERNEL32(00000000,00000000,00000109,?,6CE6904E,00000109), ref: 6CE63480
        • GetLastError.KERNEL32(?,6CE6904E,00000109), ref: 6CE6348A
        • __dosmaperr.LIBCMT ref: 6CE634B9
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: ChangeCloseErrorFindLastNotification__dosmaperr
        • String ID:
        • API String ID: 490808831-0
        • Opcode ID: f57a1a045a2ce9b8a85492f0a76c091e33590ac662fa2416ca9266437ecd1960
        • Instruction ID: 50fa4828d797e28e6d7df994bdd6a2922b518611edd6ac4c78bc78b820c84337
        • Opcode Fuzzy Hash: f57a1a045a2ce9b8a85492f0a76c091e33590ac662fa2416ca9266437ecd1960
        • Instruction Fuzzy Hash: EA0108336F92A025C622567B580878AABB54B4337CF35061FE924D7FD2CB55D84582A2
        APIs
        • SetFilePointer.KERNEL32(00000000,00000000,00000002,00000000,00000000,00BFBBEF,733FFD67,733FFD67,?,733FDE82,00BFBBEF,00000000,00000000,00000002,00000000,00000000), ref: 733FDC37
        • GetLastError.KERNEL32(?,733FDE82,00BFBBEF,00000000,00000000,00000002,00000000,00000000,00000002), ref: 733FDC44
        • __dosmaperr.LIBCMT ref: 733FDC4F
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorFileLastPointer__dosmaperr
        • String ID:
        • API String ID: 2336955059-0
        • Opcode ID: 38da1d56bb90d99b7fe2ca8c47234f99047ee98f6a7518d0d3b4a7d21f7946b1
        • Instruction ID: 64a2507efcccdb1d9ac6d15796374d3f0f49bd869a298ebe9b96dd0140b81167
        • Opcode Fuzzy Hash: 38da1d56bb90d99b7fe2ca8c47234f99047ee98f6a7518d0d3b4a7d21f7946b1
        • Instruction Fuzzy Hash: BB01D673E0024AAFCF21DFAADD48A8D7BBDEB85320B644186F415E72D4E6B0D9418760
        APIs
        • SetFilePointer.KERNEL32(00000000,00000000,?,00000000,00000000,?,?,?,?,00E7EF80,?,00000000,00000000,00000002,00000000,00000000), ref: 00E7ED35
        • GetLastError.KERNEL32(?,00E7EF80,?,00000000,00000000,00000002,00000000,00000000,?), ref: 00E7ED42
        • __dosmaperr.LIBCMT ref: 00E7ED4D
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorFileLastPointer__dosmaperr
        • String ID:
        • API String ID: 2336955059-0
        • Opcode ID: 424a0678d8b5cb5cfd211396298f0ca842d183b0206c3929f3524c8fe4de81d1
        • Instruction ID: d72efe6de682c0b0b2d841e63b11ae570ada5fdc9b26ca787773392a509165f9
        • Opcode Fuzzy Hash: 424a0678d8b5cb5cfd211396298f0ca842d183b0206c3929f3524c8fe4de81d1
        • Instruction Fuzzy Hash: 1C01C432A00249AFCF10CFA9DC4488E7BBDEB88324B259295F618F7290E670DE409761
        APIs
        • SetFilePointer.KERNEL32(00000000,00000000,00000002,00000000,00000000,00BFBBEF,6CE692B8,6CE692B8,?,6CE66AD7,00BFBBEF,00000000,00000000,00000002,00000000,00000000), ref: 6CE68293
        • GetLastError.KERNEL32(?,6CE66AD7,00BFBBEF,00000000,00000000,00000002,00000000,00000000,00000002), ref: 6CE682A0
        • __dosmaperr.LIBCMT ref: 6CE682AB
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorFileLastPointer__dosmaperr
        • String ID:
        • API String ID: 2336955059-0
        • Opcode ID: 872cd8ce371f1cda0c1016ee8af99052f30d22bbf974c8505c852ebc05532c53
        • Instruction ID: c31c415e64f1f26248c4f8f416b115289686af3a226886fb60ef13f5e8088f7d
        • Opcode Fuzzy Hash: 872cd8ce371f1cda0c1016ee8af99052f30d22bbf974c8505c852ebc05532c53
        • Instruction Fuzzy Hash: E301A172A60519AFCF108FDADD4488E7BB9EB86328B754246E410E7A81EB70DE018760
        APIs
        • SetFilePointer.KERNEL32(00000000,00000109,00000000,733FFD42,00004000,00000109,?,733FFD42,00000109,00000000,00000000), ref: 73401C67
        • GetLastError.KERNEL32(?,733FFD42,00000109,00000000,00000000), ref: 73401C74
        • __dosmaperr.LIBCMT ref: 73401C83
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorFileLastPointer__dosmaperr
        • String ID:
        • API String ID: 2336955059-0
        • Opcode ID: b6b5201e7dd8c7912f0b23b3ce320792283643252f8b6c2c99d949a537b8062b
        • Instruction ID: 5dfe5f35294df419b73ae4cb3b2a314af4457c96344c392fcf2d556e2309a710
        • Opcode Fuzzy Hash: b6b5201e7dd8c7912f0b23b3ce320792283643252f8b6c2c99d949a537b8062b
        • Instruction Fuzzy Hash: BE01F937B18616A7CB161BB9DD05B45377D9B82334B6503A2F936DB2D0EA70C4014264
        APIs
        • SetFilePointer.KERNEL32(00000000,00000109,00000000,6CE69293,00004000,00000109,?,6CE69293,00000109,00000000,00000000), ref: 6CE6ADD1
        • GetLastError.KERNEL32(?,6CE69293,00000109,00000000,00000000), ref: 6CE6ADDE
        • __dosmaperr.LIBCMT ref: 6CE6ADED
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorFileLastPointer__dosmaperr
        • String ID:
        • API String ID: 2336955059-0
        • Opcode ID: 67f5040a56b1087c207b852732c0ea85e4cc14c58fb01ad306458add9f899d12
        • Instruction ID: 983323d1d7aaf9d25876b2754209b9fa5b94668ea998b3a0cfc1c6f358bbbe44
        • Opcode Fuzzy Hash: 67f5040a56b1087c207b852732c0ea85e4cc14c58fb01ad306458add9f899d12
        • Instruction Fuzzy Hash: 6A01AD32AE45656ACA111ABFDC0898A3A78AB4333DB750756F930CBED0DB30C84182A1
        APIs
        • GetVersionExA.KERNEL32(?), ref: 6CE58B81
        Strings
        • Installing on Windows %d.%d.%d, xrefs: 6CE58BC5
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: Version
        • String ID: Installing on Windows %d.%d.%d
        • API String ID: 1889659487-1252410366
        • Opcode ID: 19c51315b88aba46fb1b811f1de03e7b59dee22d3eab563bb5c1c4e98842d565
        • Instruction ID: d1bda0e58e1e2d27e7651dc3f0f7d215acc4552b8a50f677acec819f53ffe02a
        • Opcode Fuzzy Hash: 19c51315b88aba46fb1b811f1de03e7b59dee22d3eab563bb5c1c4e98842d565
        • Instruction Fuzzy Hash: 01012DB9E511249BCBB08B798C04B9EB3BCAB0631CFF04599D409E2741DB328E65CB40
        APIs
        • __fileno.LIBCMT ref: 733FC48D
        • __locking.LIBCMT ref: 733FC494
          • Part of subcall function 733FBFC7: __fileno.LIBCMT ref: 733FBFF5
          • Part of subcall function 733FBFC7: __locking.LIBCMT ref: 733FBFFC
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: __fileno__locking
        • String ID:
        • API String ID: 2385650056-0
        • Opcode ID: 16a9ec58f811e1472a81cfb106c98d50de9a502f0f79c04f642017c80660e77a
        • Instruction ID: ab27dccafc9e8ec407efbd52ac1cf92dddf99717f1ded5e296fa5aa15cc892a7
        • Opcode Fuzzy Hash: 16a9ec58f811e1472a81cfb106c98d50de9a502f0f79c04f642017c80660e77a
        • Instruction Fuzzy Hash: C031A871640F069BDB36CF55C9807AE77B9EF80260B64891DE89FD7680D674DA818B40
        APIs
        • __fileno.LIBCMT ref: 00E7AD7E
        • __locking.LIBCMT ref: 00E7AD85
          • Part of subcall function 00E7A85A: __fileno.LIBCMT ref: 00E7A888
          • Part of subcall function 00E7A85A: __locking.LIBCMT ref: 00E7A88F
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: __fileno__locking
        • String ID:
        • API String ID: 2385650056-0
        • Opcode ID: bfb6afbecca2cc93d3e23940c0fe19f15d0ba34b2ec945ddc6f7ff201cc985e2
        • Instruction ID: a58414482ea2a12f0607ccee86e487f82fdfa00f9dd32abe2cd5f562b11bafc2
        • Opcode Fuzzy Hash: bfb6afbecca2cc93d3e23940c0fe19f15d0ba34b2ec945ddc6f7ff201cc985e2
        • Instruction Fuzzy Hash: AF319131600605AFDB38CF69C884A9E7BB5EFC0369B28D53DE95DA7A40D770DE408B42
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: CallFilterFunc@8__getstream
        • String ID:
        • API String ID: 2779671989-0
        • Opcode ID: 9deaccfa96efcf1f13baf5b95318b3fb74ce3b551ff959e750280c2de03c07b1
        • Instruction ID: dbcc944ae04a6deabd9521754dc71ae018d0b2db1f6dfe1ca54fe6e5a2ba4e01
        • Opcode Fuzzy Hash: 9deaccfa96efcf1f13baf5b95318b3fb74ce3b551ff959e750280c2de03c07b1
        • Instruction Fuzzy Hash: 7D11ABB1D003079FF731AFB08C8076E7AB9AF01351FD589B8E459DB190D73549865B61
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: CallFilterFunc@8__getstream
        • String ID:
        • API String ID: 2779671989-0
        • Opcode ID: 51248e9a85e64a18a757060c6192743d512f0a2a13b822fa586062e20a7c8141
        • Instruction ID: 83a52a0b46ff22d7cc3c64993959ad3d8a2547734262c40c4c4d22762912cff7
        • Opcode Fuzzy Hash: 51248e9a85e64a18a757060c6192743d512f0a2a13b822fa586062e20a7c8141
        • Instruction Fuzzy Hash: 851108B0D0C2069EDB20BFB48C826AE37E59F44310F69E834E46DB7181D7748D449BA2
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: CallFilterFunc@8__getstream
        • String ID:
        • API String ID: 2779671989-0
        • Opcode ID: b3a8cbf03c2b4de6f4741363267de3a4914b20a459be6cfed28027ab699cfcb1
        • Instruction ID: b4ba10b3df7ddf2a246c0ec7ca14cb46cc1d457027b0673507b0e41162a92c3e
        • Opcode Fuzzy Hash: b3a8cbf03c2b4de6f4741363267de3a4914b20a459be6cfed28027ab699cfcb1
        • Instruction Fuzzy Hash: 8811E2B0DD4209DBD740AFA68C905DE36B4AF0631CB798A6CD020D7F40DB3A8968A761
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: __fileno__locking
        • String ID:
        • API String ID: 2385650056-0
        • Opcode ID: 46460d34f8ef143c1d95679b96208fb330207c26e11226a4fe7a61c09fa8abde
        • Instruction ID: f0e6d1efabefaf0be2ccc7ed1b1c1a830ad93959b4754a69a8ccda99e8632778
        • Opcode Fuzzy Hash: 46460d34f8ef143c1d95679b96208fb330207c26e11226a4fe7a61c09fa8abde
        • Instruction Fuzzy Hash: 8C01A232644B035FE7318A69CC45B57F7EDEF402B0F548A1DE4EE83681D668E8429A90
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: __fileno__locking
        • String ID:
        • API String ID: 2385650056-0
        • Opcode ID: ee1898c83c73028738548f1b3af915521830ca43611031c30255603978cbfc18
        • Instruction ID: 901e688bf725829d303b3e80e9ae3005b8166b529fde1374dc6347dea9462ec7
        • Opcode Fuzzy Hash: ee1898c83c73028738548f1b3af915521830ca43611031c30255603978cbfc18
        • Instruction Fuzzy Hash: 1C01F732600A005FF7248A6DC889A57B3E9EFC0374F18C52DE4ADD7281D664EC414B92
        APIs
        • HeapCreate.KERNEL32(00000000,00001000,00000000,?,733F6840,00000001), ref: 733F8977
        • HeapDestroy.KERNEL32(?,733F6840,00000001), ref: 733F89AE
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: Heap$CreateDestroy
        • String ID:
        • API String ID: 3296620671-0
        • Opcode ID: a77008d32b99d0192dffb9396561ca31d65bd220c0e147d5a25eb8e2d965278a
        • Instruction ID: b3417f980e0476a529731f21db5a5b3dc0af453e0ecf97f6e7b900ed26ba50ff
        • Opcode Fuzzy Hash: a77008d32b99d0192dffb9396561ca31d65bd220c0e147d5a25eb8e2d965278a
        • Instruction Fuzzy Hash: 76F0A033B48307ABE7696BB3AE08B1B36EDD740249FA454A5E80EE91C4E77485408E02
        APIs
        • HeapCreate.KERNEL32(00000000,00001000,00000000), ref: 00E792AB
        • HeapDestroy.KERNEL32 ref: 00E792E2
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: Heap$CreateDestroy
        • String ID:
        • API String ID: 3296620671-0
        • Opcode ID: 7b37a166e4fce949ee4c814439578ce033f1fc5b13621efa553461c6a40ee5f3
        • Instruction ID: 791c2d1ad2c012b966effa567878ec749f9a5f32d6fc1b41d4df20c2441635df
        • Opcode Fuzzy Hash: 7b37a166e4fce949ee4c814439578ce033f1fc5b13621efa553461c6a40ee5f3
        • Instruction Fuzzy Hash: AAF0A031A64341BEEF01AB76BC4A73536D8DB40369F20D465F40CF84A3FB7088848B04
        APIs
        • HeapCreate.KERNEL32(00000000,00001000,00000000,?,6CE5F2E7,00000001), ref: 6CE6214E
        • HeapDestroy.KERNEL32(?,6CE5F2E7,00000001), ref: 6CE62185
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: Heap$CreateDestroy
        • String ID:
        • API String ID: 3296620671-0
        • Opcode ID: fef6e4887f1bdd944678a92131b7381addde262451a1bb5bf7dc56e785af9b7e
        • Instruction ID: 8161fe3b723a79673d13c10918343db2ba0f7b06ed5094e07aea3c45bc072fe6
        • Opcode Fuzzy Hash: fef6e4887f1bdd944678a92131b7381addde262451a1bb5bf7dc56e785af9b7e
        • Instruction Fuzzy Hash: 45F0A0337B93009EEB859BB39D49B363AB8DB8635DF241465E52DC5E80FB7480418B41
        APIs
        • ___crtCorExitProcess.LIBCMT ref: 00E77F2C
          • Part of subcall function 00E77EF4: GetModuleHandleA.KERNEL32(mscoree.dll,?,00E77F31,?,?,00E7B498,000000FF,0000001E,?,00E7DAE6,00000018,00E86328,0000000C,00E7DB7C,?,?), ref: 00E77EFE
          • Part of subcall function 00E77EF4: GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00E77F0E
        • ExitProcess.KERNEL32 ref: 00E77F35
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: ExitProcess$AddressHandleModuleProc___crt
        • String ID:
        • API String ID: 2427264223-0
        • Opcode ID: dcaf608a273121aa3db467a698f8ed96cc73906e9df53d462ee5aa1892b17dfe
        • Instruction ID: 393ea4e4121198e3f1969bbe955bc8d749889062eb9a53541dbe7c39ea92feef
        • Opcode Fuzzy Hash: dcaf608a273121aa3db467a698f8ed96cc73906e9df53d462ee5aa1892b17dfe
        • Instruction Fuzzy Hash: DAB09231004208BFCB012F1ADC0AC4A3F6AEB813A0B5480A4F90C19831DF72ADD2DA80
        APIs
        • GetVersionExA.KERNEL32(?), ref: 6CE570E9
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: Version
        • String ID:
        • API String ID: 1889659487-0
        • Opcode ID: 74bb6b1f56b60dbd539b9cd46c51856a93197854b3ef3ee65a2994f72e0dd67e
        • Instruction ID: 31c831be8d75f16168429f86203ff364e109c47b2c60381f57d00ef72f8c1cc9
        • Opcode Fuzzy Hash: 74bb6b1f56b60dbd539b9cd46c51856a93197854b3ef3ee65a2994f72e0dd67e
        • Instruction Fuzzy Hash: B6014831A25106CADB509B768A4175A73F99B0630CFF08169D819D2B81FB32C9B98B11
        APIs
        • GetVersionExA.KERNEL32(?), ref: 6CE57192
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: Version
        • String ID:
        • API String ID: 1889659487-0
        • Opcode ID: 14e239a03ce1c9cddba0eba13a4dba019b117a71984496ea040ebe01d1054a04
        • Instruction ID: a60b2aac8d24cda667e52730a6f9db840c3f1664e451b371b6adc1f1983150bf
        • Opcode Fuzzy Hash: 14e239a03ce1c9cddba0eba13a4dba019b117a71984496ea040ebe01d1054a04
        • Instruction Fuzzy Hash: C90184317211059ADB50CF768A4575A77F99B0620CFF081ACC85DD2741DB32C9B9CB10
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: __fclose_nolock
        • String ID:
        • API String ID: 4232755567-0
        • Opcode ID: e4b942de0a1505527b23a3e3a5eda4364cb956adf743d9b4799d2fcb02134785
        • Instruction ID: 5d20362d2854e2a3e162397f9b0effbc33d938ab42037b6fd2f2ec3739e1c3a4
        • Opcode Fuzzy Hash: e4b942de0a1505527b23a3e3a5eda4364cb956adf743d9b4799d2fcb02134785
        • Instruction Fuzzy Hash: E9F0C270C00707ABE732BB6D8C0078E7AE49F41370F948748E479AA1E0CB3886038E55
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: __fclose_nolock
        • String ID:
        • API String ID: 4232755567-0
        • Opcode ID: d6131161fc318114b21d2b33625792c421c5f4eb68429c26899572ef31803ec4
        • Instruction ID: 06f4c4417febb3bc10775ad1320ae75840e7aacc48937400d526114aa842bded
        • Opcode Fuzzy Hash: d6131161fc318114b21d2b33625792c421c5f4eb68429c26899572ef31803ec4
        • Instruction Fuzzy Hash: 38F0F6B0C08304D9C720BB68880269E7BE05F81330F68F754F0BDB61E3CB7849429B46
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: __fclose_nolock
        • String ID:
        • API String ID: 4232755567-0
        • Opcode ID: 772fae3a01b28627f03018b276768008794d043a560cb567bf10f705c5a48512
        • Instruction ID: 71ccf8d9ba536d721e241141488cae0219e5a3b06f5652accc9a3a189b1c40ab
        • Opcode Fuzzy Hash: 772fae3a01b28627f03018b276768008794d043a560cb567bf10f705c5a48512
        • Instruction Fuzzy Hash: 3FF0CD71C907048AC710AB6A9C00ACE7AB0AF42338FB0C70DD03897ED0CB3C86169B85
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: __calloc_impl
        • String ID:
        • API String ID: 2175177749-0
        • Opcode ID: 100eea5b0c52ac80efb81ab6c7dec1ed5e7b7967733a5c4d771986ec6da5406a
        • Instruction ID: b2cae057b036b47366a73d2b1a1d6b63341ca762a227b95f7ca0e93b1c0246c4
        • Opcode Fuzzy Hash: 100eea5b0c52ac80efb81ab6c7dec1ed5e7b7967733a5c4d771986ec6da5406a
        • Instruction Fuzzy Hash: E7E06D36A40256BBDB215A988D00BCE36BE9B816A0F5901A8ED06BB144DA75DE0196A0
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: __calloc_impl
        • String ID:
        • API String ID: 2175177749-0
        • Opcode ID: 036c3dd94c1a7d239b4fe79d371a8158f3537555fa9b21d57610d5a54f349ae4
        • Instruction ID: 6afdaf92705ecfb6638f2f89dcda2828a88eff3d3922245f3cbeecd363ee3bf0
        • Opcode Fuzzy Hash: 036c3dd94c1a7d239b4fe79d371a8158f3537555fa9b21d57610d5a54f349ae4
        • Instruction Fuzzy Hash: 2AE0657660021467DF116A889802A9D76EEDBC9764F19D0A0BD1CB7201E670DE0196A1
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: __calloc_impl
        • String ID:
        • API String ID: 2175177749-0
        • Opcode ID: 0f20a837f93326a4025be3b2bbf171935fb245581a7509884b240fb5b1cbe05a
        • Instruction ID: ffa76cc7d0050d75987f55289c317d57aeb85fc20772dfec3be4bdcf8a2eb1ff
        • Opcode Fuzzy Hash: 0f20a837f93326a4025be3b2bbf171935fb245581a7509884b240fb5b1cbe05a
        • Instruction Fuzzy Hash: 70E06D7A6A1118ABCB124AC79D01BDE76B99B80669F350065EC15E7B00DB70DA08D7A0
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: _doexit
        • String ID:
        • API String ID: 1975234786-0
        • Opcode ID: eec7c2cc112c21125ee25011a3c9f5f8ceeb673401462026301a0a9824ced2cb
        • Instruction ID: 1443cdcd81a12b7b5a72b39102bc2947f0c76a3bd23c0ee43a9e5f9bf8972a84
        • Opcode Fuzzy Hash: eec7c2cc112c21125ee25011a3c9f5f8ceeb673401462026301a0a9824ced2cb
        • Instruction Fuzzy Hash: A1B09272680208B7EA202542AC07F063A4987D0B60E244020BA0C291A1A9A2A9699089
        APIs
        • EndDialog.USER32(?,00000006), ref: 6CE57A44
        • lstrcmpA.KERNEL32(?,CHS,?,?), ref: 6CE57A9C
        • lstrcmpA.KERNEL32(?,CHT,?,?), ref: 6CE57AB7
        • lstrcmpA.KERNEL32(?,CZE,?,?), ref: 6CE57AD2
        • lstrcmpA.KERNEL32(?,DUT,?,?), ref: 6CE57AED
        • lstrcmpA.KERNEL32(?,FRN,?,?), ref: 6CE57B08
        • FindResourceA.KERNEL32(?,?,DATA), ref: 6CE57C0A
        • GetLastError.KERNEL32(Unable to find EULA %s.,?,?,?), ref: 6CE57C1D
        • LoadResource.KERNEL32(?,00000000,?,?), ref: 6CE57C4E
        • GetLastError.KERNEL32(Unable to load EULA %s.,?,?,?), ref: 6CE57C64
        • _memset.LIBCMT ref: 6CE57CC5
        • SetDlgItemTextA.USER32(?,00001B59,00000000), ref: 6CE57CE4
        • SendDlgItemMessageA.USER32(?,00001B59,000000B1,000000FF,00000000), ref: 6CE57CF7
        • EndDialog.USER32(?,00000007), ref: 6CE57D0C
        • SendDlgItemMessageA.USER32(?,00001B59,000000B1,000000FF,00000000), ref: 6CE57D2C
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: lstrcmp$Item$DialogErrorLastMessageResourceSend$FindLoadText_memset
        • String ID: 4$BRZ$CHS$CHT$CZE$DATA$DUT$EulaProc$FRN$FindResource()$GER$ITN$JPN$KOR$LoadResource()$POL$RUS$SETUP_AGREEMENT_%s$SPA$SWE$Unable to allocate memory block for EULA %s.$Unable to find EULA %s.$Unable to load EULA %s.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\eula.cpp
        • API String ID: 3965438891-736825585
        • Opcode ID: 5df74691e18b2f8b3ac5d94edfa9313391a75c5db9558842dcba47385288c43d
        • Instruction ID: 766fc21165c20e53d4ccfca2d1b113ba28f378e7f550ce5e18686394dab74a94
        • Opcode Fuzzy Hash: 5df74691e18b2f8b3ac5d94edfa9313391a75c5db9558842dcba47385288c43d
        • Instruction Fuzzy Hash: BC91C875D1420AAADB009FE5CC04EEE7BBDAB06748FF48915E500F2641E77BD5368BA0
        APIs
        • _strrchr.LIBCMT ref: 6CE5C4FB
        • FindFirstFileA.KERNEL32(?,?,?,?,?,00000000), ref: 6CE5C553
        • FindClose.KERNEL32(00000000,?,?,00000000), ref: 6CE5C569
        • FindFirstFileA.KERNEL32(?,?,?,?,00000000), ref: 6CE5C575
        • FindClose.KERNEL32(00000000,?,?,00000000), ref: 6CE5C585
        • _strrchr.LIBCMT ref: 6CE5C801
        • FileTimeToSystemTime.KERNEL32(?,?,00000001,inf,?,?,00000000), ref: 6CE5C897
        • FileTimeToSystemTime.KERNEL32(?,?,?,?,00000000), ref: 6CE5C8AF
        • _strrchr.LIBCMT ref: 6CE5C9FC
        • FileTimeToSystemTime.KERNEL32(?,?,00000001,chm,?,?,00000000), ref: 6CE5CA43
        • FileTimeToSystemTime.KERNEL32(?,?,?,?,00000000), ref: 6CE5CA5F
        Strings
        • Unable to get Version on source file %s, xrefs: 6CE5C53E
        • Warning: CompareBinary(): Unable to get check sum., xrefs: 6CE5C788
        • Target file: '%s' Target file is Version %d.%d.%d.%dSource file is Version %d.%d.%d.%d, xrefs: 6CE5C673
        • CheckVersions(): CheckForceCopy() failed., xrefs: 6CE5C7DE
        • binary data is not same., xrefs: 6CE5C793
        • CheckVersions(): GetDriverVerFromInf() failed., xrefs: 6CE5C83D
        • Newer file is available., xrefs: 6CE5CB7D
        • Unable to get Version on target file %s, xrefs: 6CE5C51C
        • Target DriverVer is "%s, %d.%02d.%02d.%04d", xrefs: 6CE5C9AB
        • Target DX version: %d.%02d.%02d.%04d, Timestamp: %d/%02d/%02d %02d:%02d:%02d.%02d, xrefs: 6CE5CAC1
        • Target DriverVer: "%s, %d.%02d.%02d.%04d", Timestamp: %d/%02d/%02d %02d:%02d:%02d.%02d, xrefs: 6CE5C914
        • Source DriverVer: "%s, %d.%02d.%02d.%04d", Timestamp: %d/%02d/%02d %02d:%02d:%02d.%02d, xrefs: 6CE5C979
        • Source DX version: %d.%02d.%02d.%04d, Timestamp: %d/%02d/%02d %02d:%02d:%02d.%02d, xrefs: 6CE5CB1F
        • inf, xrefs: 6CE5C810
        • Newer version is available., xrefs: 6CE5C9E5
        • Currently %s is newer than the one being installed, xrefs: 6CE5C79F
        • Force Copy!, xrefs: 6CE5C69E, 6CE5C7D0
        • cat, xrefs: 6CE5C506
        • chm, xrefs: 6CE5CA0B
        • Target DX version is %d.%02d.%02d.%04d, xrefs: 6CE5CB4A
        • Source DX version is %d.%02d.%02d.%04d, xrefs: 6CE5CB70
        • Source DriverVer is "%s, %d.%02d.%02d.%04d", xrefs: 6CE5C9D8
        • SourceLangID = 0x%04X, TargetLangID = 0x%04X, xrefs: 6CE5C776
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: Time$File$FindSystem$_strrchr$CloseFirst
        • String ID: CheckVersions(): CheckForceCopy() failed.$CheckVersions(): GetDriverVerFromInf() failed.$Currently %s is newer than the one being installed$Force Copy!$Newer file is available.$Newer version is available.$Source DX version is %d.%02d.%02d.%04d$Source DX version: %d.%02d.%02d.%04d, Timestamp: %d/%02d/%02d %02d:%02d:%02d.%02d$Source DriverVer is "%s, %d.%02d.%02d.%04d"$Source DriverVer: "%s, %d.%02d.%02d.%04d", Timestamp: %d/%02d/%02d %02d:%02d:%02d.%02d$SourceLangID = 0x%04X, TargetLangID = 0x%04X$Target DX version is %d.%02d.%02d.%04d$Target DX version: %d.%02d.%02d.%04d, Timestamp: %d/%02d/%02d %02d:%02d:%02d.%02d$Target DriverVer is "%s, %d.%02d.%02d.%04d"$Target DriverVer: "%s, %d.%02d.%02d.%04d", Timestamp: %d/%02d/%02d %02d:%02d:%02d.%02d$Target file: '%s' Target file is Version %d.%d.%d.%dSource file is Version %d.%d.%d.%d$Unable to get Version on source file %s$Unable to get Version on target file %s$Warning: CompareBinary(): Unable to get check sum.$binary data is not same.$cat$chm$inf
        • API String ID: 502818252-3991829042
        • Opcode ID: ca26bc618ad8c9d2634a0835faab56167d9c23e8d6295eca1bb5f2af5de17e2e
        • Instruction ID: bef73a742a958b9d678b02820f3b7f3512ea45061a60350194368b74bcccbee7
        • Opcode Fuzzy Hash: ca26bc618ad8c9d2634a0835faab56167d9c23e8d6295eca1bb5f2af5de17e2e
        • Instruction Fuzzy Hash: C302CAB5600119AADB249B55CC54FFBB3FCAB0C305FA00595F945E2A80DB36DEA4DB31
        APIs
        • __wstrtime.LIBCMT ref: 00E7393B
        • __wstrtime.LIBCMT ref: 00E73944
          • Part of subcall function 00E73803: GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00E73839
          • Part of subcall function 00E73803: OutputDebugStringA.KERNEL32(DXSETUP_DPF(): Unable to open log file.), ref: 00E73848
          • Part of subcall function 00E73803: CreateDirectoryA.KERNEL32(?,00000000), ref: 00E73888
          • Part of subcall function 00E73803: GetLastError.KERNEL32 ref: 00E73892
        • _strrchr.LIBCMT ref: 00E7398A
        • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00E73A9A
        • LocalFree.KERNEL32(?), ref: 00E73ABF
        • GetLastError.KERNEL32 ref: 00E73AC7
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: DirectoryErrorLast__wstrtime$CreateDebugFormatFreeLocalMessageOutputStringWindows_strrchr
        • String ID: $ Error:$ Failed API:%s$ File in process:$ - $ module: %s(%s), file: %s, line: %d, function: %s$%s(): %s$%s(): %s failed, error = %d.$%s(): %s failed, error = 0x%x.$%s(): %s failed.$(%d)$(0x%x)$--------------------$DXSError(): FormatMessage() failed, error = %d.$DXSError(): FormatMessage() failed, system cannot find message text for error.$DXSetup$Mar 30 2011$[%s %s]
        • API String ID: 3982051927-2477982902
        • Opcode ID: 0dd5aa160c0ae91745631cea694bd5c70e3d00bc1e2563c924b6008400b2f1e6
        • Instruction ID: 8f1610c5f682a04c5aa24d70890ba7ec2844d93b15e12171fc4d2b9bdc557be6
        • Opcode Fuzzy Hash: 0dd5aa160c0ae91745631cea694bd5c70e3d00bc1e2563c924b6008400b2f1e6
        • Instruction Fuzzy Hash: CB61B5B1904309ABDB65EBB4DC4BEDA3BACEB44340F00A0A5F51DB6141EB718F44AB61
        APIs
        • FindFirstFileA.KERNEL32(?,?,?,?,\*.*), ref: 6CE5A416
        • lstrcmpA.KERNEL32(?,6CE52CC8), ref: 6CE5A444
        • lstrcmpA.KERNEL32(?,6CE52CC4), ref: 6CE5A45E
          • Part of subcall function 6CE59A47: _strrchr.LIBCMT ref: 6CE59A51
        • GetFileAttributesA.KERNEL32(?), ref: 6CE5A4E1
        • GetLastError.KERNEL32(00000000), ref: 6CE5A4ED
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563C2
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563CB
          • Part of subcall function 6CE56391: _strrchr.LIBCMT ref: 6CE56411
        • FindNextFileA.KERNEL32(?,?), ref: 6CE5A57F
        • FindClose.KERNEL32(?), ref: 6CE5A593
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: FileFind$__wstrtime_strrchrlstrcmp$AttributesCloseErrorFirstLastNext
        • String ID: CleanUpDirectory$DeleteFile("%s") return 0, reason = %d.$GetFileAttributes()$Unable to create path string, %s\%s.$Unable to create path string, %s\*.*.$Unable to remove: %s which is locked, reason = %d.$\*.*$e:\bt\382730\setup\deliverables\dsetup\dsetup32\inline.h
        • API String ID: 338635360-3006747567
        • Opcode ID: 89145429076855f1a73ce07c27f43b7e8040ed3d89f344da5cda5fc95bf62eb3
        • Instruction ID: 09fb535e4cb06a8163a7214851d1c969c59e1103d6ecd7e5321b096e6110c429
        • Opcode Fuzzy Hash: 89145429076855f1a73ce07c27f43b7e8040ed3d89f344da5cda5fc95bf62eb3
        • Instruction Fuzzy Hash: E041C271981118AADB109EA18C88EFF777CEB1534CFF00595B515E2A40E732DEA48A70
        APIs
        • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00E769D3
        • GetLastError.KERNEL32(00000000), ref: 00E769DE
          • Part of subcall function 00E7390A: __wstrtime.LIBCMT ref: 00E7393B
          • Part of subcall function 00E7390A: __wstrtime.LIBCMT ref: 00E73944
          • Part of subcall function 00E7390A: _strrchr.LIBCMT ref: 00E7398A
        • #17.COMCTL32(?,?,?,?,?), ref: 00E76AE2
        • ExitWindowsEx.USER32(00000002,00000000), ref: 00E76B13
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: __wstrtime$DirectoryErrorExitLastSystemWindows_strrchr
        • String ID: GetFileVersion() failed.$GetSystemDirectory()$P$StartWizard$StartWizard()$Unable to create path string, %s%s.$Win95(): This platform is not supported.$\comctl32.dll$comctl32.dll version: %d.%02d.%02d.%04d$e:\bt\382730\setup\deliverables\dxsetup\psheets.cpp$reboot system
        • API String ID: 1959146012-4094694292
        • Opcode ID: 08e0450dcf23ebb7ab3d6a1213576a4d83520f6f1de3edd6f5aa4f3035f389a9
        • Instruction ID: 66953a270d6f5a083d9310cc90aa8a502adb3df417f3cffbb9474486cad5b450
        • Opcode Fuzzy Hash: 08e0450dcf23ebb7ab3d6a1213576a4d83520f6f1de3edd6f5aa4f3035f389a9
        • Instruction Fuzzy Hash: D7413BB164075576C724B6759C47EEB72ACDB81B08F40E19DFB4CF60C2DBA08A84C6B1
        APIs
        • GetCurrentProcess.KERNEL32 ref: 00E74176
        • OpenProcessToken.ADVAPI32(00000000,000F01FF,?), ref: 00E74186
        • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00E7419C
        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00E741CB
        • CloseHandle.KERNEL32(?), ref: 00E741D4
        • FreeLibrary.KERNEL32(733F0000), ref: 00E741E4
        • GetLastError.KERNEL32 ref: 00E741EE
        Strings
        • e:\bt\382730\setup\deliverables\dxsetup\dxsetup.cpp, xrefs: 00E74209
        • FreeLibrary(), xrefs: 00E741FA
        • SeShutdownPrivilege, xrefs: 00E74196
        • EnableReboot, xrefs: 00E741FF
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: ProcessToken$AdjustCloseCurrentErrorFreeHandleLastLibraryLookupOpenPrivilegePrivilegesValue
        • String ID: EnableReboot$FreeLibrary()$SeShutdownPrivilege$e:\bt\382730\setup\deliverables\dxsetup\dxsetup.cpp
        • API String ID: 274012654-347618328
        • Opcode ID: 8fe9c289391bbe48caa3849a100be0b64bc9fa8c90f4796c6fd3e92f3470a26f
        • Instruction ID: 5636440152ea8c6da8d15904f7cc956e7a1367d73d0fa95faa31e08d22da6660
        • Opcode Fuzzy Hash: 8fe9c289391bbe48caa3849a100be0b64bc9fa8c90f4796c6fd3e92f3470a26f
        • Instruction Fuzzy Hash: 67119DB0A01319AFDB10DFAADC0ADFF7BB8EF08704B404055F508F2191DB7489849BA1
        APIs
        • __get_wpgmptr.LIBCMT ref: 00E8154C
        • VirtualQuery.KERNEL32(?,?,0000001C), ref: 00E81577
        • GetSystemInfo.KERNEL32(?), ref: 00E8158F
        • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00E815B8
        • GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00E815C8
        • VirtualAlloc.KERNEL32(?,?,00001000,00000004), ref: 00E8164F
        • VirtualProtect.KERNEL32(?,?,?,?), ref: 00E81662
          • Part of subcall function 00E7A451: OutputDebugStringA.KERNEL32(Invalid parameter passed to C runtime function.), ref: 00E7A4E5
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: Virtual$AddressAllocDebugHandleInfoModuleOutputProcProtectQueryStringSystem__get_wpgmptr
        • String ID: SetThreadStackGuarantee$kernel32.dll
        • API String ID: 2401657611-423161677
        • Opcode ID: 17e08c1edb21e4a3470746bb673e6e1f6d47df795e0473741a59721bc8f813f5
        • Instruction ID: b62366e272d3f3e4f4c23ab711325021dbf37fcf08080d31e645c146b0c37c3d
        • Opcode Fuzzy Hash: 17e08c1edb21e4a3470746bb673e6e1f6d47df795e0473741a59721bc8f813f5
        • Instruction Fuzzy Hash: 27418F71D00208AFCB11EFE5DC859EEBBBDEB84304F1454A6E55EF6140E7309A86DB90
        APIs
        • GetPrivateProfileStringA.KERNEL32(Version,DriverVer,6CE51EA0,?,00000104,?), ref: 6CE5C3F8
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: PrivateProfileString
        • String ID: DriverVer$GetDriverVerFromInf(): StringToVersionInfo() failed.$GetDriverVerFromInf(): Unable to find %s from %s.$GetDriverVerFromInf(): Unable to get %s from %s.$Version
        • API String ID: 1096422788-1349852725
        • Opcode ID: 8d1e4df6f3f5b552e476a0ff3473096c1d8af6cc0d27ffbf827c018d257b71dc
        • Instruction ID: 33e77349346dea44c4bfd7c337b71def7c24bbf0ad0ecbe5f5f22e1f29978a5b
        • Opcode Fuzzy Hash: 8d1e4df6f3f5b552e476a0ff3473096c1d8af6cc0d27ffbf827c018d257b71dc
        • Instruction Fuzzy Hash: 34219875A0019C7BDB10DB668C45FEB77BCDB8A348FA044A4A548D3700EB76CA64CB61
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID:
        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN$1>$?$T
        • API String ID: 0-2420901943
        • Opcode ID: 090622d3e8f7343e5770de83dc44b6055eee5ca55bf655c887925035035e000e
        • Instruction ID: 8f3f2e750124cd000dc8bf2809ef5b2bc250ab65159b28af00e5085a5437e09a
        • Opcode Fuzzy Hash: 090622d3e8f7343e5770de83dc44b6055eee5ca55bf655c887925035035e000e
        • Instruction Fuzzy Hash: DE529F32D00A5ACBDF25DF98C8802EDB7B1FF54314F54926AC85DBB285EB745A42CB90
        APIs
          • Part of subcall function 00E7ECF3: SetFilePointer.KERNEL32(00000000,00000000,?,00000000,00000000,?,?,?,?,00E7EF80,?,00000000,00000000,00000002,00000000,00000000), ref: 00E7ED35
          • Part of subcall function 00E7ECF3: GetLastError.KERNEL32(?,00E7EF80,?,00000000,00000000,00000002,00000000,00000000,?), ref: 00E7ED42
          • Part of subcall function 00E7ECF3: __dosmaperr.LIBCMT ref: 00E7ED4D
        • GetProcessHeap.KERNEL32(00000008,00001000,?,?,?,?,?,00000000,00000109,00000000,?,?,00E802ED,00000109,?), ref: 00E8211C
        • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,00000000,00000109,00000000,?,?,00E802ED,00000109,?), ref: 00E82123
        • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,00000109,00000000,?,?,00E802ED), ref: 00E8219F
        • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000,00000109,00000000,?,?,00E802ED,00000109), ref: 00E821A6
        • SetEndOfFile.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,00000109,00000000,?,?,00E802ED), ref: 00E82201
        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,00000109,00000000,?,?,00E802ED,00000109), ref: 00E8222E
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: Heap$ErrorFileLastProcess$AllocFreePointer__dosmaperr
        • String ID:
        • API String ID: 3789379547-0
        • Opcode ID: 1f4484a8e512283babde58eefb8ce73917130f43f35685705e33a0cd7e40f34f
        • Instruction ID: ced6eb9a68b9d386e8e85498e8329ec3e1e78f80a85b58c33c987ce9dcbb081e
        • Opcode Fuzzy Hash: 1f4484a8e512283babde58eefb8ce73917130f43f35685705e33a0cd7e40f34f
        • Instruction Fuzzy Hash: 97410472900215AFDF147FBCCC4A6AD7AA2EB04324F249269FB2CB61A0D7344D819B91
        APIs
        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 733FAA5B
        • UnhandledExceptionFilter.KERNEL32(733F25F0), ref: 733FAA66
        • GetCurrentProcess.KERNEL32(C0000409), ref: 733FAA71
        • TerminateProcess.KERNEL32(00000000), ref: 733FAA78
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: ExceptionFilterProcessUnhandled$CurrentTerminate
        • String ID:
        • API String ID: 3231755760-0
        • Opcode ID: 0e73f032666666af4951c7d47fc71f909be8a0820e11ae5fc8fd5679a1e26f48
        • Instruction ID: 2f82e38cf37a7179506924a06d54c522a0c342cc3d690c9cbc2178e6ff518d3d
        • Opcode Fuzzy Hash: 0e73f032666666af4951c7d47fc71f909be8a0820e11ae5fc8fd5679a1e26f48
        • Instruction Fuzzy Hash: 862104F6A19205DBC729FF57E2847483BF4FB48308BA068D9E40DA7320E37449418F08
        APIs
        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00E7B3E1
        • UnhandledExceptionFilter.KERNEL32(00E7298C), ref: 00E7B3EC
        • GetCurrentProcess.KERNEL32(C0000409), ref: 00E7B3F7
        • TerminateProcess.KERNEL32(00000000), ref: 00E7B3FE
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: ExceptionFilterProcessUnhandled$CurrentTerminate
        • String ID:
        • API String ID: 3231755760-0
        • Opcode ID: c7819a0562b345c5eecda808569cf7a5c791132a5fffd4e239665ee95076bc5c
        • Instruction ID: 2fbe77198e29e41f775a7958787014209df8b12ae7d341d2b9c1deacfac210e7
        • Opcode Fuzzy Hash: c7819a0562b345c5eecda808569cf7a5c791132a5fffd4e239665ee95076bc5c
        • Instruction Fuzzy Hash: 1E218BB48453049FDB50DF6BFD446A4BBE4BB08304B58545AEA0DBB362EB72598CCF05
        APIs
        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6CE64055
        • UnhandledExceptionFilter.KERNEL32(6CE54DF4), ref: 6CE64060
        • GetCurrentProcess.KERNEL32(C0000409), ref: 6CE6406B
        • TerminateProcess.KERNEL32(00000000), ref: 6CE64072
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: ExceptionFilterProcessUnhandled$CurrentTerminate
        • String ID:
        • API String ID: 3231755760-0
        • Opcode ID: ee85830f55c767567772a212ea6e0b785451905abd3295d20ea30a7c3f832485
        • Instruction ID: 2b7f6968da3e7cbbc014a6a45048b2f7f3d99ba48cf07dbb61f6d7f4ed6493d5
        • Opcode Fuzzy Hash: ee85830f55c767567772a212ea6e0b785451905abd3295d20ea30a7c3f832485
        • Instruction Fuzzy Hash: 6F21FFB9621B04DFDF40CF5BC9886673BB4BB0B348B90545AE40997B80E3708541CF86
        APIs
        • GetLocalTime.KERNEL32(47,?,00000000,?,00E73734), ref: 00E774C7
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: LocalTime
        • String ID: 47
        • API String ID: 481472006-2337063832
        • Opcode ID: a9222079f2880c8d88fd052f50aa87c2162007f3ca9b685fea1277bc207207b1
        • Instruction ID: 506e67f72089f9d78171e1e19d992ccb4d6ccd39782fc566a119af654526c437
        • Opcode Fuzzy Hash: a9222079f2880c8d88fd052f50aa87c2162007f3ca9b685fea1277bc207207b1
        • Instruction Fuzzy Hash: 18117B623093809BC7206BAD64C56DA7BE18F66324F18D47EF1ED57283D071984DC722
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID:
        • String ID: F;
        • API String ID: 0-1116262287
        • Opcode ID: 160c18495e08e6d5a01423682d9fe08b0ffd50e7eb88e382eda3ae8ed49b7dd0
        • Instruction ID: 97b414a1e7981b51d2c76f93643f109ba3900bd733c45a711552ced66d613514
        • Opcode Fuzzy Hash: 160c18495e08e6d5a01423682d9fe08b0ffd50e7eb88e382eda3ae8ed49b7dd0
        • Instruction Fuzzy Hash: C412BA32D44A08CBDF24EFA8C4543EDBBB2FB05319F64601AD45EBB295DB740886DB45
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID: 0-3916222277
        • Opcode ID: 39534562e07400f19dd00fa415b326fe37e80d3b1001df12846aaaaf03f5a201
        • Instruction ID: d326e5cd197f607fae31468bd5f19f24cfa1294ceb40a1b3c4561e90e1e1bee0
        • Opcode Fuzzy Hash: 39534562e07400f19dd00fa415b326fe37e80d3b1001df12846aaaaf03f5a201
        • Instruction Fuzzy Hash: C802B672A1051A9BDF08DF58D8403EDB3B2FBD8315F259669D92EBB2D0D7706905CB80
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID: 0-3916222277
        • Opcode ID: 41199e299403961c6276f6b5009a100d0daa5a310febd6a720cea7943836a3ca
        • Instruction ID: a4c95bff11a10d27694f983514d5bb53c77043fb2d78e978be6bf1ec355dc8ac
        • Opcode Fuzzy Hash: 41199e299403961c6276f6b5009a100d0daa5a310febd6a720cea7943836a3ca
        • Instruction Fuzzy Hash: 2902B672A1051A9BDF08DF68D8507EDB3B2FBD8315F259229D92EBB2D4D3705905CB80
        APIs
        • SetUnhandledExceptionFilter.KERNEL32(Function_00007E43), ref: 00E77E8F
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: ExceptionFilterUnhandled
        • String ID:
        • API String ID: 3192549508-0
        • Opcode ID: 2dc0401e43466575bf769598586026e1eaba40b146fee5c38e122b5150135bc7
        • Instruction ID: 3a546e3652e9cf41190ba3c41c656172e9b70de5db6d62582dfb571a340c2315
        • Opcode Fuzzy Hash: 2dc0401e43466575bf769598586026e1eaba40b146fee5c38e122b5150135bc7
        • Instruction Fuzzy Hash: 889002702573014E960057755D0E54535919B6C742B8164E47149F8458DB5045865511
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID:
        • String ID: N@
        • API String ID: 0-1509896676
        • Opcode ID: b8353476b47a4024188c7d2459d2ff7694f37a11573546204e4f268b1d60af00
        • Instruction ID: b145aee94b0ae1895b5c3c46b846ae7910784754934d8406bde77589650578a3
        • Opcode Fuzzy Hash: b8353476b47a4024188c7d2459d2ff7694f37a11573546204e4f268b1d60af00
        • Instruction Fuzzy Hash: A1615EB1A016268FCB18DF49C49456AF7B2FF88304B1AD16DDA0D6F2A6D7709D41CBC0
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID:
        • String ID: csm
        • API String ID: 0-1018135373
        • Opcode ID: 4aac8754f3a59cc46f76727bbac4d2c2fdd71c2905225d17e3c67b351cc594a4
        • Instruction ID: 7e830f0aaa7f9747575179a21feea722e00c07982dac34d394c875500462c7a5
        • Opcode Fuzzy Hash: 4aac8754f3a59cc46f76727bbac4d2c2fdd71c2905225d17e3c67b351cc594a4
        • Instruction Fuzzy Hash: DF51D3346002018FCB24DF69C4D1AA9B7E2BF84328F14D55DE82EAB396DB71EC41CB50
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID:
        • String ID: csm
        • API String ID: 0-1018135373
        • Opcode ID: 8445e2eeb4b35c87f217c13745c424e01fd3b9c1e386698aa1d2e8c989037a37
        • Instruction ID: 043f757e9fa94620eb55db279b31a36cf47ad4329c32dfcb3f522c12b1c8814a
        • Opcode Fuzzy Hash: 8445e2eeb4b35c87f217c13745c424e01fd3b9c1e386698aa1d2e8c989037a37
        • Instruction Fuzzy Hash: 7D51C3346902058FCB14DF6AC484AAEB7B2FF85318F34856DE8669BB95CB71E844CB40
        APIs
        • GetWindowLongA.USER32(?,000000EB), ref: 00E757A2
        • SetWindowLongA.USER32(?,000000EB,?), ref: 00E757C8
        • GetDlgItem.USER32(?,00001389), ref: 00E757DA
        • SendMessageA.USER32(00000000,00000030,?,00000001), ref: 00E757E3
        • GetDlgItem.USER32(?,0000138A), ref: 00E757F5
        • SendMessageA.USER32(00000000), ref: 00E757F8
        • GetDlgItem.USER32(?,0000138B), ref: 00E7580A
        • GetParent.USER32(?), ref: 00E7583C
        • PostMessageA.USER32(00000000), ref: 00E75845
        • GetParent.USER32(?), ref: 00E75851
        • PostMessageA.USER32(00000000), ref: 00E75854
        • GetDlgItem.USER32(?,00001389), ref: 00E75879
        • ShowWindow.USER32(00000000), ref: 00E75882
        • GetDlgItem.USER32(?,0000138A), ref: 00E7588C
        • ShowWindow.USER32(00000000), ref: 00E7588F
        • GetDlgItem.USER32(?,0000138B), ref: 00E75899
        • ShowWindow.USER32(00000000), ref: 00E7589C
        • GetDlgItem.USER32(?,0000138C), ref: 00E758A6
        • ShowWindow.USER32(00000000), ref: 00E758A9
        • GetDlgItem.USER32(?,0000138D), ref: 00E758B3
        • ShowWindow.USER32(00000000), ref: 00E758B6
        • GetDlgItem.USER32(?,00001397), ref: 00E7590B
        • ShowWindow.USER32(00000000), ref: 00E7590E
        • GetDlgItem.USER32(?,0000138E), ref: 00E75918
        • ShowWindow.USER32(00000000), ref: 00E7591B
        • SendMessageA.USER32(00000000), ref: 00E759EC
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: Item$Window$Show$Message$Send$LongParentPost
        • String ID: N$PropSheet_RebootSystem()
        • API String ID: 1264772791-752106098
        • Opcode ID: adbc9bd970095fe1414b0b0be688ecf51ce321ba4f6c6b929ede4c67ebdda105
        • Instruction ID: f800e2d86e8ec85c763d710563d941f9da6cd1a45c7d3584cb2676db45260301
        • Opcode Fuzzy Hash: adbc9bd970095fe1414b0b0be688ecf51ce321ba4f6c6b929ede4c67ebdda105
        • Instruction Fuzzy Hash: D06152B1A81358BAEB306BB64C4EF9B2E1C9B80B61F115955B309BB4D1CEF4D540CEA4
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: Library__wstrtime$AddressFreeLoadProcVersion_strrchr
        • String ID: Application name is too long, %s.$Current logon user doesn't have the Administrator privilege.$DirectXRegisterApplicationA$DirectXRegisterApplicationA: Completed.$DirectXRegisterApplicationA: ERROR!$Function pointer XDirectXLoadString is not initialized.$Invalid parameter - struct pointer is NULL.$LoadDSetup32() failed.$RegCloseKey()$RegCloseKey() failed$RegCreateKeyExA()$RegSetValueExA()$RegSetValueExA().$StringFromGUID2()$Unable to convert GUID from UNICODE to ANSI.$WideCharToMultiByte()$XDirectXLoadString() failed.$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c
        • API String ID: 2044236047-2435350783
        • Opcode ID: dcd61a6d7f070b7718c21390c025da9975e2ae8f2d5462d9c152db29e973e654
        • Instruction ID: caad297771a26d868ad70406b345ec3927348ca8d539a1c42b72ca05aa99081b
        • Opcode Fuzzy Hash: dcd61a6d7f070b7718c21390c025da9975e2ae8f2d5462d9c152db29e973e654
        • Instruction Fuzzy Hash: A5D1B1F1B442177EFB309A629D05FF73ABCDB11751F90016AFA5AE90C1EA60DA408E74
        APIs
          • Part of subcall function 733F5E51: GetVersionExA.KERNEL32(?), ref: 733F5E7E
          • Part of subcall function 733F5E51: LoadLibraryA.KERNEL32(advpack.dll,?,00000000), ref: 733F5EBA
          • Part of subcall function 733F5E51: GetProcAddress.KERNEL32(00000000,IsNTAdmin), ref: 733F5ECE
          • Part of subcall function 733F5E51: FreeLibrary.KERNEL32(00000000), ref: 733F5F1A
        • GetVersionExA.KERNEL32(?), ref: 733F5842
        • GetLastError.KERNEL32(00000000), ref: 733F584D
        • _wcsnlen.LIBCMT ref: 733F591B
        • _wcsnlen.LIBCMT ref: 733F5935
        • RegCreateKeyExW.ADVAPI32(80000002,?,00000000,00000000,00000000,00000002,00000000,?,?,?,?), ref: 733F59AC
        • StringFromGUID2.OLE32(?,?,00000104,?,?), ref: 733F59D7
        • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 733F5D0F
        • RegCloseKey.ADVAPI32(?,?,?), ref: 733F5D4B
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: CloseLibraryVersion_wcsnlen$AddressCreateErrorFreeFromLastLoadProcString
        • String ID: GetVersionEx()$Application name is too long.$Current logon user doesn't have the Administrator privilege.$DirectXRegisterApplicationW$DirectXRegisterApplicationW:$DirectXRegisterApplicationW: Completed.$DirectXRegisterApplicationW: ERROR!$Invalid parameter - struct pointer is NULL.$MyLoadStringW() failed.$MyLoadStringW().$Not running NT 4.0. Version: [%08X]$Not running NT. Platform ID: [%08X]$RegCloseKey()$RegCreateKeyExW()$RegSetValueExW()$StringFromGUID2()$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c
        • API String ID: 187334128-611565798
        • Opcode ID: bd6d6947411fa2b6b62216296f67dafa985b587f63033261e2fffd528ee88348
        • Instruction ID: 33ac7c87bc979a663502a43b48226342dd576555bb71b95af482a1b5783d251d
        • Opcode Fuzzy Hash: bd6d6947411fa2b6b62216296f67dafa985b587f63033261e2fffd528ee88348
        • Instruction Fuzzy Hash: 04D18EF6A4020BBFFB315A508D85FAB72BEDB00345FD0066AF956F9092D7259E44CE24
        APIs
          • Part of subcall function 733F5E51: GetVersionExA.KERNEL32(?), ref: 733F5E7E
          • Part of subcall function 733F5E51: LoadLibraryA.KERNEL32(advpack.dll,?,00000000), ref: 733F5EBA
          • Part of subcall function 733F5E51: GetProcAddress.KERNEL32(00000000,IsNTAdmin), ref: 733F5ECE
          • Part of subcall function 733F5E51: FreeLibrary.KERNEL32(00000000), ref: 733F5F1A
        • RegCloseKey.ADVAPI32(?), ref: 733F4694
        • RegCloseKey.ADVAPI32(?), ref: 733F46C2
          • Part of subcall function 733F64D5: __wstrtime.LIBCMT ref: 733F6506
          • Part of subcall function 733F64D5: __wstrtime.LIBCMT ref: 733F650F
          • Part of subcall function 733F64D5: _strrchr.LIBCMT ref: 733F6555
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: CloseLibrary__wstrtime$AddressFreeLoadProcVersion_strrchr
        • String ID: App: $Current logon user doesn't have the Administrator privilege.$DirectXUnRegisterApplication$DirectXUnRegisterApplication:$DirectXUnRegisterApplication: Completed.$DirectXUnRegisterApplication: ERROR!$Guid$Index: %d$Invalid parameter - GUID is NULL.$RegCloseKey()$RegDeleteKey()$RegEnumKeyEx()$RegOpenKeyEx()$RegQueryInfoKey()$RegQueryValueEx()$SOFTWARE\Microsoft\DirectPlay\Applications$StringFromGUID2()$Unable to convert GUID from UNICODE to ANSI.$Unable to delete key %s.$Unable to find GUID.$WideCharToMultiByte()$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c
        • API String ID: 3035098486-1639858186
        • Opcode ID: 54e3b4a6b594d071d42f0a60e6f4fda640ab3a93b4204068043cb08b396f17b2
        • Instruction ID: 75d191e333ff2b4ade0e0d93899f76830fba53f494ed64ecbd68282347669e70
        • Opcode Fuzzy Hash: 54e3b4a6b594d071d42f0a60e6f4fda640ab3a93b4204068043cb08b396f17b2
        • Instruction Fuzzy Hash: F7A1D2B2D0012BBFF7319E419C80FEA727EEB94254FD4019AF90AE5041DB724E948E64
        APIs
        • _memset.LIBCMT ref: 733F3A12
        • _memset.LIBCMT ref: 733F3A2D
        • _memset.LIBCMT ref: 733F3A42
        • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 733F3A53
        • GetLastError.KERNEL32(00000000), ref: 733F3A5E
        • GetSystemDirectoryA.KERNEL32(00000000,00000104), ref: 733F3A90
        • GetLastError.KERNEL32(00000000), ref: 733F3A9B
        • SetCurrentDirectoryA.KERNEL32(00000000), ref: 733F3ABA
        • GetLastError.KERNEL32(00000000), ref: 733F3AC5
        • GetVersionExA.KERNEL32(?), ref: 733F3AF3
        • GetLastError.KERNEL32(00000000), ref: 733F3B08
        • LoadLibraryA.KERNEL32(00000000,00000000,00000000,\DINPUT.DLL), ref: 733F3B9A
        • GetLastError.KERNEL32(00000000), ref: 733F3BAB
        • GetProcAddress.KERNEL32(00000000,DirectInputCreateA), ref: 733F3BC8
        • GetLastError.KERNEL32(Module: %d, Function: DirectXInputCreateA,00000000), ref: 733F3BE4
          • Part of subcall function 733F64D5: __wstrtime.LIBCMT ref: 733F6506
          • Part of subcall function 733F64D5: __wstrtime.LIBCMT ref: 733F650F
          • Part of subcall function 733F64D5: _strrchr.LIBCMT ref: 733F6555
        • FreeLibrary.KERNEL32(?), ref: 733F3C05
        • GetLastError.KERNEL32(00000000), ref: 733F3C10
        • SetCurrentDirectoryW.KERNEL32(?), ref: 733F3C6C
        • GetLastError.KERNEL32(00000000), ref: 733F3C77
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorLast$Directory$Current_memset$Library__wstrtime$AddressFreeLoadProcSystemVersion_strrchr
        • String ID: DirectInputCreateA$FreeLibrary()$GetCurrentDirectory()$GetProcAddress()$GetRunningDXVersion$GetSystemDirectory()$GetVersionEx()$LoadLibrary()$Module: %d, Function: DirectXInputCreateA$SetCurrentDirectory()$Unable to create path string, %s%s.$\DINPUT.DLL$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c
        • API String ID: 3694406903-2033765323
        • Opcode ID: af0c8e631f594b783a36fa9ecabdaf8a0e3d4f5802a5aa3d9e3b585f48d5e185
        • Instruction ID: 44a16777c91a31bab480c7f3965730fd5e1092736da6cbdb25dd8624d8e7e101
        • Opcode Fuzzy Hash: af0c8e631f594b783a36fa9ecabdaf8a0e3d4f5802a5aa3d9e3b585f48d5e185
        • Instruction Fuzzy Hash: 9C61D5B2E00217BFDB31AB62DD48F9B7BBCEB45321F904195F959E6042D77986808F21
        APIs
        • _memset.LIBCMT ref: 00E765FA
        • _memset.LIBCMT ref: 00E76620
        • CreatePropertySheetPageA.COMCTL32(?,?,?,?,00000000,00000000,?), ref: 00E7669B
        • CreatePropertySheetPageA.COMCTL32(00000034,?,?,?,00000000,00000000,?), ref: 00E766E6
        • CreatePropertySheetPageA.COMCTL32(00000034,?,?,?,00000000,00000000,?), ref: 00E76731
        • CreatePropertySheetPageA.COMCTL32(00000034,?,?,?,00000000,00000000,?), ref: 00E76768
        • _memset.LIBCMT ref: 00E767EF
        • SystemParametersInfoA.USER32(00000029,00000000,?,00000000), ref: 00E7680C
        • GetDC.USER32(00000000), ref: 00E7681E
        • GetModuleHandleA.KERNEL32(00000000,00001F4B,?,00000020,?,?,?,?,?,?,00000000,00000000,?), ref: 00E7683C
        • LoadStringA.USER32(00000000), ref: 00E7683F
        • CreateFontIndirectA.GDI32(?), ref: 00E7684F
        • CreateFontIndirectA.GDI32(?), ref: 00E76862
        • GetDeviceCaps.GDI32(?,0000005A), ref: 00E76872
        • GetModuleHandleA.KERNEL32(00000000,00001F4A,?,00000020,?,?,?,?,?,?,00000000,00000000,?), ref: 00E76890
        • LoadStringA.USER32(00000000), ref: 00E76893
        • CreateFontIndirectA.GDI32(?), ref: 00E7689D
        • ReleaseDC.USER32(00000000,?), ref: 00E768AC
          • Part of subcall function 00E76CFA: LoadImageA.USER32(00E768CF,00001B5B,00000000,00000000,00000000,00002000), ref: 00E76D1A
          • Part of subcall function 00E76CFA: CreateCompatibleDC.GDI32(00000000), ref: 00E76D28
          • Part of subcall function 00E76CFA: SelectObject.GDI32(00000000), ref: 00E76D3C
          • Part of subcall function 00E76CFA: LoadImageA.USER32(00E768CF,00001B5C,00000000,00000000,00000000,00002000), ref: 00E76D50
          • Part of subcall function 00E76CFA: CreateCompatibleDC.GDI32(00000000), ref: 00E76D59
          • Part of subcall function 00E76CFA: SelectObject.GDI32(00000000), ref: 00E76D67
        • PropertySheetA.COMCTL32(00000034,?,?,?,?,?,?,?,00000000,00000000,?), ref: 00E768D6
          • Part of subcall function 00E76D75: DeleteObject.GDI32(00000000), ref: 00E76D89
          • Part of subcall function 00E76D75: DeleteObject.GDI32(00000000), ref: 00E76D9B
          • Part of subcall function 00E76D75: DeleteObject.GDI32(00000000), ref: 00E76DAD
          • Part of subcall function 00E76D75: DeleteDC.GDI32(00000000), ref: 00E76DC5
          • Part of subcall function 00E76D75: DeleteDC.GDI32(00000000), ref: 00E76DD7
          • Part of subcall function 00E76D75: DeleteDC.GDI32(00000000), ref: 00E76DE9
        • GetLastError.KERNEL32(00000000,00000072,00000030,00000000,?,?,?,?,?,?,00000000,00000000,?), ref: 00E768F3
          • Part of subcall function 00E7390A: __wstrtime.LIBCMT ref: 00E7393B
          • Part of subcall function 00E7390A: __wstrtime.LIBCMT ref: 00E73944
          • Part of subcall function 00E7390A: _strrchr.LIBCMT ref: 00E7398A
        • DeleteObject.GDI32(?), ref: 00E7693A
        • DeleteObject.GDI32(?), ref: 00E76942
        • DeleteObject.GDI32(?), ref: 00E7694A
          • Part of subcall function 00E76BDC: LoadStringW.USER32(00000000,0000006F,?,00000200), ref: 00E76C22
          • Part of subcall function 00E76BDC: GetLastError.KERNEL32(00000000), ref: 00E76C2D
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: CreateDelete$Object$LoadPropertySheet$Page$FontIndirectString_memset$CompatibleErrorHandleImageLastModuleSelect__wstrtime$CapsDeviceInfoParametersReleaseSystem_strrchr
        • String ID: 4$4$CreatePropertySheet$PropertySheet()$e:\bt\382730\setup\deliverables\dxsetup\psheets.cpp$j
        • API String ID: 1767149145-3416803283
        • Opcode ID: 88e4e4e4f3dd446bbe5938fab83d87fb5ed15ccd4b14c74e146ede6edcafb8c8
        • Instruction ID: 9449500f141edc1f59066ffbd1afb6a2bb2b2d695f6a824b40c6b2b554c05928
        • Opcode Fuzzy Hash: 88e4e4e4f3dd446bbe5938fab83d87fb5ed15ccd4b14c74e146ede6edcafb8c8
        • Instruction Fuzzy Hash: EE91D8B1D412299FDB60DF65DC89BDDBBB8BB49304F0040EAE60CB6291DB749A848F50
        APIs
        • GetWindowLongA.USER32(?,000000EB), ref: 00E75F23
        • SendDlgItemMessageA.USER32(?,00001391,000000F1,00000000,00000000), ref: 00E75F71
        • SendDlgItemMessageA.USER32(?,00001392,000000F1,00000001,00000000), ref: 00E75F83
          • Part of subcall function 00E7390A: __wstrtime.LIBCMT ref: 00E7393B
          • Part of subcall function 00E7390A: __wstrtime.LIBCMT ref: 00E73944
          • Part of subcall function 00E7390A: _strrchr.LIBCMT ref: 00E7398A
          • Part of subcall function 00E76BDC: LoadStringW.USER32(00000000,0000006F,?,00000200), ref: 00E76C22
          • Part of subcall function 00E76BDC: GetLastError.KERNEL32(00000000), ref: 00E76C2D
        • SendDlgItemMessageA.USER32(?,00001391,000000F1,00000001,00000000), ref: 00E75FA2
        • SendDlgItemMessageA.USER32(?,00001392,000000F1,00000000,00000000), ref: 00E75FB3
        • SetWindowLongA.USER32(?,000000EB,?), ref: 00E75FF6
        • GetDlgItem.USER32(?,00001389), ref: 00E76002
        • SendMessageA.USER32(00000000,00000030,?,00000001), ref: 00E7600F
        • GetParent.USER32(?), ref: 00E7607C
        • PostMessageA.USER32(00000000), ref: 00E76083
        • GetParent.USER32(?), ref: 00E7610B
        • PostMessageA.USER32(00000000), ref: 00E76112
        • SetDlgItemTextW.USER32(?,00001390,00000000), ref: 00E76127
        • SendDlgItemMessageA.USER32(?,00001390,000000B1,000000FF,00000000), ref: 00E76139
        • GetParent.USER32(?), ref: 00E7617D
        • PostMessageA.USER32(00000000), ref: 00E76184
        • GetParent.USER32(?), ref: 00E761CE
        • PostMessageA.USER32(00000000), ref: 00E761D5
        • GetParent.USER32(?), ref: 00E76200
        • PostMessageA.USER32(00000000), ref: 00E76207
        • SetWindowLongA.USER32(?,00000000,000000FF), ref: 00E76211
        • SendDlgItemMessageA.USER32(?,00001390,000000B1,000000FF,00000000), ref: 00E7623C
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: Message$Item$Send$ParentPost$LongWindow$__wstrtime$ErrorLastLoadStringText_strrchr
        • String ID: DirectXSEtupGetEULA() returned 0.$DirectXSetupGetEULA() returned 0.$IntroDlgProc$Unable to allocate memory block.$Unable to initialize CDSetup.$e:\bt\382730\setup\deliverables\dxsetup\psheets.cpp
        • API String ID: 1260387990-844574282
        • Opcode ID: b106e2a8c29c16f0eb2cff594d651d08abcb3dfb8e117105f4b5dff1f2658d23
        • Instruction ID: 1f8bc0cf739abe1de4167336bb7daeab8b44835c45e012bc95f0bfd5ccb96de4
        • Opcode Fuzzy Hash: b106e2a8c29c16f0eb2cff594d651d08abcb3dfb8e117105f4b5dff1f2658d23
        • Instruction Fuzzy Hash: A981F631646721BFDB245B6ADC4DEAB3E58EF05B65F40D114F60DB90E1C7B04881DBA0
        APIs
          • Part of subcall function 733F5E22: CompareStringA.KERNEL32(00000409,00000001,?,000000FF,?,000000FF,?,733F3F1D,00000000,DLS,00000000,?), ref: 733F5E38
        • _memset.LIBCMT ref: 733F3F2C
        • mmioOpenA.WINMM(?,?,00000000), ref: 733F3F3C
        • mmioDescend.WINMM(?,?,00000000,00000020), ref: 733F3F64
        • mmioClose.WINMM(?,00000000), ref: 733F3F92
        • mmioDescend.WINMM(?,?,?,00000010), ref: 733F3FD2
        • mmioClose.WINMM(?,00000000), ref: 733F4000
        • mmioRead.WINMM(?,?,00000008), ref: 733F4029
        • mmioClose.WINMM(?,00000000), ref: 733F4058
        • mmioClose.WINMM(?,00000000), ref: 733F408B
        • GetFileVersionInfoSizeA.VERSION(?,?,00000000,DLS,00000000,?), ref: 733F40C5
        • LocalAlloc.KERNEL32(00000040,00000000,?,?,00000000,DLS,00000000,?), ref: 733F40D8
        • GetFileVersionInfoA.VERSION(?,?,?,00000000), ref: 733F40F2
        • VerQueryValueA.VERSION(?,733F1534,?,?,?,?,?,00000000), ref: 733F4112
        • LocalFree.KERNEL32(?,?,?,?,00000000), ref: 733F4139
        • GetLastError.KERNEL32(00000000), ref: 733F4144
        • GetLastError.KERNEL32(00000000), ref: 733F415D
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: mmio$Close$DescendErrorFileInfoLastLocalVersion$AllocCompareFreeOpenQueryReadSizeStringValue_memset
        • String ID: 4$DLS$DirectXSetupGetFileVersion$LocalAlloc()$LocalFree()$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c$mmioClose()$mmioDescend()$mmioRead()$vers
        • API String ID: 2025664318-1787136798
        • Opcode ID: e7b64fa8595c133f53bbf186a2a05b6a7bfdfc89e42f0fa75f5cf57bb846ee5b
        • Instruction ID: cb78f8b0658cf3381b24c6917dd699a451ed029a8f3237d0ace0156a3111b3ad
        • Opcode Fuzzy Hash: e7b64fa8595c133f53bbf186a2a05b6a7bfdfc89e42f0fa75f5cf57bb846ee5b
        • Instruction Fuzzy Hash: 27718271E0021ABFFB316FA5DD44FAE7B7CEB04254F904129F946E6281DB3199418F60
        APIs
        • __wstrtime.LIBCMT ref: 733F6506
        • __wstrtime.LIBCMT ref: 733F650F
          • Part of subcall function 733F63CE: GetWindowsDirectoryA.KERNEL32(?,00000104,00000000,e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c), ref: 733F6404
          • Part of subcall function 733F63CE: OutputDebugStringA.KERNEL32(DXSETUP_DPF(): Unable to open log file.,00000000,e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c), ref: 733F6413
          • Part of subcall function 733F4A54: _vswprintf_s.LIBCMT ref: 733F4A87
          • Part of subcall function 733F63CE: CreateDirectoryA.KERNEL32(?,00000000), ref: 733F6453
          • Part of subcall function 733F63CE: GetLastError.KERNEL32 ref: 733F645D
        • _strrchr.LIBCMT ref: 733F6555
        • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 733F6665
        • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,GetRegistryDXVersion), ref: 733F668A
        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,GetRegistryDXVersion,e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c), ref: 733F6692
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: DirectoryErrorLast__wstrtime$CreateDebugFormatFreeLocalMessageOutputStringWindows_strrchr_vswprintf_s
        • String ID: $ Error:$ Failed API:%s$ File in process:$ - $ module: %s(%s), file: %s, line: %d, function: %s$%s(): %s$%s(): %s failed, error = %d.$%s(): %s failed, error = 0x%x.$%s(): %s failed.$(%d)$(0x%x)$--------------------$DSETUP$DXSError(): FormatMessage() failed, error = %d.$DXSError(): FormatMessage() failed, system cannot find message text for error.$GetRegistryDXVersion$Mar 30 2011$[%s %s]$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c
        • API String ID: 3659207835-1158362067
        • Opcode ID: af2cd2dd773f941f322c1c7482f2f96ee51dd953c544621dd57468404b43285e
        • Instruction ID: d26a0fc5ed89825512d1743ed8b42f08cb8c853f88664f8eb932af723604c6d8
        • Opcode Fuzzy Hash: af2cd2dd773f941f322c1c7482f2f96ee51dd953c544621dd57468404b43285e
        • Instruction Fuzzy Hash: C46180B5E0431FEBEF31AA608D45FDE37BCAB04200FC01596F919E6151DB359A9A8B60
        APIs
        • SetLastError.KERNEL32(0000000D), ref: 6CE57FAE
        • SetLastError.KERNEL32(00000057,?,00000004,6CE51A1C), ref: 6CE58016
        • FindResourceA.KERNEL32(?,?,DATA), ref: 6CE58061
        • GetLastError.KERNEL32(Unable to find EULA %s.,?,?,?), ref: 6CE58076
        • SizeofResource.KERNEL32(?,00000000,?,?), ref: 6CE580A7
        • SetLastError.KERNEL32(0000007A,?,?), ref: 6CE580C4
        • LoadResource.KERNEL32(?,00000000,?,?), ref: 6CE580E9
        • GetLastError.KERNEL32(00000000,?,?), ref: 6CE580F4
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorLast$Resource$FindLoadSizeof
        • String ID: DATA$EULA text is invalid.$FindResource()$Insufficient buffer.$Invalid parameter - output buffer is NULL.$LoadResource()$LockResource()$MultiByteToWideChar()$SETUP_AGREEMENT_%s$Unable to find EULA %s.$Unable to find EULA for the specified language.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\eula.cpp$iDirectXSetupGetEULAW
        • API String ID: 353423887-3345130644
        • Opcode ID: 5ab24e3b7961e41556f4530c450032d37736743428353a835f358a51f3212375
        • Instruction ID: 5518eaf0502797143326eceefb9428ed06d30429975c619ef2e02cf399174ab0
        • Opcode Fuzzy Hash: 5ab24e3b7961e41556f4530c450032d37736743428353a835f358a51f3212375
        • Instruction Fuzzy Hash: A961F872A94149BEDF10AEE4CD45EAB7B79AB0534DFF00D16F641E6A40E633C921CB60
        APIs
        • __wstrtime.LIBCMT ref: 6CE563C2
        • __wstrtime.LIBCMT ref: 6CE563CB
          • Part of subcall function 6CE5625B: GetWindowsDirectoryA.KERNEL32(?,00000104,6CE57D8D,00000000), ref: 6CE56291
          • Part of subcall function 6CE5625B: OutputDebugStringA.KERNEL32(DXSETUP_DPF(): Unable to open log file.,6CE57D8D,00000000), ref: 6CE562A0
          • Part of subcall function 6CE5625B: CreateDirectoryA.KERNEL32(?,00000000), ref: 6CE562E0
          • Part of subcall function 6CE5625B: GetLastError.KERNEL32 ref: 6CE562EA
        • _strrchr.LIBCMT ref: 6CE56411
        • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 6CE56521
        • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00066BDB), ref: 6CE56546
        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00066BDB,00000000), ref: 6CE5654E
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: DirectoryErrorLast__wstrtime$CreateDebugFormatFreeLocalMessageOutputStringWindows_strrchr
        • String ID: $ Error:$ Failed API:%s$ File in process:$ - $ module: %s(%s), file: %s, line: %d, function: %s$%s(): %s$%s(): %s failed, error = %d.$%s(): %s failed, error = 0x%x.$%s(): %s failed.$(%d)$(0x%x)$--------------------$DXSError(): FormatMessage() failed, error = %d.$DXSError(): FormatMessage() failed, system cannot find message text for error.$Mar 30 2011$[%s %s]$dsetup32
        • API String ID: 3982051927-4052122332
        • Opcode ID: 45f260a7dad6b8f4dfc1d6cf2a9089491000ab2e771a482fbe9cabeecdb93206
        • Instruction ID: 96d022289a4bd6f17bb5f2756da1fbe4f99a78f9be04b89695ff5aa6af270824
        • Opcode Fuzzy Hash: 45f260a7dad6b8f4dfc1d6cf2a9089491000ab2e771a482fbe9cabeecdb93206
        • Instruction Fuzzy Hash: 0E6193B1904219ABDF219FA4CC45ADE377CAF45248FF005A9F519D6B40EB33DA788B60
        APIs
        • GetWindowLongA.USER32(?,000000EB), ref: 00E762E4
        • GetParent.USER32(?), ref: 00E76394
        • PostMessageA.USER32(00000000), ref: 00E7639B
        • SetWindowLongA.USER32(?,000000EB,?), ref: 00E763B8
        • GetDlgItem.USER32(?,00001389), ref: 00E763CF
        • SendMessageA.USER32(00000000), ref: 00E763D6
        • GetModuleHandleA.KERNEL32(00000000,00001F48,?,00000258), ref: 00E763FF
        • LoadStringW.USER32(00000000), ref: 00E76406
        • SetDlgItemTextW.USER32(?,00001393,?), ref: 00E7641E
        • GetDlgItem.USER32(?,00001393), ref: 00E76436
        • SendMessageA.USER32(00000000), ref: 00E7643D
        • SendMessageA.USER32(?,00008002,00000000,00000000), ref: 00E76531
        • GetParent.USER32(?), ref: 00E76586
        • PostMessageA.USER32(00000000), ref: 00E7658D
        • SetWindowLongA.USER32(?,00000000,00000001), ref: 00E7659E
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: Message$ItemLongSendWindow$ParentPost$HandleLoadModuleStringText
        • String ID: CDXWSetup::InitInstall() failed.$CDXWSetup::Install() failed.$Invalid parameter - CDXWSetup is NULL.$ProgressDlgProc$Unable to initialize CDSetup.$WM_APP_ENDINSTALL$e:\bt\382730\setup\deliverables\dxsetup\psheets.cpp$start installation
        • API String ID: 45273081-381161198
        • Opcode ID: aae8e2f4690445d8e4b9e6af1e058e7f7c95df0b8cd36051f72a886e1d2a4d95
        • Instruction ID: 1e2cb4b5ad529f8d6f5641a624438bd42d1c9d76bf822f7f3213265d6c2e4c7b
        • Opcode Fuzzy Hash: aae8e2f4690445d8e4b9e6af1e058e7f7c95df0b8cd36051f72a886e1d2a4d95
        • Instruction Fuzzy Hash: 9071F7B1640705BFDB249F648C86E6976BDAB4070CF00D569F70EBA1D1CB709D84DB60
        APIs
        • SetLastError.KERNEL32(0000000D), ref: 6CE57D93
        • SetLastError.KERNEL32(00000057,?,00000004,6CE51A1C), ref: 6CE57DFB
        • FindResourceA.KERNEL32(?,?,DATA), ref: 6CE57E45
        • GetLastError.KERNEL32(Unable to find EULA %s.,?,?,?,?), ref: 6CE57E5B
        • SizeofResource.KERNEL32(?,00000000,?,?,?,?), ref: 6CE57E8D
        • SetLastError.KERNEL32(0000007A,?,?,?,?,?), ref: 6CE57EAD
        • LoadResource.KERNEL32(?,?,?,?,?,?,?), ref: 6CE57ED1
        • GetLastError.KERNEL32(00000000,?,?,?,?,?), ref: 6CE57EDC
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorLast$Resource$FindLoadSizeof
        • String ID: DATA$EULA text is invalid.$FindResource()$Insufficient buffer.$Invalid parameter - output buffer is NULL.$LoadResource()$LockResource()$SETUP_AGREEMENT_%s$Unable to find EULA %s.$Unable to find EULA for the specified language.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\eula.cpp$iDirectXSetupGetEULAA
        • API String ID: 353423887-1232173623
        • Opcode ID: fbdaf23f6e805975b0d1a99770f2b00ba0d30fa0f97251cdb4a918edff8b30aa
        • Instruction ID: 55f76678689a50622798b783d5125b9c3dd43d6d74616907ceb303a649f18cb5
        • Opcode Fuzzy Hash: fbdaf23f6e805975b0d1a99770f2b00ba0d30fa0f97251cdb4a918edff8b30aa
        • Instruction Fuzzy Hash: 8651C575A64244BADF009EE5CC45EFE37B9AB06349FF08919F601E6940E633DD358B21
        APIs
        • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion,00000000,00000001,?), ref: 6CE5AC6E
        • RegQueryValueExA.ADVAPI32(?,ProgramFilesDir,00000000,00000000,?,?,?,00000104), ref: 6CE5ACC5
        • RegCloseKey.ADVAPI32(?,?,?,?,?,00000104), ref: 6CE5ACF5
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563C2
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563CB
          • Part of subcall function 6CE56391: _strrchr.LIBCMT ref: 6CE56411
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: __wstrtime$CloseOpenQueryValue_strrchr
        • String ID: DXSETUPFOLDER path is too long, %s%s.$GetProgramFilesDir$GetShortPathName()$Insufficient buffer size.$ProgramFilesDir$RegCloseKey()$RegOpenKeyEx()$RegQueryValueEx()$Software\Microsoft\Windows\CurrentVersion$\directx\setup\$dwSize = %d, dwSizeData = %d$e:\bt\382730\setup\deliverables\dsetup\dsetup32\inline.h
        • API String ID: 4010714187-3175587753
        • Opcode ID: 87bc9d2ffafb6d0ab29a6c47f838f4bb5c453727cc2ef6054499c41cd0e87b85
        • Instruction ID: 532d0f1b4ed8c399edd4ccd1b4446b7be655e0c29dc0fcdd053943d89fc614a5
        • Opcode Fuzzy Hash: 87bc9d2ffafb6d0ab29a6c47f838f4bb5c453727cc2ef6054499c41cd0e87b85
        • Instruction Fuzzy Hash: 4051D371A40118BBEB255A50CC4AFFB377DDB52709FF00459B505E6A80EA73AAA08A71
        APIs
        • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\DirectX,00000000,00000001,00000000), ref: 6CE5D406
        • lstrcmpA.KERNEL32(?,Version), ref: 6CE5D425
        • RegQueryValueExA.ADVAPI32(00000000,?,00000000,00000000,?,?), ref: 6CE5D45E
        • lstrcmpA.KERNEL32(?,Version), ref: 6CE5D4BE
        • RegQueryValueExA.ADVAPI32(00000000,6CE53D10,00000000,00000000,?,00000104,?,?,?,dsetup32.dll), ref: 6CE5D5FB
          • Part of subcall function 6CE56872: _memset.LIBCMT ref: 6CE56882
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563C2
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563CB
          • Part of subcall function 6CE56391: _strrchr.LIBCMT ref: 6CE56411
        • RegCloseKey.ADVAPI32(00000000), ref: 6CE5D690
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: QueryValue__wstrtimelstrcmp$CloseOpen_memset_strrchr
        • String ID: CSetup::CheckVersion$CheckVersion(): ManagedDX have not been installed.$CheckVersion(): This is older DirectX which does not have the version value in the registry.$Checking the version: HKLM\software\microsoft\directx\%s$GetFileVersion() failed, unable to get version information of dsetup32.dll.$RC in registry = %02d, RC in DLL = %02d$RegCloseKey()$Software\Microsoft\DirectX$StringToVersionInfo() failed, version = %s.$Unable to create path string, %s%s.$Version$Version in DLL = %d.%02d.%02d.%04d$Version in registry = %s$dsetup32.dll$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
        • API String ID: 3543678321-2788586486
        • Opcode ID: 448b3f48c41ab84a880d6db3ee08728637199071b008eecf739ca0a6bf28c434
        • Instruction ID: 2198db7c908af352cfae113a1a13c9f034aa42ce543ac40c741e8640ab93414c
        • Opcode Fuzzy Hash: 448b3f48c41ab84a880d6db3ee08728637199071b008eecf739ca0a6bf28c434
        • Instruction Fuzzy Hash: F671A975A40618AEDB20CF90CC40FEB77BCAF05309FA00599F549E6640EB769BA48F12
        APIs
        • _memset.LIBCMT ref: 00E74987
        • GetCurrentDirectoryA.KERNEL32(00000104,00000000), ref: 00E7499C
        • LoadStringW.USER32(000000D9,?,00000104), ref: 00E74A2A
        • GetLastError.KERNEL32(00000000), ref: 00E74A35
        • ___swprintf_l.LIBCMT ref: 00E74A75
        • LoadStringW.USER32(00000064,?,00000104), ref: 00E74A8D
        • GetLastError.KERNEL32(00000000), ref: 00E74A98
        • MessageBoxW.USER32(?,?,00000010), ref: 00E74ADB
          • Part of subcall function 00E744B1: FindFirstFileA.KERNEL32(?,?), ref: 00E74554
          • Part of subcall function 00E744B1: FindClose.KERNEL32(00000000), ref: 00E74560
        • GetLastError.KERNEL32(00000000), ref: 00E74AE5
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorLast$FindLoadString$CloseCurrentDirectoryFileFirstMessage___swprintf_l_memset
        • String ID: DirectX Setup$GetCurrentDirectory()$LoadString()$LogNoDsetup$Unable to find %s$Unable to find %s.$\dsetup.dll$\dsetup32.dll$dsetup.dll$dsetup32.dll$e:\bt\382730\setup\deliverables\dxsetup\dxsetup.cpp
        • API String ID: 525178981-2515890001
        • Opcode ID: b38f4f06f9b380aed67527f1c83f1e76ff7698a1759747cccd8e37381560befb
        • Instruction ID: 68cab2e4f880ab2385d11257b691a17dde474a5e668cd7057aacdadbb0b51ce7
        • Opcode Fuzzy Hash: b38f4f06f9b380aed67527f1c83f1e76ff7698a1759747cccd8e37381560befb
        • Instruction Fuzzy Hash: 5A41A4B2A413187FDB11E7A59C46EEB37ACEB48740F44A095F60DF1081F670DB449B61
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID:
        • String ID: .cat$.chm$.hlp$.inf$CabCallback$FILEINCABINET: Unknown context...$SPFILENOTIFY_FILEINCABINET: GET_DISK_SPACE: Unable to allocate memory.$bdasetup.inf$directX.inf$dxbda.inf$dxnt.inf$dxntunp.inf$dxver.inf$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp$jystk$kssetup.inf
        • API String ID: 0-2698226022
        • Opcode ID: 4f5bd7f7668eebbf47345d8db0ff559fd7564f7cdb0314851a8470973ee5100d
        • Instruction ID: 4adb8c273a3c7a85dd7ecfd1d97d0b9ce1e22d945779c970db1ca39ffcf56058
        • Opcode Fuzzy Hash: 4f5bd7f7668eebbf47345d8db0ff559fd7564f7cdb0314851a8470973ee5100d
        • Instruction Fuzzy Hash: D951D7B5640611ABEB109F25CE81FA633B5EF0235CFF00955EA00EBF95EBA3D9348650
        APIs
        • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000,?,00000000), ref: 6CE5BADC
        • GetLastError.KERNEL32(Unable to open file, %s.,?,?,80000000,00000003,00000000,00000003,00000080,00000000,?,00000000), ref: 6CE5BAF0
        • GetFileSize.KERNEL32(00000000,00000000,?,?,80000000,00000003,00000000,00000003,00000080,00000000,?,00000000), ref: 6CE5BB0B
        • GetLastError.KERNEL32(00000000,?,?,80000000,00000003,00000000,00000003,00000080,00000000,?,00000000), ref: 6CE5BB1C
        • _memset.LIBCMT ref: 6CE5BB6D
        • ReadFile.KERNEL32(?,00000000,00000000,?,00000000,00000000), ref: 6CE5BB7F
        • GetLastError.KERNEL32(00000000), ref: 6CE5BBC1
        • CloseHandle.KERNEL32(?), ref: 6CE5BBE8
        • GetLastError.KERNEL32(00000000), ref: 6CE5BBF3
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorLast$File$CloseCreateHandleReadSize_memset
        • String ID: CheckSum$CloseHandle()$CreateFile()$GetFileSize()$ReadFile()$Unable to allocate buffer.$Unable to find file, %s.$Unable to open file, %s.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
        • API String ID: 197260801-1870010058
        • Opcode ID: 664b130788ef53a645ae8c810938fcb982d704155aad9233a3c7b688118cf985
        • Instruction ID: 525251a4d7a8e4326f97a6572abe8948259fb66048e90907b7dde07ce563b120
        • Opcode Fuzzy Hash: 664b130788ef53a645ae8c810938fcb982d704155aad9233a3c7b688118cf985
        • Instruction Fuzzy Hash: F141B271D402187FDB019AA58C4AEAF7B7CEF42358FF00659F505F3A41E7729E218AA0
        APIs
        • _strrchr.LIBCMT ref: 6CE5CC96
        • CharLowerA.USER32(?,?,00000104,?,?,00000000), ref: 6CE5CD50
        • CharLowerA.USER32(?,?,00000104,?), ref: 6CE5CD83
        • CopyFileA.KERNEL32(?,?,00000000), ref: 6CE5CE45
        • GetLastError.KERNEL32(Unable to copy %s.,?), ref: 6CE5CE5B
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: CharLower$CopyErrorFileLast_strrchr
        • String ID: CSetup::DoBackup$CopyFile()$Unable to allocate memory block.$Unable to copy %s.$Unable to create path string, %s%s%s.$drivers$dxxpdbg$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp$help$inf$sysbckup$system
        • API String ID: 864436029-3807277504
        • Opcode ID: 3c5b9b7763c932f1f6ef66175af5047bfc135f7dd5383041fbfaac1c14337ace
        • Instruction ID: 7e9a3441bee62a670ee75693661f22e8d4b2398eab50b8a4981eec912110e603
        • Opcode Fuzzy Hash: 3c5b9b7763c932f1f6ef66175af5047bfc135f7dd5383041fbfaac1c14337ace
        • Instruction Fuzzy Hash: 26511AB6A441196BDB10DB61CC44FDB737C9F49318FB004AAE544E7A40EF32EAE48B64
        APIs
        • LoadLibraryA.KERNEL32(USER32.DLL,00000314,6CE6EE68,00000000,?,?,?,?,6CE67C3B,6CE6EE68,Microsoft Visual C++ Runtime Library,00012010), ref: 6CE6A8F7
        • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 6CE6A916
        • GetProcAddress.KERNEL32(00000000,00000000), ref: 6CE6A92F
        • GetProcAddress.KERNEL32(00000000,00000000), ref: 6CE6A944
        • __get_wpgmptr.LIBCMT ref: 6CE6A955
        • GetProcAddress.KERNEL32(00000000,GetUserObjectInformationA), ref: 6CE6A979
        • GetProcAddress.KERNEL32(00000000,GetProcessWindowStation), ref: 6CE6A991
        • __get_amblksiz.LIBCMT ref: 6CE6A9E9
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: AddressProc$LibraryLoad__get_amblksiz__get_wpgmptr
        • String ID: ;|lhl$;|lhl$GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL$hl
        • API String ID: 2538533512-32725448
        • Opcode ID: 07618abe8fda19b69f1dcb704c0d195734aa73f014f1518f51c544f44edb8645
        • Instruction ID: 52c93f0d60c7cc18c299863f97fa81bc1bebc3deae766c46b5c9cdac5a791ee3
        • Opcode Fuzzy Hash: 07618abe8fda19b69f1dcb704c0d195734aa73f014f1518f51c544f44edb8645
        • Instruction Fuzzy Hash: B4418472EA5224AADF019FF7DD849AE7B78AB0565CB30481EE011E3E40DB39C5448B50
        APIs
        • GetDesktopWindow.USER32 ref: 6CE57434
        • GetWindowRect.USER32(?,?), ref: 6CE57448
        • GetLastError.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,6CE57CC1), ref: 6CE5744F
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563C2
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563CB
          • Part of subcall function 6CE56391: _strrchr.LIBCMT ref: 6CE56411
        • GetWindowRect.USER32(?,?), ref: 6CE57490
        • GetLastError.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,6CE57CC1), ref: 6CE57497
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: Window$ErrorLastRect__wstrtime$Desktop_strrchr
        • String ID: CenterWindow$GetDC()$GetWindowRect()$SetWindowPos()$e:\bt\382730\setup\deliverables\dsetup\dsetup32\eula.cpp
        • API String ID: 974696245-2165572117
        • Opcode ID: 605cb6ffc7ca45069be9c1f7271a6d55864fdf9fc26a1838277c076af01f9c05
        • Instruction ID: 00520b3f341cff6e92a52c51699e7988f96591939eb4f02f77a417fd62baff0e
        • Opcode Fuzzy Hash: 605cb6ffc7ca45069be9c1f7271a6d55864fdf9fc26a1838277c076af01f9c05
        • Instruction Fuzzy Hash: E8418E76E10115AFCB019EF9CD48CDE7BB9AB49345FE44515F901F3644EA32D9218B60
        APIs
        • GetFileAttributesA.KERNEL32(?), ref: 6CE5A601
        • GetLastError.KERNEL32 ref: 6CE5A616
        • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 6CE5A661
        • GetLastError.KERNEL32(00000000), ref: 6CE5A66C
        • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\RunOnce,00000000,00000002,?), ref: 6CE5A6DA
        • _strnlen.LIBCMT ref: 6CE5A6EC
        • RegSetValueExA.ADVAPI32(?,?,00000000,00000001,?,00000001), ref: 6CE5A70D
        • RegCloseKey.ADVAPI32(?), ref: 6CE5A739
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563C2
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563CB
          • Part of subcall function 6CE56391: _strrchr.LIBCMT ref: 6CE56411
          • Part of subcall function 6CE56391: FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 6CE56521
          • Part of subcall function 6CE56391: LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00066BDB), ref: 6CE56546
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorLast__wstrtime$AttributesCloseDirectoryFileFormatFreeLocalMessageOpenSystemValue_strnlen_strrchr
        • String ID: Command line is too long.$DXRemoveFileAtReboot$GetFileAttributes() returned -1, reason = %d.$GetSystemDirectory()$RegOpenKeyEx()$RegSetValueEx()$Software\Microsoft\Windows\CurrentVersion\RunOnce$e:\bt\382730\setup\deliverables\dsetup\dsetup32\inline.h$rundll32.exe %s\advpack.dll,DelNodeRunDLL32 "%s\"
        • API String ID: 4261019213-1120788408
        • Opcode ID: 6fd3ee57ebf5f6196b610ea626d269e62c8f10fe89c75d51136e459d5bab4b0b
        • Instruction ID: aee19afc5cc781da447a29462732798044e1fda1b18ce04ddc02887d855641eb
        • Opcode Fuzzy Hash: 6fd3ee57ebf5f6196b610ea626d269e62c8f10fe89c75d51136e459d5bab4b0b
        • Instruction Fuzzy Hash: B241C471A802087FEB219A648C89FEB377CEB46708FE00459F614E5580EA739A648B20
        APIs
        • GetDlgItem.USER32(?,00001771), ref: 6CE59DF6
        • SendMessageA.USER32(00000000,00000401,00000000,?), ref: 6CE59E12
        • SendMessageA.USER32(?,00000402,00000000,00000000), ref: 6CE59E23
        • SendMessageA.USER32(?,00000404,00000001,00000000), ref: 6CE59E34
        • ShowWindow.USER32(?,00000001), ref: 6CE59E3E
        • GetDlgItem.USER32(?,00001770), ref: 6CE59E5E
        • SendMessageA.USER32(00000000), ref: 6CE59E65
        • SetDlgItemTextA.USER32(?,00000FA2,?), ref: 6CE59E95
        • GetLastError.KERNEL32(Not fatal...), ref: 6CE59EA4
        • SetDlgItemTextA.USER32(?,00000FA3,6CE52B57), ref: 6CE59ED4
        • GetLastError.KERNEL32(Not fatal...), ref: 6CE59EE3
        • GetDlgItem.USER32(?,00001771), ref: 6CE59F2A
        • SendMessageA.USER32(00000000), ref: 6CE59F31
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: ItemMessageSend$ErrorLastText$ShowWindow
        • String ID: CSetup::UpdateProgress2$Not fatal...$SetDlgItemText()$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
        • API String ID: 3384336025-30365464
        • Opcode ID: 832cc47a696644b984b596f281300a1602b851ea0a679568ac4a2b5ef8015301
        • Instruction ID: 33b5656a2503036a4178c16d8546ffa1908a8098e7cdb4cd6732aa111a5fe9ab
        • Opcode Fuzzy Hash: 832cc47a696644b984b596f281300a1602b851ea0a679568ac4a2b5ef8015301
        • Instruction Fuzzy Hash: FB41E471B04205BBEF148F65CC8AFEE7778AB01709FA44555F604AA9C0D7B3D861DB20
        APIs
        • GetWindowLongA.USER32(?,000000EB), ref: 00E75635
        • SetWindowLongA.USER32(?,000000EB,?), ref: 00E7565E
        • GetDlgItem.USER32(?,00001389), ref: 00E75670
        • SendMessageA.USER32(00000000,00000030,?,00000001), ref: 00E7567F
        • GetDlgItem.USER32(?,00000FA1), ref: 00E75690
        • SendMessageA.USER32(00000000), ref: 00E75693
        • GetParent.USER32(?), ref: 00E75708
        • PostMessageA.USER32(00000000), ref: 00E7570F
        • GetParent.USER32(?), ref: 00E75752
        • PostMessageA.USER32(00000000), ref: 00E7575B
        • GetParent.USER32(?), ref: 00E75767
        • PostMessageA.USER32(00000000), ref: 00E7576A
        • SetWindowLongA.USER32(?,00000000,00000001), ref: 00E75771
        Strings
        • PreinstDlgProc, xrefs: 00E756C6
        • e:\bt\382730\setup\deliverables\dxsetup\psheets.cpp, xrefs: 00E756D0
        • N, xrefs: 00E7563B
        • Unable to initialize CDXWSetup., xrefs: 00E756BF
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: Message$LongParentPostWindow$ItemSend
        • String ID: N$PreinstDlgProc$Unable to initialize CDXWSetup.$e:\bt\382730\setup\deliverables\dxsetup\psheets.cpp
        • API String ID: 1491212057-701473252
        • Opcode ID: bf1d9b0781a1432888844c148a32e5e0d1c167b6533099e79d9e172f19f074c6
        • Instruction ID: 8d9b95153624c51506f45fc70898a8f63786439ed3493ffcb9b59406c021ae0d
        • Opcode Fuzzy Hash: bf1d9b0781a1432888844c148a32e5e0d1c167b6533099e79d9e172f19f074c6
        • Instruction Fuzzy Hash: 8331E372650700BEEA24ABBA8C8AF573AACDB85B14F509405F30DBA0D1D7F09880CA60
        APIs
        • LCMapStringW.KERNEL32(00000000,00000100,733F363C,00000001,00000000,00000000,73402A58,0000002C,73401282,00004000,00000000,00004000,?,?,?,?), ref: 73400DBF
        • GetLastError.KERNEL32(?,733FC6F1,733F225F,UTF-8,00000000,?,00000000,734051A8), ref: 73400DD1
        • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,73402A58,0000002C,73401282,00004000,00000000,00004000,?,?,?,?), ref: 73400E60
        • __alloca_probe_16.LIBCMT ref: 73400E93
        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,00000000), ref: 73400F14
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: ByteCharMultiWide$ErrorLastString__alloca_probe_16
        • String ID:
        • API String ID: 1172796519-0
        • Opcode ID: 564d5a236a9638cd68c8c729e59df9401ee61a2186019a7745c4222855b053f6
        • Instruction ID: b6729e0e2b8eb76ae07c07c4c8ccea7fb1e8689107ecadf7dbe27b13453ff8e5
        • Opcode Fuzzy Hash: 564d5a236a9638cd68c8c729e59df9401ee61a2186019a7745c4222855b053f6
        • Instruction Fuzzy Hash: DCD1AF75A00249EFDF1A9FA5CD84BCE7BB6FB08310F1441B9F915B6290E7318850DB99
        APIs
        • SystemTimeToFileTime.KERNEL32(?,?), ref: 6CE5BEAC
        • GetLastError.KERNEL32(00000000), ref: 6CE5BEB7
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: Time$ErrorFileLastSystem
        • String ID: /-:.$CSetup::CheckForceCopyTimeStamp$File timestamp %02d/%02d/%d-%02d:%02d:%02d.%02d is older than %02d/%02d/%d-%02d:%02d:%02d.%02d.$FileTimeToSystemTime()$LocalFileTimeToFileTime()$SystemTimeToFileTime()$SystemTimeToTzSpecificLocalTime()$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
        • API String ID: 2781989572-3991514089
        • Opcode ID: c6222ac66003ca0c7900dda2370d1e9a27182165cc9b181e10d48cc51e652954
        • Instruction ID: c116bf508a16df6493f9ca7e9be286f7428585cb019c46895fb736d3c11dc8bd
        • Opcode Fuzzy Hash: c6222ac66003ca0c7900dda2370d1e9a27182165cc9b181e10d48cc51e652954
        • Instruction Fuzzy Hash: B8719671D001286ADB219FA58C45EFE777DEF49704F6004C6F558E2A00EB3ACAA4DB75
        APIs
        • LoadStringW.USER32(00000064,?,00000104), ref: 00E747F5
        • GetLastError.KERNEL32(00000000), ref: 00E7480C
          • Part of subcall function 00E7390A: __wstrtime.LIBCMT ref: 00E7393B
          • Part of subcall function 00E7390A: __wstrtime.LIBCMT ref: 00E73944
          • Part of subcall function 00E7390A: _strrchr.LIBCMT ref: 00E7398A
        • LoadStringW.USER32(?,?,00000104), ref: 00E74858
        • GetLastError.KERNEL32(String ID: %d,?), ref: 00E7486A
        • LoadStringW.USER32(0000006F,?,00000104), ref: 00E748A6
        • GetLastError.KERNEL32(String ID: %d,0000006F), ref: 00E748B7
        • LoadStringW.USER32(00000082,?,00000104), ref: 00E748E1
        • GetLastError.KERNEL32(String ID: %d,00000082), ref: 00E748F5
        • ___swprintf_l.LIBCMT ref: 00E7491E
        • MessageBoxW.USER32(?,?,?), ref: 00E74940
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorLastLoadString$__wstrtime$Message___swprintf_l_strrchr
        • String ID: DirectX Setup$LoadString()$MsgBox$String ID: %d$e:\bt\382730\setup\deliverables\dxsetup\dxsetup.cpp$o
        • API String ID: 3419616289-3620252275
        • Opcode ID: 4243c8403e6609757abf132a2c8d379c03db4f8e80ac2b615cd49ab3b7a890f5
        • Instruction ID: ab9ad8370605f143b9f779b256ddf40927994e6542688d7bddec14925c062a6e
        • Opcode Fuzzy Hash: 4243c8403e6609757abf132a2c8d379c03db4f8e80ac2b615cd49ab3b7a890f5
        • Instruction Fuzzy Hash: 3141A7B5A403087EDB20DB69DC46EEB3B6DDB84704F0491A0F60DF50D2E7718E549B61
        APIs
        • LoadLibraryA.KERNEL32(USER32.DLL,00000314,734059B8,00000000,?,?,?,?,733FCB75,734059B8,Microsoft Visual C++ Runtime Library,00012010), ref: 7340040F
        • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 7340042E
        • GetProcAddress.KERNEL32(00000000,00000000), ref: 73400447
        • GetProcAddress.KERNEL32(00000000,00000000), ref: 7340045C
        • __get_wpgmptr.LIBCMT ref: 7340046D
        • GetProcAddress.KERNEL32(00000000,GetUserObjectInformationA), ref: 73400491
        • GetProcAddress.KERNEL32(00000000,GetProcessWindowStation), ref: 734004A9
        • __get_amblksiz.LIBCMT ref: 73400501
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: AddressProc$LibraryLoad__get_amblksiz__get_wpgmptr
        • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
        • API String ID: 2538533512-232180764
        • Opcode ID: 6db0d1b68edcb8396a6cf59672ec152e2f707a85bcb33b30f5f907ba1aac460b
        • Instruction ID: 9a51cc89c1eff7ec21aa2f72c85f1e90abfaf6850cea99617ceb0fda6dcd4b2f
        • Opcode Fuzzy Hash: 6db0d1b68edcb8396a6cf59672ec152e2f707a85bcb33b30f5f907ba1aac460b
        • Instruction Fuzzy Hash: FC41F6B2E04305EBDF18EFF18D88B6E7BB8EF44240B6009FAF416E6240DB3582418E55
        APIs
        • LoadLibraryA.KERNEL32(USER32.DLL,00000314,00E89768,00000000,?,?,?,?,00E78325,00E89768,Microsoft Visual C++ Runtime Library,00012010), ref: 00E7E036
        • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 00E7E055
        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00E7E06E
        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00E7E083
        • __get_wpgmptr.LIBCMT ref: 00E7E094
        • GetProcAddress.KERNEL32(00000000,GetUserObjectInformationA), ref: 00E7E0B8
        • GetProcAddress.KERNEL32(00000000,GetProcessWindowStation), ref: 00E7E0D0
        • __get_amblksiz.LIBCMT ref: 00E7E128
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: AddressProc$LibraryLoad__get_amblksiz__get_wpgmptr
        • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
        • API String ID: 2538533512-232180764
        • Opcode ID: 22b3840b6d9cdd4ac90f50f1dca5eb561bee1c3db814b269d2a7c0abccc5cabd
        • Instruction ID: 5eca763cadc633210017c7c80944aafc0d7d3607a25b862353f38eab581f2700
        • Opcode Fuzzy Hash: 22b3840b6d9cdd4ac90f50f1dca5eb561bee1c3db814b269d2a7c0abccc5cabd
        • Instruction Fuzzy Hash: 15410671D01305AEDF21EFB59D8A86E7BB8AF18314B5894BAF10CF6240DB74C9449B62
        APIs
        • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,733F684A), ref: 733F7E9B
        • __mtterm.LIBCMT ref: 733F7EA7
          • Part of subcall function 733F7B35: TlsFree.KERNEL32(00000005,733F68DE), ref: 733F7B60
          • Part of subcall function 733F7B35: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,733F68DE), ref: 733FACB6
          • Part of subcall function 733F7B35: DeleteCriticalSection.KERNEL32(00000005,?,?,733F68DE), ref: 733FACE0
        • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 733F7EBD
        • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 733F7ECA
        • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 733F7ED7
        • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 733F7EE4
        • TlsAlloc.KERNEL32(?,733F684A), ref: 733F7F34
        • TlsSetValue.KERNEL32(00000000,?,733F684A), ref: 733F7F4B
        • __mtterm.LIBCMT ref: 733F7FA2
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: AddressProc$CriticalDeleteSection__mtterm$AllocFreeHandleModuleValue
        • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
        • API String ID: 1270926730-3819984048
        • Opcode ID: b8fbde0987d49d29ce3e7481149c31b9f9c5095d0914d5955db481186778d89f
        • Instruction ID: 93ff0acab0f2f53061c8c0e49084e17e4531ad0befa6be96a9943ccca40578a1
        • Opcode Fuzzy Hash: b8fbde0987d49d29ce3e7481149c31b9f9c5095d0914d5955db481186778d89f
        • Instruction Fuzzy Hash: A531CC73A183239BDB257B379E04B453AE4E78039B7A057F5F429E62C0D77085418EA4
        APIs
        • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,00E76F8C), ref: 00E790B8
        • __mtterm.LIBCMT ref: 00E790C4
          • Part of subcall function 00E78DC5: TlsFree.KERNEL32(00000003,00E791C4), ref: 00E78DF0
          • Part of subcall function 00E78DC5: DeleteCriticalSection.KERNEL32(00000000,00000000,7591DFB0,00000001,00E791C4), ref: 00E7DA3E
          • Part of subcall function 00E78DC5: DeleteCriticalSection.KERNEL32(00000003,7591DFB0,00000001,00E791C4), ref: 00E7DA68
        • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00E790DA
        • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00E790E7
        • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00E790F4
        • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00E79101
        • TlsAlloc.KERNEL32 ref: 00E79151
        • TlsSetValue.KERNEL32(00000000), ref: 00E79168
        • __mtterm.LIBCMT ref: 00E791BF
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: AddressProc$CriticalDeleteSection__mtterm$AllocFreeHandleModuleValue
        • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
        • API String ID: 1270926730-3819984048
        • Opcode ID: 78b0724b965049ee55fccb8514436189acbdc11de03bb6f4621163658acdf43c
        • Instruction ID: 0a2b133751e72858c4d82d0a1b05dc36f9561269a89d267d2b3cc2af5aa8b2c8
        • Opcode Fuzzy Hash: 78b0724b965049ee55fccb8514436189acbdc11de03bb6f4621163658acdf43c
        • Instruction Fuzzy Hash: CB31DF71D523129EDB11AB76BD0E6263BA5AF50764B18912AE50CF32F3EF318848CF54
        APIs
        • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,6CE5F2F1), ref: 6CE61672
        • __mtterm.LIBCMT ref: 6CE6167E
          • Part of subcall function 6CE6130C: TlsFree.KERNEL32(00000011,6CE5F385), ref: 6CE61337
          • Part of subcall function 6CE6130C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,6CE5F385), ref: 6CE64901
          • Part of subcall function 6CE6130C: DeleteCriticalSection.KERNEL32(00000011,?,?,6CE5F385), ref: 6CE6492B
        • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 6CE61694
        • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 6CE616A1
        • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 6CE616AE
        • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 6CE616BB
        • TlsAlloc.KERNEL32(?,6CE5F2F1), ref: 6CE6170B
        • TlsSetValue.KERNEL32(00000000,?,6CE5F2F1), ref: 6CE61722
        • __mtterm.LIBCMT ref: 6CE61779
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: AddressProc$CriticalDeleteSection__mtterm$AllocFreeHandleModuleValue
        • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
        • API String ID: 1270926730-3819984048
        • Opcode ID: ec1d9d03fa89cd9535e990fe9393aeda0e3a1061aaea5fe2e93910ba9b3c555a
        • Instruction ID: 3f8897d86125049ac225a3d0ca2b37d999fa038420af3723aa5506a79b10eab8
        • Opcode Fuzzy Hash: ec1d9d03fa89cd9535e990fe9393aeda0e3a1061aaea5fe2e93910ba9b3c555a
        • Instruction Fuzzy Hash: 5A3162356B57109AEF065BF78C0565B3EF4AB47329B38491AE42093FC0EB39C4019AD0
        APIs
          • Part of subcall function 733F3D1D: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 733F3D5E
        • SetFocus.USER32 ref: 733F3DCF
        • GetLastError.KERNEL32(Not fatal...), ref: 733F3DDE
        • CreateDialogParamA.USER32(00000064,733F3D13,00000000), ref: 733F3E42
        • GetLastError.KERNEL32(00000000), ref: 733F3E52
        • SetDlgItemTextA.USER32(00000000,00000FA1,?), ref: 733F3E71
        • GetLastError.KERNEL32(Not fatal...), ref: 733F3E80
        • DirectXLoadString.DSETUP32(000003E8,?,00000104), ref: 733F3EAC
        • MessageBoxA.USER32(?,?,?), ref: 733F3EC3
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorLast$Message$CreateDialogDirectFocusItemLoadParamPeekStringText
        • String ID: CreateDialog()$DirectXSetupCallback$Not fatal...$SetDlgItemText()$SetFocus()$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c
        • API String ID: 371606451-1383702628
        • Opcode ID: c0df55f9be4be4c8432f34a25afd041d31cb3055b79f16c5eda866a71494f660
        • Instruction ID: 9257e715d1f478bb9e01520d79f5ec19f499561ab88d36820e96c6ca9d0e111f
        • Opcode Fuzzy Hash: c0df55f9be4be4c8432f34a25afd041d31cb3055b79f16c5eda866a71494f660
        • Instruction Fuzzy Hash: 0E31A5B2B00207BFEB316F66DE48F9A3B7CEF1021DB944055F95AE91A1D77689408B50
        APIs
        • FindResourceA.KERNEL32(?,6CE57D8D,DATA), ref: 6CE57693
        • GetLastError.KERNEL32(Unable to find EULA %s.,6CE57D8D,?,?,6CE577A6,SETUP_AGREEMENT_ENG,000012F1,00066BDB,6CE57D8D), ref: 6CE576A5
        • LoadResource.KERNEL32(?,00000000,?,?,6CE577A6,SETUP_AGREEMENT_ENG,000012F1,00066BDB,6CE57D8D), ref: 6CE576D5
        • GetLastError.KERNEL32(Unable to load EULA %s.,6CE57D8D,?,?,6CE577A6,SETUP_AGREEMENT_ENG,000012F1,00066BDB,6CE57D8D), ref: 6CE576EA
        • _memset.LIBCMT ref: 6CE5772D
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorLastResource$FindLoad_memset
        • String ID: CheckCheckSum$DATA$EULA %s damaged.$FindResource()$LoadResource()$Unable to allocate memory block for EULA %s$Unable to find EULA %s.$Unable to load EULA %s.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\eula.cpp
        • API String ID: 3094993533-3028198498
        • Opcode ID: fd70c115aa52fe5b6b3d24b614c7d5874c497f98d16aa2ddef43f39e0cd9619e
        • Instruction ID: 48bc8eacc7593151c9e530414f8ad706f3a10ee3bbaac13ec813fb84a6ea9df9
        • Opcode Fuzzy Hash: fd70c115aa52fe5b6b3d24b614c7d5874c497f98d16aa2ddef43f39e0cd9619e
        • Instruction Fuzzy Hash: 46210576A64205FFDB015EE49C40EDB3A7DEB05389FF08814F904E6A50F623DA304664
        APIs
        • GetWindowsDirectoryA.KERNEL32(?,00000104,00000000,e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c), ref: 733F6404
        • OutputDebugStringA.KERNEL32(DXSETUP_DPF(): Unable to open log file.,00000000,e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c), ref: 733F6413
        • CreateDirectoryA.KERNEL32(?,00000000), ref: 733F6453
        • GetLastError.KERNEL32 ref: 733F645D
        Strings
        • DXSETUP_DPF(): Unable to open log file., xrefs: 733F64A8
        • \Logs, xrefs: 733F641E
        • DXSETUP_DPF(): failed to create log directory., xrefs: 733F646A
        • DXSETUP_DPF(): GetWindowsDirectory() failed., xrefs: 733F640E
        • e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c, xrefs: 733F63EA
        • Logs\DXError.log, xrefs: 733F6471
        • %s%s, xrefs: 733F642A
        • %s%s%s, xrefs: 733F6482
        • DXSETUP_DPF(): path name too long., xrefs: 733F6443
        • --------------------, xrefs: 733F64B3
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: Directory$CreateDebugErrorLastOutputStringWindows
        • String ID: %s%s$%s%s%s$--------------------$DXSETUP_DPF(): GetWindowsDirectory() failed.$DXSETUP_DPF(): Unable to open log file.$DXSETUP_DPF(): failed to create log directory.$DXSETUP_DPF(): path name too long.$Logs\DXError.log$\Logs$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c
        • API String ID: 3967814497-2516916496
        • Opcode ID: afa4434c8535bb49deb388efb2e18e4429955f0d073c13a022aef31e53e6e7cd
        • Instruction ID: 900074a8bb0e2229dd18c583329aa394b36484c15531169aa2138d68b4a829d1
        • Opcode Fuzzy Hash: afa4434c8535bb49deb388efb2e18e4429955f0d073c13a022aef31e53e6e7cd
        • Instruction Fuzzy Hash: 7121F676E0561FBBE332B662DD08FCB377C9B40210FD001A5FC99E6142EB24CAC58A61
        APIs
        • GetVersionExA.KERNEL32(?), ref: 733F5E7E
        • LoadLibraryA.KERNEL32(advpack.dll,?,00000000), ref: 733F5EBA
        • GetProcAddress.KERNEL32(00000000,IsNTAdmin), ref: 733F5ECE
        • GetLastError.KERNEL32(Module: %s, Function: %s,advpack.dll,IsNTAdmin), ref: 733F5EF9
        • FreeLibrary.KERNEL32(00000000), ref: 733F5F1A
        • GetLastError.KERNEL32(Unable to load %s.,advpack.dll), ref: 733F5F29
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorLastLibrary$AddressFreeLoadProcVersion
        • String ID: GetProcAddress()$IsAdmin$IsNTAdmin$LoadLibrary()$Module: %s, Function: %s$Unable to load %s.$advpack.dll$e:\temp\382730\obj.x86fre\setup\deliverables\dsetup\dsetup\win9x\objfre\i386\dsinline.c
        • API String ID: 3600083760-4189720054
        • Opcode ID: 0d198250125d40200ebd5cd7ae790e3e109e40c720d02676f02e2b4b986439ad
        • Instruction ID: 95c3722a91ffdad2c3266e3faabf5602b4ad60b91a7a9a8296de0eed20b4a441
        • Opcode Fuzzy Hash: 0d198250125d40200ebd5cd7ae790e3e109e40c720d02676f02e2b4b986439ad
        • Instruction Fuzzy Hash: 0121A176E1021AEFF7307B768D49F9A77BCEB48215FD00199E50EE1182CB749A858F24
        APIs
        • GetVersionExA.KERNEL32(?), ref: 6CE5940C
        • LoadLibraryA.KERNEL32(advpack.dll), ref: 6CE59448
        • GetProcAddress.KERNEL32(00000000,IsNTAdmin), ref: 6CE5945C
        • GetLastError.KERNEL32(Module: %s, Function: %s,advpack.dll,IsNTAdmin), ref: 6CE59487
        • FreeLibrary.KERNEL32(00000000), ref: 6CE594A8
        • GetLastError.KERNEL32(Unable to load %s.,advpack.dll), ref: 6CE594B7
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorLastLibrary$AddressFreeLoadProcVersion
        • String ID: GetProcAddress()$IsAdmin$IsNTAdmin$LoadLibrary()$Module: %s, Function: %s$Unable to load %s.$advpack.dll$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
        • API String ID: 3600083760-2055996021
        • Opcode ID: 6bd792a0c135aa6026cc23bd53cf5a8da9882e8c9ccc1967fd60b71bf580c904
        • Instruction ID: dc41711d1a337541c0d3e08fa262695ad82efe17c671257258bc2d7e078c18b4
        • Opcode Fuzzy Hash: 6bd792a0c135aa6026cc23bd53cf5a8da9882e8c9ccc1967fd60b71bf580c904
        • Instruction Fuzzy Hash: 48212871910214EFEB208FF58C89FEA77B89B46209FE04498E10CE2A41DB729D95CF21
        APIs
        • LCMapStringW.KERNEL32(00000000,00000100,00E72A18,00000001,00000000,00000000,00E862D0,0000002C,00E7C9FB,00004000,00000000,00004000,?,?,?,?), ref: 00E7C538
        • GetLastError.KERNEL32(?,00E7AFE2,00E71303,UTF-8,?,00E71304,00000000,C:\Windows\Logs\DirectX.log), ref: 00E7C54A
        • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00E862D0,0000002C,00E7C9FB,00004000,00000000,00004000,?,?,?,?), ref: 00E7C5D9
        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,00000000), ref: 00E7C68D
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: ByteCharMultiWide$ErrorLastString
        • String ID:
        • API String ID: 2717499641-0
        • Opcode ID: 0af47b9a3ac5b5af455332ab93747297b839ac625a85b3d8bc6803c91741abfb
        • Instruction ID: 85aca9189f80aaa3b0027cac0d46c9f2331039dc39d77ed04c4ba5a55518e2e8
        • Opcode Fuzzy Hash: 0af47b9a3ac5b5af455332ab93747297b839ac625a85b3d8bc6803c91741abfb
        • Instruction Fuzzy Hash: F4D1AC71800219AFDF159FA4DC859EE7BB9FF48714F24A12EFA0DB6160D7318890EB91
        APIs
        • LCMapStringW.KERNEL32(00000000,00000100,6CE54E80,00000001,00000000,00000000,6CE6B668,0000002C,6CE664F2,00004000,00000000,00004000,?,?,?,?), ref: 6CE6602F
        • GetLastError.KERNEL32(?,6CE63C56,6CE51317,UTF-8,6CE57D8D,6CE51318,00000000,6CE6E4A8), ref: 6CE66041
        • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,6CE6B668,0000002C,6CE664F2,00004000,00000000,00004000,?,?,?,?), ref: 6CE660D0
        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,00000000), ref: 6CE66184
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: ByteCharMultiWide$ErrorLastString
        • String ID:
        • API String ID: 2717499641-0
        • Opcode ID: 65d46d0a058afaf97c325fc3fb88cf3a9d44b9596760d6237756289eb6d904c5
        • Instruction ID: eee74adb1365ef169a80fd6a1304fbc6aa71a543c32811afc1fa58104e9dbb12
        • Opcode Fuzzy Hash: 65d46d0a058afaf97c325fc3fb88cf3a9d44b9596760d6237756289eb6d904c5
        • Instruction Fuzzy Hash: E3D16C729B0259AFDF118FA6CD84ADE7B79FB49318F30412AF914E6E50D7318850CB94
        APIs
          • Part of subcall function 6CE56CEC: FindFirstFileA.KERNEL32(?,?,?,00000104,?,\ntkrnlpa.exe,00000104), ref: 6CE56D8F
          • Part of subcall function 6CE56CEC: FindClose.KERNEL32(00000000), ref: 6CE56D9B
        • _strrchr.LIBCMT ref: 6CE5DE42
        • _strrchr.LIBCMT ref: 6CE5DE59
        • _strrchr.LIBCMT ref: 6CE5DE9C
        • DeleteFileA.KERNEL32(?,?,00000000), ref: 6CE5DF18
        • DeleteFileA.KERNEL32 ref: 6CE5DF29
        Strings
        • Unable to create path string, %sdllcache%s, xrefs: 6CE5DEDD
        • Unable to find '\'., xrefs: 6CE5DF1C
        • dxxpdbg, xrefs: 6CE5DE68
        • trying to remove the file %s., xrefs: 6CE5DE8E
        • e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp, xrefs: 6CE5DEF0
        • CabCallback, xrefs: 6CE5DEE6
        • dllcache, xrefs: 6CE5DEB6
        • RegisteredPackages, xrefs: 6CE5DF7E
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: File_strrchr$DeleteFind$CloseFirst
        • String ID: CabCallback$RegisteredPackages$Unable to create path string, %sdllcache%s$Unable to find '\'.$dllcache$dxxpdbg$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp$trying to remove the file %s.
        • API String ID: 2252362552-2484097790
        • Opcode ID: 0ae98a265d2dc74af752e8c4cb5af2942e1392e58129cd92d07d6b79d0d1e1f7
        • Instruction ID: 5bf49c2950a14ba149c50733bb1feb28527fb359fcc127a921a274a0352c6085
        • Opcode Fuzzy Hash: 0ae98a265d2dc74af752e8c4cb5af2942e1392e58129cd92d07d6b79d0d1e1f7
        • Instruction Fuzzy Hash: 895126796446015BEB119A658E42BE633BCAF4135CFB40869E900DBB81EF73D6748760
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID:
        • String ID: CSetup::XSetupCallback$CreateDialog()$Not fatal...$SetDlgItemText()$SetFocus()$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
        • API String ID: 0-3552151630
        • Opcode ID: 31db0b44fbd8734457b255ae5e3ceaba599cc8ac26b62e21e6d9f3cc4c2a40a8
        • Instruction ID: e2fcb150912628641e91ae4fcaec419a73465f1bec1ba4938972a946a1ecd416
        • Opcode Fuzzy Hash: 31db0b44fbd8734457b255ae5e3ceaba599cc8ac26b62e21e6d9f3cc4c2a40a8
        • Instruction Fuzzy Hash: 0A41D0B1E00209AFDB109F75CC45EDA77B8AB16708FB04A29F555E2E80DBB3D9608F51
        APIs
        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00000104,00000000,00000000), ref: 733F50AF
        • GetLastError.KERNEL32(00000000), ref: 733F50BE
          • Part of subcall function 733F64D5: __wstrtime.LIBCMT ref: 733F6506
          • Part of subcall function 733F64D5: __wstrtime.LIBCMT ref: 733F650F
          • Part of subcall function 733F64D5: _strrchr.LIBCMT ref: 733F6555
        • DirectXLoadString.DSETUP32(00001391,?,00000104), ref: 733F5136
        • DirectXSetupCallback.DSETUP32(0000000A,00000010,?,00000000,00000000), ref: 733F5149
        • DestroyWindow.USER32(00000000), ref: 733F5159
        • GetLastError.KERNEL32(00000000), ref: 733F5164
          • Part of subcall function 733F4B10: GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 733F4B43
          • Part of subcall function 733F4B10: GetLastError.KERNEL32(00000000), ref: 733F4B4E
          • Part of subcall function 733F64D5: FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 733F6665
          • Part of subcall function 733F64D5: LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,GetRegistryDXVersion), ref: 733F668A
        • DirectXSetupA.DSETUP(?,00000000,?), ref: 733F5198
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: DirectErrorLast$Setup__wstrtime$ByteCallbackCharCurrentDestroyDirectoryFormatFreeLoadLocalMessageMultiStringWideWindow_strrchr
        • String ID: DestroyWindow()$DirectXSetupW$DirectXSetupW()$LoadDSetup32() failed.$WideCharToMultiByte()$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c
        • API String ID: 611871445-3988145944
        • Opcode ID: 39a0da1d7045401d0290bce77c154409137b8747d56a369c09e1228520ce4ee9
        • Instruction ID: 40b248efa4636c2a31771f272ccc2dd408575540dbdec089d6658da41962a053
        • Opcode Fuzzy Hash: 39a0da1d7045401d0290bce77c154409137b8747d56a369c09e1228520ce4ee9
        • Instruction Fuzzy Hash: 1731D6B2A00216BFFB31BB669D44FAF3B7CEF05760F900156F959A6181D7705A418BA0
        APIs
        • GetWindowsDirectoryA.KERNEL32(?,00000104,6CE57D8D,00000000), ref: 6CE56291
        • OutputDebugStringA.KERNEL32(DXSETUP_DPF(): Unable to open log file.,6CE57D8D,00000000), ref: 6CE562A0
        • CreateDirectoryA.KERNEL32(?,00000000), ref: 6CE562E0
        • GetLastError.KERNEL32 ref: 6CE562EA
        Strings
        • %s%s, xrefs: 6CE562B7
        • \Logs, xrefs: 6CE562AB
        • DXSETUP_DPF(): Unable to open log file., xrefs: 6CE56335
        • DXSETUP_DPF(): GetWindowsDirectory() failed., xrefs: 6CE5629B
        • Logs\DXError.log, xrefs: 6CE562FE
        • --------------------, xrefs: 6CE56340
        • DXSETUP_DPF(): path name too long., xrefs: 6CE562D0
        • %s%s%s, xrefs: 6CE5630F
        • DXSETUP_DPF(): failed to create log directory., xrefs: 6CE562F7
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: Directory$CreateDebugErrorLastOutputStringWindows
        • String ID: %s%s$%s%s%s$--------------------$DXSETUP_DPF(): GetWindowsDirectory() failed.$DXSETUP_DPF(): Unable to open log file.$DXSETUP_DPF(): failed to create log directory.$DXSETUP_DPF(): path name too long.$Logs\DXError.log$\Logs
        • API String ID: 3967814497-1050326959
        • Opcode ID: eaf1f9d7552e4544fb20fe0f026d39104c148c87ee33e06400ef97c78e4e4e7b
        • Instruction ID: adb5a8c6711cd5fab00cc977f4cc2bc0eeaad4bf24494a5f6b9df1a3821cf37c
        • Opcode Fuzzy Hash: eaf1f9d7552e4544fb20fe0f026d39104c148c87ee33e06400ef97c78e4e4e7b
        • Instruction Fuzzy Hash: F2210579A04214BAD7109EE68C09FDA37BC9B42718FF109A9E840E2F00EB67D9748665
        APIs
        • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00E7465D
        • OutputDebugStringA.KERNEL32(DXSetup: GetRequiredDiskSpaceFromLog(): path name too long.), ref: 00E7466C
        • CreateFileA.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00E746B4
        • GetFileSize.KERNEL32(00000000,00000000), ref: 00E746CD
        • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 00E746FF
        • lstrlenA.KERNEL32(needed = ), ref: 00E74734
        • CloseHandle.KERNEL32(?), ref: 00E74770
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: File$CloseCreateDebugDirectoryHandleOutputReadSizeStringWindowslstrlen
        • String ID: DXSetup: GetRequiredDiskSpaceFromLog(): GetWindowsDirectory() failed.$DXSetup: GetRequiredDiskSpaceFromLog(): path name too long.$Logs\DirectX.log$Not enough disk space$needed =
        • API String ID: 806678891-479621395
        • Opcode ID: 8ac408cb8406aef9fa0fe875e9b76ac197b243aeed297c40e30b794d2f643bdd
        • Instruction ID: b63a1972bc24b7e7ef516b2f0d84655ecaee39aa9ab7d74c9a05a955d87d7754
        • Opcode Fuzzy Hash: 8ac408cb8406aef9fa0fe875e9b76ac197b243aeed297c40e30b794d2f643bdd
        • Instruction Fuzzy Hash: 7D4105B1940318AFDB24AB789CC9AEE77ACEB55754F1050AAF10DF20C0EB704EC58A50
        APIs
        • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00E73839
        • OutputDebugStringA.KERNEL32(DXSETUP_DPF(): Unable to open log file.), ref: 00E73848
        • CreateDirectoryA.KERNEL32(?,00000000), ref: 00E73888
        • GetLastError.KERNEL32 ref: 00E73892
        Strings
        • DXSETUP_DPF(): GetWindowsDirectory() failed., xrefs: 00E73843
        • %s%s, xrefs: 00E7385F
        • Logs\DXError.log, xrefs: 00E738A6
        • DXSETUP_DPF(): Unable to open log file., xrefs: 00E738DD
        • DXSETUP_DPF(): path name too long., xrefs: 00E73878
        • %s%s%s, xrefs: 00E738B7
        • DXSETUP_DPF(): failed to create log directory., xrefs: 00E7389F
        • \Logs, xrefs: 00E73853
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: Directory$CreateDebugErrorLastOutputStringWindows
        • String ID: %s%s$%s%s%s$DXSETUP_DPF(): GetWindowsDirectory() failed.$DXSETUP_DPF(): Unable to open log file.$DXSETUP_DPF(): failed to create log directory.$DXSETUP_DPF(): path name too long.$Logs\DXError.log$\Logs
        • API String ID: 3967814497-3230818052
        • Opcode ID: 3103cf16c834f19387c3d9bbfe755863e5714f27ec2d87aec52035298e536199
        • Instruction ID: 9e7e1c7da67fa637b418335e6079d8f2e047984fc63ea229bec478fa6671fb56
        • Opcode Fuzzy Hash: 3103cf16c834f19387c3d9bbfe755863e5714f27ec2d87aec52035298e536199
        • Instruction Fuzzy Hash: A8213BB1A443107AE754E7B99C0BFEA37AC9B50B14F11E0E5F44DF24C1EA708B846262
        APIs
        • GetFileVersionInfoSizeA.VERSION(6CE56892,?,\ntkrnlpa.exe,00000104,00000000,?,?,6CE56892,?,?,?,00000000), ref: 6CE567B2
          • Part of subcall function 6CE566FB: _strrchr.LIBCMT ref: 6CE56706
        • GetLastError.KERNEL32(6CE56892,6CE56892,?,\ntkrnlpa.exe,00000104,00000000,?,?,6CE56892,?,?,?,00000000), ref: 6CE567C9
        • _memset.LIBCMT ref: 6CE56821
        • GetFileVersionInfoA.VERSION(6CE56892,00000000,00000000,00000000,?,6CE56892,?,?,?,00000000), ref: 6CE5682F
        • GetLastError.KERNEL32(00000000,6CE56892,00000000,00000000,00000000,?,6CE56892,?,?,?,00000000), ref: 6CE56839
        Strings
        • GetFileVersionInfoBlock(): Unable to get FileVersionInfoSize, file: %s, reason: %d., xrefs: 6CE567D1
        • GetFileVersionInfo(), xrefs: 6CE56840
        • \ntkrnlpa.exe, xrefs: 6CE567AC
        • Unable to allocate memory., xrefs: 6CE567FE
        • GetFileVersionInfoBlock, xrefs: 6CE56805, 6CE56845
        • GetFileVersionInfoBlock(): %s does not have version information., xrefs: 6CE567E1
        • e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h, xrefs: 6CE5680F, 6CE5684F
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorFileInfoLastVersion$Size_memset_strrchr
        • String ID: GetFileVersionInfo()$GetFileVersionInfoBlock$GetFileVersionInfoBlock(): %s does not have version information.$GetFileVersionInfoBlock(): Unable to get FileVersionInfoSize, file: %s, reason: %d.$Unable to allocate memory.$\ntkrnlpa.exe$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
        • API String ID: 388213077-426275582
        • Opcode ID: 0c23158ba0aaf892c1ed2a7d1a77606c871fd58171b7272580c1b29cdf1610a2
        • Instruction ID: 4f6fdeaa245b14e01adb7b8c15cebda50b667559ebd47ca4e28ba2199d24fcd7
        • Opcode Fuzzy Hash: 0c23158ba0aaf892c1ed2a7d1a77606c871fd58171b7272580c1b29cdf1610a2
        • Instruction Fuzzy Hash: A811C6A66442103FD2102EE65C84CDF2A7C8B5329C7F80439F901E2F40EBA7CE3945B6
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: __fileno$__cftof
        • String ID:
        • API String ID: 1302671315-0
        • Opcode ID: c04b6457c07c6716b8aed13f0bdec5eeee65b2061754a58cdc441fa351d281ee
        • Instruction ID: db251da779cf05a26b2d56b595197dac18bb702419a42bf36228dd069e739ca2
        • Opcode Fuzzy Hash: c04b6457c07c6716b8aed13f0bdec5eeee65b2061754a58cdc441fa351d281ee
        • Instruction Fuzzy Hash: 235116325057179FDB358B38DD80B6A77E8EF063243A4075EE0E69B2D0DA24D542CA65
        APIs
        • RegOpenKeyExA.ADVAPI32(80000002,software\microsoft\directx,00000000,00000001,?), ref: 733F38ED
        • RegQueryValueExA.ADVAPI32(?,Version,00000000,00000000,?,?), ref: 733F3943
        • RegCloseKey.ADVAPI32(?), ref: 733F39A4
          • Part of subcall function 733F64D5: __wstrtime.LIBCMT ref: 733F6506
          • Part of subcall function 733F64D5: __wstrtime.LIBCMT ref: 733F650F
          • Part of subcall function 733F64D5: _strrchr.LIBCMT ref: 733F6555
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: __wstrtime$CloseOpenQueryValue_strrchr
        • String ID: GetRegistryDXVersion$RegCloseKey()$RegOpenKeyEx()$RegQueryValueEx()$StringToVersionInfo() failed.$Version$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c$software\microsoft\directx
        • API String ID: 4010714187-3998709912
        • Opcode ID: 7df34dea7e8bbcb9860dbc23aa5d1ed98718beda340c2b4e2a66c01b5fcce409
        • Instruction ID: b17786aa9781c7c1e9868d767c63c01b16f571533985b08a8537de05ae9a9746
        • Opcode Fuzzy Hash: 7df34dea7e8bbcb9860dbc23aa5d1ed98718beda340c2b4e2a66c01b5fcce409
        • Instruction Fuzzy Hash: 3C21C3B1E0011F7FE730AB519D85FDB76BCDB15354F9001A6FA45B6141CB758E808E60
        APIs
        • LoadStringW.USER32(00000000,0000006F,?,00000200), ref: 00E76C22
        • GetLastError.KERNEL32(00000000), ref: 00E76C2D
          • Part of subcall function 00E74629: GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00E7465D
          • Part of subcall function 00E74629: OutputDebugStringA.KERNEL32(DXSetup: GetRequiredDiskSpaceFromLog(): path name too long.), ref: 00E7466C
        • ___swprintf_l.LIBCMT ref: 00E76C69
        • LoadStringW.USER32(00000000,00001F40,?,00000200), ref: 00E76C80
        • GetLastError.KERNEL32(00000000), ref: 00E76C8B
        • LoadStringW.USER32(00000000,00000030,?,00000200), ref: 00E76CAA
        • GetLastError.KERNEL32(00000000), ref: 00E76CB5
        • MessageBoxW.USER32(00E768F2,?,?,00000072), ref: 00E76CDF
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: String$ErrorLastLoad$DebugDirectoryMessageOutputWindows___swprintf_l
        • String ID: LoadString()$ShowMessage$e:\bt\382730\setup\deliverables\dxsetup\utils.cpp
        • API String ID: 1139171496-2358067398
        • Opcode ID: 9c973087779d882869a887e050d4c83235b018448bb37e2190a1e01bba6bae48
        • Instruction ID: 4bd45bda5ec188987430d0c3fd2f2ebb714379409b2d3e64e93755e169101966
        • Opcode Fuzzy Hash: 9c973087779d882869a887e050d4c83235b018448bb37e2190a1e01bba6bae48
        • Instruction Fuzzy Hash: A221B4B5640308BEEB10DBA5CC46FAB77ACEB04704F409195F74DF6092DA70DA489B60
        APIs
        • GetFileVersionInfoSizeA.VERSION(?,?), ref: 00E73E07
          • Part of subcall function 00E73D50: _strrchr.LIBCMT ref: 00E73D5B
        • GetLastError.KERNEL32(?,?), ref: 00E73E1E
        • _memset.LIBCMT ref: 00E73E76
        • GetFileVersionInfoA.VERSION(?,00000000,00000000,00000000), ref: 00E73E84
        • GetLastError.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 00E73E8E
        Strings
        • GetFileVersionInfoBlock(): %s does not have version information., xrefs: 00E73E36
        • GetFileVersionInfoBlock, xrefs: 00E73E5A, 00E73E9A
        • GetFileVersionInfo(), xrefs: 00E73E95
        • GetFileVersionInfoBlock(): Unable to get FileVersionInfoSize, file: %s, reason: %d., xrefs: 00E73E26
        • Unable to allocate memory., xrefs: 00E73E53
        • e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h, xrefs: 00E73E64, 00E73EA4
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorFileInfoLastVersion$Size_memset_strrchr
        • String ID: GetFileVersionInfo()$GetFileVersionInfoBlock$GetFileVersionInfoBlock(): %s does not have version information.$GetFileVersionInfoBlock(): Unable to get FileVersionInfoSize, file: %s, reason: %d.$Unable to allocate memory.$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
        • API String ID: 388213077-1642510695
        • Opcode ID: cb004071f0952cbc041b0779ab1955bec7294ad342643d5e74edb19c25bcc7dd
        • Instruction ID: 75359fc888a944b9ab8bcfa8b49db1b679b17bc6582071cb571996f64528f028
        • Opcode Fuzzy Hash: cb004071f0952cbc041b0779ab1955bec7294ad342643d5e74edb19c25bcc7dd
        • Instruction Fuzzy Hash: 7111ECF36043157AA3643AB99C47CEB29DCCD56B98704F055FB0DB1142F5514F0161F6
        APIs
        • GetWindowTextA.USER32(?,?,00000208), ref: 00E742B0
        • GetLastError.KERNEL32(00000000), ref: 00E742BB
        • GetClassNameA.USER32(?,?,00000208), ref: 00E742EB
        • GetLastError.KERNEL32(00000000), ref: 00E742F6
        • SetForegroundWindow.USER32(?), ref: 00E74347
        • SetFocus.USER32(?), ref: 00E7434E
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorLastWindow$ClassFocusForegroundNameText
        • String ID: 32770$FindDXSetupWindow$GetClassName()$GetWindowText()$e:\bt\382730\setup\deliverables\dxsetup\dxsetup.cpp
        • API String ID: 4084711242-343571156
        • Opcode ID: 9717f0191392f13bae50e094ee03d56b55ea76538bb40c589feef4cc61cbf7d5
        • Instruction ID: 8d297a59fded99449dd4caffdeb775a8f0b2fc2d3ee48132d0367cf2e9d86d30
        • Opcode Fuzzy Hash: 9717f0191392f13bae50e094ee03d56b55ea76538bb40c589feef4cc61cbf7d5
        • Instruction Fuzzy Hash: 5E21E7B26003097FD700EB79AC49DBA73ECDB45715F1090A9FA4DF2092DB30DA459A71
        APIs
          • Part of subcall function 6CE5BA00: CharLowerA.USER32(?), ref: 6CE5BA17
          • Part of subcall function 6CE5BA00: _strrchr.LIBCMT ref: 6CE5BA31
        • DeleteFileA.KERNEL32(?,?,00000000,?,00000104), ref: 6CE5E157
        • GetLastError.KERNEL32(00000000), ref: 6CE5E162
        • _strrchr.LIBCMT ref: 6CE5E1BB
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: _strrchr$CharDeleteErrorFileLastLower
        • String ID: CabCallback$DeleteFile()$Deleted file %s with DELAY_UNTIL_REBOOT.$MoveFileEx()$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
        • API String ID: 1206630738-28221962
        • Opcode ID: f8ca4b548230c611c04e1768a50fb54c4d60f075045edf03814a37177525afc2
        • Instruction ID: e1fe55dc71363c96418ea70af3d4b7cfc8da3ad3e5c61e8a8cf12cc57df3f0df
        • Opcode Fuzzy Hash: f8ca4b548230c611c04e1768a50fb54c4d60f075045edf03814a37177525afc2
        • Instruction Fuzzy Hash: AF41547A605A119AEB01CF618D44AEB73BCEF4231CFF00466E400D7B84EB77C6648BA1
        APIs
        • GetModuleHandleA.KERNEL32(00000000,00001F49,?,00000258), ref: 00E7544E
        • LoadStringA.USER32(00000000), ref: 00E75457
        • GetModuleHandleA.KERNEL32(00000000,?,?,00000258), ref: 00E75473
        • LoadStringA.USER32(00000000), ref: 00E75476
          • Part of subcall function 00E752DE: GetDlgItem.USER32(?,00000BB9), ref: 00E752EC
          • Part of subcall function 00E752DE: SendMessageA.USER32(00000000,00000401,00000000,?), ref: 00E7530A
          • Part of subcall function 00E752DE: SendMessageA.USER32(00000000,00000402,00000000,00000000), ref: 00E75316
          • Part of subcall function 00E752DE: SendMessageA.USER32(00000000,00000404,00000001,00000000), ref: 00E75322
          • Part of subcall function 00E752DE: ShowWindow.USER32(00000000,00000001,?,00000BB9), ref: 00E75327
        • SetDlgItemTextA.USER32(00000000,00000BBC,00E71ED4), ref: 00E754D3
        • GetModuleHandleA.KERNEL32(00000000,00001F40,?,00000080), ref: 00E754FD
        • LoadStringA.USER32(00000000), ref: 00E75504
        • GetParent.USER32(00000000), ref: 00E7551C
        • MessageBoxA.USER32(00000000), ref: 00E75523
        Strings
        • DSetupCallback(): Phase = %d, Steps = %d, xrefs: 00E75414
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: Message$HandleLoadModuleSendString$Item$ParentShowTextWindow
        • String ID: DSetupCallback(): Phase = %d, Steps = %d
        • API String ID: 3174243963-1040383907
        • Opcode ID: f5d877dbf2a9fee3dd0567c594864cc7274fbb2a40d23ebf2b111f066ed6ae30
        • Instruction ID: a6f5244c3957dff081195a6fd63bfe413e5831bc0a0d7f7eccb524e68e2ec5bd
        • Opcode Fuzzy Hash: f5d877dbf2a9fee3dd0567c594864cc7274fbb2a40d23ebf2b111f066ed6ae30
        • Instruction Fuzzy Hash: E1316D72900659AFCB10DF65DC85EAA77B8FB48345F048099F60EB7161EBB0AE84DF50
        APIs
        • DirectXLoadString.DSETUP32(?,?,00000104,00000104,00000000), ref: 733F5735
          • Part of subcall function 733F4B10: GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 733F4B43
          • Part of subcall function 733F4B10: GetLastError.KERNEL32(00000000), ref: 733F4B4E
        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000000,?), ref: 733F5766
        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 733F578F
        • GetLastError.KERNEL32(00000000), ref: 733F5796
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: ByteCharErrorLastMultiWide$CurrentDirectDirectoryLoadString
        • String ID: Insufficient buffer.$LoadDSetup32() failed.$MultiByteToWideChar()$MyLoadStringW$XDirectXLoadString() failed.$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c
        • API String ID: 2176918339-3711276564
        • Opcode ID: c144eafb43684f1899b61d504aa62bb5ecf17fdd087b8ba76968a0ead7a73757
        • Instruction ID: 66352ef3ae1ad7b087cc82c59c3f1a5ef79dc536b222b3ee2cfb3b136e98e6c4
        • Opcode Fuzzy Hash: c144eafb43684f1899b61d504aa62bb5ecf17fdd087b8ba76968a0ead7a73757
        • Instruction Fuzzy Hash: 5121D671B0420BBEF731AA625D84FAB367CD785750BD0025AF9A5A50C2D7608A458A60
        APIs
        • GetProcAddress.KERNEL32(?,?), ref: 00E75210
        • FreeLibrary.KERNEL32 ref: 00E75255
        • GetLastError.KERNEL32 ref: 00E7525F
          • Part of subcall function 00E7390A: FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00E73A9A
          • Part of subcall function 00E7390A: LocalFree.KERNEL32(?), ref: 00E73ABF
        • GetLastError.KERNEL32(Module: %s, Function: %s,?,?,?,?,?), ref: 00E7522E
          • Part of subcall function 00E7390A: __wstrtime.LIBCMT ref: 00E7393B
          • Part of subcall function 00E7390A: __wstrtime.LIBCMT ref: 00E73944
          • Part of subcall function 00E7390A: _strrchr.LIBCMT ref: 00E7398A
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorFreeLast__wstrtime$AddressFormatLibraryLocalMessageProc_strrchr
        • String ID: CDllLoader::GetProcAddress$FreeLibrary()$GetProcAddress()$Invalid member - m_hModule is NULL.$Module: %s, Function: %s$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
        • API String ID: 2317682547-2938890287
        • Opcode ID: d4d44006c0cc06b04300560a16a94a0a858f38843b8bed981ee747a18e8e460d
        • Instruction ID: ffd95d5b31af76646781ac39347f02fd8a469c7ba01bfd23a2f7bc190347096f
        • Opcode Fuzzy Hash: d4d44006c0cc06b04300560a16a94a0a858f38843b8bed981ee747a18e8e460d
        • Instruction Fuzzy Hash: BE11E9B6A40305BFD710AF99DC46E3B7ABCEBD4B44F14A098F94CB6191D1B09E409A61
        APIs
        • GetProcAddress.KERNEL32(?,?), ref: 6CE5864E
        • FreeLibrary.KERNEL32 ref: 6CE58693
        • GetLastError.KERNEL32 ref: 6CE5869D
          • Part of subcall function 6CE56391: FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 6CE56521
          • Part of subcall function 6CE56391: LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00066BDB), ref: 6CE56546
        • GetLastError.KERNEL32(Module: %s, Function: %s,?,?,?,?,?), ref: 6CE5866C
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563C2
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563CB
          • Part of subcall function 6CE56391: _strrchr.LIBCMT ref: 6CE56411
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorFreeLast__wstrtime$AddressFormatLibraryLocalMessageProc_strrchr
        • String ID: CDllLoader::GetProcAddress$FreeLibrary()$GetProcAddress()$Invalid member - m_hModule is NULL.$Module: %s, Function: %s$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
        • API String ID: 2317682547-2938890287
        • Opcode ID: b537674639ffa370f25519a61f490c72fb14d9901d70681e9b44866c207e9a3b
        • Instruction ID: 1e9cdd0958d4e6d3887b77ca60be2b13a7e6eb547e29cb4afa1a9c9ad125723b
        • Opcode Fuzzy Hash: b537674639ffa370f25519a61f490c72fb14d9901d70681e9b44866c207e9a3b
        • Instruction Fuzzy Hash: EE11E572640204BFE7115EA5CD49EAB3BBCDB96708FF40419F544E6A80E6B3DE208A64
        APIs
        • _memset.LIBCMT ref: 6CE56882
          • Part of subcall function 6CE567A1: GetFileVersionInfoSizeA.VERSION(6CE56892,?,\ntkrnlpa.exe,00000104,00000000,?,?,6CE56892,?,?,?,00000000), ref: 6CE567B2
          • Part of subcall function 6CE567A1: GetLastError.KERNEL32(6CE56892,6CE56892,?,\ntkrnlpa.exe,00000104,00000000,?,?,6CE56892,?,?,?,00000000), ref: 6CE567C9
        • VerQueryValueW.VERSION(00000000,6CE51754,00000000,?,?,?,?,00000000), ref: 6CE568AA
        • GetLastError.KERNEL32(00000000,00000000,6CE51754,00000000,?,?,?,?,00000000), ref: 6CE568B4
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorLast$FileInfoQuerySizeValueVersion_memset
        • String ID: 4$DXGetFileVersion$Data size mismatch.$VerQueryValue()$\ntkrnlpa.exe$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
        • API String ID: 2833552196-2675559974
        • Opcode ID: 0cbb02dde42765d83fe9286fae9435a2c8a35dcf89186fe5dda996608978bc6e
        • Instruction ID: 414249e8939f5c3517e27c04c8a3dc193f366441d663b1952d2ad527845e8b14
        • Opcode Fuzzy Hash: 0cbb02dde42765d83fe9286fae9435a2c8a35dcf89186fe5dda996608978bc6e
        • Instruction Fuzzy Hash: D40161712402047EEB012A948C81E9A373C9B5279CFB04539FA01E9A80EA779E395561
        APIs
        • __set_error_mode.LIBCMT ref: 6CE67B27
        • __set_error_mode.LIBCMT ref: 6CE67B38
        • GetModuleFileNameA.KERNEL32(00000000,6CE6EE81,00000104,00066BDB,6CE57D8D), ref: 6CE67B98
        • GetStdHandle.KERNEL32(000000F4,00000001,00066BCC,00000000,00000003,00000003,?,6CE67CAC,000000FC,6CE6497D,6CE6B5E8,0000000C,6CE64A3F,6CE57D8D,00066BCC), ref: 6CE67C42
        • WriteFile.KERNEL32(00000000,?,?,6CE57D8D,00000000,?,6CE67CAC,000000FC,6CE6497D,6CE6B5E8,0000000C,6CE64A3F,6CE57D8D,00066BCC,?,6CE6186F), ref: 6CE67C70
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: File__set_error_mode$HandleModuleNameWrite
        • String ID: <program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program: $hl
        • API String ID: 3248813247-1933984743
        • Opcode ID: a5fc3b8d15f775e3035417dd1a55887aaf045d8786389488e7e9e87f70c7517c
        • Instruction ID: 5a1702134c1bb8b90ecf0bf2d18182b5f329eb0ee4a8f2ef3f956b3f1fc0104b
        • Opcode Fuzzy Hash: a5fc3b8d15f775e3035417dd1a55887aaf045d8786389488e7e9e87f70c7517c
        • Instruction Fuzzy Hash: 7F314BA2BE160077FA011A778C45EAF36BD8B4635CF350168F91667F81F722C91581F1
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: CompareString
        • String ID: CSetup::CheckForceCopy$CheckForceCopy(): Unablt to get target file name from %s, skip it.$CheckForceCopy(): no file list in section, skip checking force copy.$DX_FORCECOPY_FILE$LoadListFromInfSection() failed.$MakeForceCopyList() failed.$Unable to create path string, %s%s.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
        • API String ID: 1825529933-3866404779
        • Opcode ID: 004acc42c1988feceac9ca21d5506fa58489f9ce7d8c25a8577d861f756cd07c
        • Instruction ID: 87d7b9828d67de6295b2713bbb5d323f1b034445f573027c18e7a1282561cb75
        • Opcode Fuzzy Hash: 004acc42c1988feceac9ca21d5506fa58489f9ce7d8c25a8577d861f756cd07c
        • Instruction Fuzzy Hash: 34412B72744205BAE711AB25CD10FD673BCAB0A34CFF04955F944E7A80DB7399B48B50
        Strings
        • LoadListFromInfSection() failed., xrefs: 6CE5C2BF
        • e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp, xrefs: 6CE5C275, 6CE5C2FB
        • CSetup::CheckForceCopy, xrefs: 6CE5C26B, 6CE5C2C8, 6CE5C2F1
        • CheckForceCopy(): Unablt to get target file name from %s, skip it., xrefs: 6CE5C353
        • MakeForceCopyList() failed., xrefs: 6CE5C2EA
        • CheckForceCopy(): no file list in section, skip checking force copy., xrefs: 6CE5C30C
        • Unable to create path string, %s%s., xrefs: 6CE5C264
        • DX_FORCECOPY_FILE_TIMESTAMP, xrefs: 6CE5C287, 6CE5C28C, 6CE5C2B4
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: CompareString
        • String ID: CSetup::CheckForceCopy$CheckForceCopy(): Unablt to get target file name from %s, skip it.$CheckForceCopy(): no file list in section, skip checking force copy.$DX_FORCECOPY_FILE_TIMESTAMP$LoadListFromInfSection() failed.$MakeForceCopyList() failed.$Unable to create path string, %s%s.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
        • API String ID: 1825529933-3124809831
        • Opcode ID: 67772f3ddd80b76ba840ae3f43c9ca335ebd2bf9853f2839aec0ff4dde36d7bb
        • Instruction ID: 5a4f115fce84418591e6d8cb14eab49367da6843e4e621dc7fe91adb9d2d4508
        • Opcode Fuzzy Hash: 67772f3ddd80b76ba840ae3f43c9ca335ebd2bf9853f2839aec0ff4dde36d7bb
        • Instruction Fuzzy Hash: FC41E471744208BEE710AA65CC50FE673BCBB0A30CFB40595E548E7A81DB73A9A48B61
        APIs
        • __get_wpgmptr.LIBCMT ref: 73402178
        • VirtualQuery.KERNEL32(?,?,0000001C), ref: 734021A3
        • GetSystemInfo.KERNEL32(?), ref: 734021BB
        • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 734021E4
        • GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 734021F4
        • VirtualAlloc.KERNEL32(?,?,00001000,00000004), ref: 7340227B
        • VirtualProtect.KERNEL32(?,?,?,?), ref: 7340228E
          • Part of subcall function 733F9B83: OutputDebugStringA.KERNEL32(Invalid parameter passed to C runtime function.), ref: 733F9C17
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: Virtual$AddressAllocDebugHandleInfoModuleOutputProcProtectQueryStringSystem__get_wpgmptr
        • String ID: SetThreadStackGuarantee$kernel32.dll
        • API String ID: 2401657611-423161677
        • Opcode ID: 84c4108497d43fb41a84751fa134629d8c2849edee9ebfbae6146ea7a9ec6801
        • Instruction ID: 2874f8eaccfd15825593950a720652f23d2c965242562e1024e8a14a3210d3df
        • Opcode Fuzzy Hash: 84c4108497d43fb41a84751fa134629d8c2849edee9ebfbae6146ea7a9ec6801
        • Instruction Fuzzy Hash: 38418C72E0021DAFDB15EFE1DD84BEEBBB9EF88300F5404A9E516F6280E73096459B54
        APIs
        • __get_wpgmptr.LIBCMT ref: 6CE6A1DC
        • VirtualQuery.KERNEL32(?,?,0000001C), ref: 6CE6A207
        • GetSystemInfo.KERNEL32(?), ref: 6CE6A21F
        • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 6CE6A248
        • GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 6CE6A258
        • VirtualAlloc.KERNEL32(?,?,00001000,00000004), ref: 6CE6A2DF
        • VirtualProtect.KERNEL32(?,?,?,?), ref: 6CE6A2F2
          • Part of subcall function 6CE632D7: OutputDebugStringA.KERNEL32(Invalid parameter passed to C runtime function.), ref: 6CE6336B
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: Virtual$AddressAllocDebugHandleInfoModuleOutputProcProtectQueryStringSystem__get_wpgmptr
        • String ID: SetThreadStackGuarantee$kernel32.dll
        • API String ID: 2401657611-423161677
        • Opcode ID: a183f083b1c7619c41d6956d3a53f83dae8d41247a9acd619327e2dec2ffe45e
        • Instruction ID: 002f6d4f9726dc15f18c719c75550afccb2f0d7243cc7a0ab653fad13148a3ce
        • Opcode Fuzzy Hash: a183f083b1c7619c41d6956d3a53f83dae8d41247a9acd619327e2dec2ffe45e
        • Instruction Fuzzy Hash: 9B416D72ED0118ABDF01CFE2CC84AEEBBB9EB44319F604465E511E7A00E732D645CB90
        APIs
        • _strrchr.LIBCMT ref: 6CE5B90E
        • GetDlgItem.USER32(?,00001770), ref: 6CE5B936
        • SendMessageA.USER32(00000000,?,6CE5B648,?), ref: 6CE5B93D
        • SetDlgItemTextA.USER32(?,00000FA3,6CE52B57), ref: 6CE5B975
        • GetLastError.KERNEL32(Not fatal...,?,6CE5B648,?), ref: 6CE5B984
        Strings
        • Not fatal..., xrefs: 6CE5B97F
        • SetDlgItemText(), xrefs: 6CE5B98B
        • e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp, xrefs: 6CE5B99A
        • CSetup::UpdateProgress, xrefs: 6CE5B990
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: Item$ErrorLastMessageSendText_strrchr
        • String ID: CSetup::UpdateProgress$Not fatal...$SetDlgItemText()$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
        • API String ID: 2316621201-1266400068
        • Opcode ID: 4b57fed0139f346acf5abf4234817f0958f80e58a77e38cc04b604a0df49080a
        • Instruction ID: 951ac2bb74536adc8bd3a68881d0f5803a9a85416f75bd6d86b0d6bf09eabb73
        • Opcode Fuzzy Hash: 4b57fed0139f346acf5abf4234817f0958f80e58a77e38cc04b604a0df49080a
        • Instruction Fuzzy Hash: 1421E6B5700B416FCB258E65CC85D5B7779EBC6708FF0090AF546D6E40D723E960C621
        APIs
          • Part of subcall function 6CE595AC: CreateFileA.KERNEL32(?,40000000,00000003,00000000,00000003,00000080,00000000), ref: 6CE595C6
          • Part of subcall function 6CE595AC: GetLastError.KERNEL32 ref: 6CE595D1
        • RegOpenKeyExA.ADVAPI32(80000002,SYSTEM\CurrentControlSet\Control\Session Manager,00000000,00000002,?), ref: 6CE5CBDD
        • RegSetValueExA.ADVAPI32(?,AllowProtectedRenames,00000000,00000004,00000001,00000004), ref: 6CE5CBF9
        • RegCloseKey.ADVAPI32(?), ref: 6CE5CC13
        Strings
        • In use: %s., xrefs: 6CE5CBBF
        • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 6CE5CBD3
        • CheckInUse(): RegCloseKey() failed, error = %d., xrefs: 6CE5CC1E
        • AllowProtectedRenames, xrefs: 6CE5CBF1
        • CheckInUse(): RegSetValueEx() failed, error = %d., xrefs: 6CE5CC04
        • CheckInUse(): RegOpenKeyEx() failed, error = %d., xrefs: 6CE5CC26
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: CloseCreateErrorFileLastOpenValue
        • String ID: AllowProtectedRenames$CheckInUse(): RegCloseKey() failed, error = %d.$CheckInUse(): RegOpenKeyEx() failed, error = %d.$CheckInUse(): RegSetValueEx() failed, error = %d.$In use: %s.$SYSTEM\CurrentControlSet\Control\Session Manager
        • API String ID: 1189079733-2090263386
        • Opcode ID: 5dd73d0b40467ac8b233c171af62bb1789b2c1cecbc8e0be686eda0088e062d2
        • Instruction ID: 5679f18875408d92064ace714a1cf0c6f8d4eff039f4bcb313a2271c10e95e7f
        • Opcode Fuzzy Hash: 5dd73d0b40467ac8b233c171af62bb1789b2c1cecbc8e0be686eda0088e062d2
        • Instruction Fuzzy Hash: D11170B5744104BEEB04AFA49C06FEA77B9DB04718FF04819F501E6680DA739974C659
        APIs
        • _memset.LIBCMT ref: 00E73ED7
          • Part of subcall function 00E73DF6: GetFileVersionInfoSizeA.VERSION(?,?), ref: 00E73E07
          • Part of subcall function 00E73DF6: GetLastError.KERNEL32(?,?), ref: 00E73E1E
        • VerQueryValueW.VERSION(00000000,00E71794,?,?), ref: 00E73EFF
        • GetLastError.KERNEL32(00000000,00000000,00E71794,?,?), ref: 00E73F09
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorLast$FileInfoQuerySizeValueVersion_memset
        • String ID: 4$DXGetFileVersion$Data size mismatch.$VerQueryValue()$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
        • API String ID: 2833552196-926253235
        • Opcode ID: 07f1fee055de9c50faccaf7a47e7d66e31a0e5b3e6dfff8c3032723cede931ca
        • Instruction ID: 00c484ca3aba2f674bab2149e1579c2039abef66efa34f18242ac99477759e21
        • Opcode Fuzzy Hash: 07f1fee055de9c50faccaf7a47e7d66e31a0e5b3e6dfff8c3032723cede931ca
        • Instruction Fuzzy Hash: 9301DB71744308BAE7592A789C87FEB365CD741B88F20E065F70DB8081D6B19F05B261
        APIs
        • _strrchr.LIBCMT ref: 00E73D5B
          • Part of subcall function 00E73C10: CompareStringA.KERNEL32(00000409,00000001,?,000000FF,?,000000FF), ref: 00E73C26
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: CompareString_strrchr
        • String ID: chm$dls$fon$hlp$inf$ini$png$txt
        • API String ID: 987711976-1006119773
        • Opcode ID: aaaa5d76e4823c405d05f84a1bf50da171c52ca0bdffe35b11fed44488a3827f
        • Instruction ID: 912509a7ceeca4008973227714c389c094747c8cb14644cbc384ac09ff6080a6
        • Opcode Fuzzy Hash: aaaa5d76e4823c405d05f84a1bf50da171c52ca0bdffe35b11fed44488a3827f
        • Instruction Fuzzy Hash: 3A01E8B12C17232126B631B60D06E9B59CD4D127D5718F462FB0CF0086FB66C741B0BA
        APIs
        • _strrchr.LIBCMT ref: 6CE56706
          • Part of subcall function 6CE566CC: CompareStringA.KERNEL32(00000409,00000001,6CE56892,000000FF,?,000000FF,?,6CE56723,00000001,inf,6CE56892,?,6CE567C5,6CE56892,6CE56892,?), ref: 6CE566E2
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: CompareString_strrchr
        • String ID: chm$dls$fon$hlp$inf$ini$png$txt
        • API String ID: 987711976-1006119773
        • Opcode ID: 3cf48ae6f2d750cdbed83d334846777444f1c2e6360b2a574d13dfecbc4a2cf5
        • Instruction ID: 956702d226480258d9fb674867f7c682d0577b1a89a8980209024309fd3af3e8
        • Opcode Fuzzy Hash: 3cf48ae6f2d750cdbed83d334846777444f1c2e6360b2a574d13dfecbc4a2cf5
        • Instruction Fuzzy Hash: EF01FF61556B137BF64256B24D10FDB1AFC4E0129C7F01428B915E0F99EF57F23980A9
        APIs
        • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00000000,00000001,?), ref: 6CE5879F
        • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,00000000,?,?), ref: 6CE587C2
        • RegCloseKey.ADVAPI32(?), ref: 6CE587FB
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: CloseOpenQueryValue
        • String ID: CSDVersion$GetCSDVersion$RegOpenKeyEx()$RegQueryValueEx()$System\CurrentControlSet\Control\Windows$e:\bt\382730\setup\deliverables\dsetup\dsetup32\inline.h
        • API String ID: 3677997916-1259003528
        • Opcode ID: b18717821ac3e2527b72e6632ff9c200b31a844ddf2b82ac647836f259ddc001
        • Instruction ID: 71ebffc83bc835cf30345716ff96413ff4bdb7ee73e3c820a93f18c6564b4fa7
        • Opcode Fuzzy Hash: b18717821ac3e2527b72e6632ff9c200b31a844ddf2b82ac647836f259ddc001
        • Instruction Fuzzy Hash: 1C018079982218FBDB209A958C0DDDF7E3DDB21364FF00645F515F1980E7329A20DAE1
        APIs
        • GetModuleHandleA.KERNEL32(KERNEL32.DLL,73402740,0000000C,733F7C90,00000000,00000000), ref: 733F7B88
        • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 733F7BB1
        • GetProcAddress.KERNEL32(?,DecodePointer), ref: 733F7BC1
        • InterlockedIncrement.KERNEL32(734047D8), ref: 733F7BE3
        • ___addlocaleref.LIBCMT ref: 733F7C0A
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: AddressProc$HandleIncrementInterlockedModule___addlocaleref
        • String ID: @@s$DecodePointer$EncodePointer$KERNEL32.DLL
        • API String ID: 1389861978-1489354120
        • Opcode ID: 979cba86136fdb8734a4a5c44243f78c837876c9813f544ae7825fb42eb2c6ee
        • Instruction ID: e8cf24656c5d4f17b795e4a678d9d9c47e1b8bc0d2de1df121e0f18b59dac849
        • Opcode Fuzzy Hash: 979cba86136fdb8734a4a5c44243f78c837876c9813f544ae7825fb42eb2c6ee
        • Instruction Fuzzy Hash: 5C115E75900B07DFE720AF3AD904B5ABBF4EF04315F904559E4AADB690CB74A9418F50
        APIs
        • GetStringTypeW.KERNEL32(00000001,6CE54E80,00000001,?,?,?,00000000), ref: 6CE6B094
        • GetStringTypeW.KERNEL32(?,?,000000FF,?,?,?,00000000), ref: 6CE6B0CC
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: StringType
        • String ID:
        • API String ID: 4177115715-0
        • Opcode ID: 55d8701e08fa13f10da1af2815ac2f528c3fd493313aa305354a0b0d0dc23b48
        • Instruction ID: 88866a2d19fd7022eef65faa59cca097e32171cef5cdc03afb0f89dd7c0b6e8a
        • Opcode Fuzzy Hash: 55d8701e08fa13f10da1af2815ac2f528c3fd493313aa305354a0b0d0dc23b48
        • Instruction Fuzzy Hash: 3861AE329A0209EFDF118F96CC8489F7BB5EB8A318B304619F96496F60E331C855EB50
        APIs
        • GetCPInfo.KERNEL32(?,00000000,?,00000000,00000000,00000000,?,?,?,73400C6A,00000001,?,00000000,?,?,?), ref: 73401FBA
        • GetCPInfo.KERNEL32(?,00000001,?,73400C6A,00000001,?), ref: 73401FD3
        • __alloca_probe_16.LIBCMT ref: 73402017
        • MultiByteToWideChar.KERNEL32(?,00000001,?,73400C6A,00000000,00000000,?,73400C6A,00000001,?,00000000,?,?,?,?,00000000), ref: 73402037
        • _memset.LIBCMT ref: 7340206F
        • MultiByteToWideChar.KERNEL32(?,00000001,?,73400C6A,?,00000000,?,?,?,?,?,?,?,73400C6A,00000001,?), ref: 73402086
        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,?,?,00000000,00000000,?,?,?,?,?,?,?,73400C6A), ref: 734020A1
        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,73400C6A), ref: 734020C7
        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,73400C6A), ref: 734020EC
        • __freea.LIBCMT ref: 7340210E
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: ByteCharMultiWide$Info$__alloca_probe_16__freea_memset
        • String ID:
        • API String ID: 509433266-0
        • Opcode ID: 491b974085b20a69f3054a7ff0e7bee9d3b23ff83d30082e1c38338609d98c58
        • Instruction ID: 526ea50b2c9971d320ba49308af95854aed5ed4d90eec0e423a437804d65dc6d
        • Opcode Fuzzy Hash: 491b974085b20a69f3054a7ff0e7bee9d3b23ff83d30082e1c38338609d98c58
        • Instruction Fuzzy Hash: D851AC72E0021EEFDF159F95CD80AEEBBBAEB08254F144179E616A6290D7319D02CB64
        APIs
        • GetStringTypeW.KERNEL32(00000001,733F363C,00000001,?,?,?,00000000,?,?,?,73400C6A,00000001,?,00000000,?,?), ref: 73400AAA
        • GetLastError.KERNEL32(?,73400C6A,00000001,?,00000000,?,?,?,?,00000000,?,00000001,00000000,00000000,00000008,?), ref: 73400ABC
        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,?,00000000,?,?,?,73400C6A,00000001,?,00000000), ref: 73400B21
        • __alloca_probe_16.LIBCMT ref: 73400B42
        • _memset.LIBCMT ref: 73400B76
        • MultiByteToWideChar.KERNEL32(00000000,00000001,?,00000000,00000000,00000000,?,?,00000000,?,00000001,00000000,00000000,00000008,?,00000000), ref: 73400B8B
        • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 73400B99
        • __freea.LIBCMT ref: 73400BA3
        • ___ansicp.LIBCMT ref: 73400BCD
        • GetStringTypeA.KERNEL32(?,?,?,?,?,?,?,00000000,?,?,?,73400C6A,00000001,?,00000000,?), ref: 73400C0E
          • Part of subcall function 73401F6F: GetCPInfo.KERNEL32(?,00000000,?,00000000,00000000,00000000,?,?,?,73400C6A,00000001,?,00000000,?,?,?), ref: 73401FBA
          • Part of subcall function 73401F6F: GetCPInfo.KERNEL32(?,00000001,?,73400C6A,00000001,?), ref: 73401FD3
          • Part of subcall function 73401F6F: __alloca_probe_16.LIBCMT ref: 73402017
          • Part of subcall function 73401F6F: _memset.LIBCMT ref: 7340206F
          • Part of subcall function 73401F6F: MultiByteToWideChar.KERNEL32(?,00000001,?,73400C6A,?,00000000,?,?,?,?,?,?,?,73400C6A,00000001,?), ref: 73402086
          • Part of subcall function 73401F6F: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,?,?,00000000,00000000,?,?,?,?,?,?,?,73400C6A), ref: 734020A1
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: ByteCharMultiWide$StringType$Info__alloca_probe_16_memset$ErrorLast___ansicp__freea
        • String ID:
        • API String ID: 2540555508-0
        • Opcode ID: 98eca1956f759697230f98b5329e4b6d98177bbaac4396cdd47ff1d1954ef430
        • Instruction ID: 86faa21680e406f81f72307ce2ca2675f7d5cdecc12d27a4c310af0f4ae4156d
        • Opcode Fuzzy Hash: 98eca1956f759697230f98b5329e4b6d98177bbaac4396cdd47ff1d1954ef430
        • Instruction Fuzzy Hash: 4051D272A0010AAFDF159F95CC88FAE7BB9EF04358F1444BAF916D7290D734C9508B95
        APIs
        • __set_error_mode.LIBCMT ref: 733FCA61
        • __set_error_mode.LIBCMT ref: 733FCA72
        • GetModuleFileNameA.KERNEL32(00000000,734059D1,00000104,00000000,00000000,00000000,?,733F7C67,00000001,00000214), ref: 733FCAD2
        • GetStdHandle.KERNEL32(000000F4,76EC5E70,00000000,00000000,00000003,00000003,?,733FCBE6,000000FC,733FB71D,?,733FAD5E,00000018,734027E8,0000000C,733FADF4), ref: 733FCB7C
        • WriteFile.KERNEL32(00000000,?,?,00000000,00000000,?,733FCBE6,000000FC,733FB71D,?,733FAD5E,00000018,734027E8,0000000C,733FADF4,00000000), ref: 733FCBAA
        Strings
        • <program name unknown>, xrefs: 733FCADC
        • Runtime Error!Program: , xrefs: 733FCA95
        • Microsoft Visual C++ Runtime Library, xrefs: 733FCB6A
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: File__set_error_mode$HandleModuleNameWrite
        • String ID: <program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
        • API String ID: 3248813247-385325454
        • Opcode ID: 3d22e7435872c9f3bba178468a5a0f515cf59f69c079f3150c712c7bb1a97938
        • Instruction ID: 6b05e82bcbd6f3277b6869396e361bc275912a537b6fab2a65f48d3716b1d778
        • Opcode Fuzzy Hash: 3d22e7435872c9f3bba178468a5a0f515cf59f69c079f3150c712c7bb1a97938
        • Instruction Fuzzy Hash: 64316CF6F803036BEA3166755D55F9F326C8B45154F9809A9FC8FA22C1F521DD0282B6
        APIs
        • __set_error_mode.LIBCMT ref: 00E78211
        • __set_error_mode.LIBCMT ref: 00E78222
        • GetModuleFileNameA.KERNEL32(00000000,00E89781,00000104,?,?,00000000), ref: 00E78282
        • GetStdHandle.KERNEL32(000000F4,76EC5E70,?,00000000,00000003,00000003,?,00E78396,000000FC,00E7B487,?,00E7DAE6,00000018,00E86328,0000000C,00E7DB7C), ref: 00E7832C
        • WriteFile.KERNEL32(00000000,?,?,?,00000000,?,00E78396,000000FC,00E7B487,?,00E7DAE6,00000018,00E86328,0000000C,00E7DB7C,?), ref: 00E7835A
        Strings
        • Runtime Error!Program: , xrefs: 00E78245
        • <program name unknown>, xrefs: 00E7828C
        • Microsoft Visual C++ Runtime Library, xrefs: 00E7831A
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: File__set_error_mode$HandleModuleNameWrite
        • String ID: <program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
        • API String ID: 3248813247-385325454
        • Opcode ID: f0c358f30455e69c0b6a095f642de2c0b440f2ccf5843711a5849814073d9c0b
        • Instruction ID: 8a2faf089a043ed2312f109ea367a9a30d736370d8680e3b480369e5a673294b
        • Opcode Fuzzy Hash: f0c358f30455e69c0b6a095f642de2c0b440f2ccf5843711a5849814073d9c0b
        • Instruction Fuzzy Hash: 9F312872A40310BAEA10762D5D4EF7F229C9BA2714F49A068FC0D72253FE62DD0581B2
        APIs
        • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00E75B38
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: DirectorySystem
        • String ID: DXGetFileVersion() failed.$FRunningOnWinXP$GetSystemDirectory()$\ntkrnlpa.exe$a]$e:\bt\382730\setup\deliverables\dxsetup\psheets.h
        • API String ID: 2188284642-2231157713
        • Opcode ID: f70fa84aabd78fe3aeb604f43bb5716ff14d139fb53001cdf849b25431df12cf
        • Instruction ID: 03886846abd33ca54a5d191e7f7b9a13dac41a22bd17acc4aaddff159d869559
        • Opcode Fuzzy Hash: f70fa84aabd78fe3aeb604f43bb5716ff14d139fb53001cdf849b25431df12cf
        • Instruction Fuzzy Hash: 7721F672A04719ABDB2097798C05FEB32ECEF05344F5090A5B94DF2080DEF0DA88DBA0
        APIs
        • _realloc.LIBCMT ref: 6CE58404
        • GetPrivateProfileSectionA.KERNEL32(?,00000000,-00000258,?), ref: 6CE58419
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563C2
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563CB
          • Part of subcall function 6CE56391: _strrchr.LIBCMT ref: 6CE56411
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: __wstrtime$PrivateProfileSection_realloc_strrchr
        • String ID: LoadListFromInfSection$LoadListFromInfSection(): Unable to load %s - [%s].$Unable to allocate memory.$Unable to find %s$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h$realloc()
        • API String ID: 2994852080-3670691587
        • Opcode ID: d09bcd25cffe8fd1a21c96112d8499de900e83c6712a25b1d2d8dd70e31d4441
        • Instruction ID: 8eed1c514009ad6089a4c6264808e134065f00f3f065076bb238169a8e4bb154
        • Opcode Fuzzy Hash: d09bcd25cffe8fd1a21c96112d8499de900e83c6712a25b1d2d8dd70e31d4441
        • Instruction Fuzzy Hash: CA11D3725882457FEB101F95CC80C9A7BBDDF5135CBB4483AF944A5A40EB73DC348664
        APIs
        • _memset.LIBCMT ref: 00E76B43
        • GetFileVersionInfoSizeA.VERSION(?,?,?,\comctl32.dll,?,00E76A7D,?,?), ref: 00E76B52
        • _memset.LIBCMT ref: 00E76B72
        • GetFileVersionInfoA.VERSION(?,00000000,00000000,00000000,00000000,?,?,?,\comctl32.dll,?,00E76A7D,?,?), ref: 00E76B80
        • VerQueryValueA.VERSION(00000000,00E71310,?,?,?,00000000,00000000,00000000,00000000,?,?,?,\comctl32.dll,?,00E76A7D,?), ref: 00E76B97
        • _memcpy_s.LIBCMT ref: 00E76BCB
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: FileInfoVersion_memset$QuerySizeValue_memcpy_s
        • String ID: \comctl32.dll$}j
        • API String ID: 59702410-3981195289
        • Opcode ID: 000ec5397469ec1e17c74cf418bd95e776a7547068f68e19fb1431d0b49ec0a6
        • Instruction ID: bd065b88ebd2081875658c2719cca43856f8cc965ad36eb8f979dc4f4782f03e
        • Opcode Fuzzy Hash: 000ec5397469ec1e17c74cf418bd95e776a7547068f68e19fb1431d0b49ec0a6
        • Instruction Fuzzy Hash: 6911CA725045187AEF257660DC8ADFF3BAC8B4379CF10E065F50DF6142EA218E05E2A5
        APIs
        • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00E75C35
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: DirectorySystem
        • String ID: DXGetFileVersion() failed.$FRunningOnNETServer$GetSystemDirectory()$\ntkrnlpa.exe$a]$e:\bt\382730\setup\deliverables\dxsetup\psheets.h
        • API String ID: 2188284642-305334770
        • Opcode ID: 1d77c46b4f1b6e8c9f224e687934a63e645a3e84a83d19f645a25ee4689ffede
        • Instruction ID: 3c0c2999489e30f64efc20116fdbb0c466c0f635b1d857655e852e1009ac1b5a
        • Opcode Fuzzy Hash: 1d77c46b4f1b6e8c9f224e687934a63e645a3e84a83d19f645a25ee4689ffede
        • Instruction Fuzzy Hash: 6C11E772A01724ABD7609B758D46FDB76ECAF04704F50A465B90DF2180DFB49A48CBA0
        APIs
        • DirectXLoadString.DSETUP32(00001391,?,DirectXDeviceDriverSetupW()), ref: 733F42BC
        • DirectXSetupCallback.DSETUP32(0000000A,00000010,?,00000000,00000000), ref: 733F42D1
        • DestroyWindow.USER32(00000000), ref: 733F42E1
        • GetLastError.KERNEL32(00000000), ref: 733F42EC
          • Part of subcall function 733F64D5: __wstrtime.LIBCMT ref: 733F6506
          • Part of subcall function 733F64D5: __wstrtime.LIBCMT ref: 733F650F
          • Part of subcall function 733F64D5: _strrchr.LIBCMT ref: 733F6555
        Strings
        • DirectXDeviceDriverSetupW(), xrefs: 733F4291
        • DestroyWindow(), xrefs: 733F42F3
        • e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c, xrefs: 733F4302
        • DirectXDeviceDriverSetupW, xrefs: 733F42F8
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: Direct__wstrtime$CallbackDestroyErrorLastLoadSetupStringWindow_strrchr
        • String ID: DestroyWindow()$DirectXDeviceDriverSetupW$DirectXDeviceDriverSetupW()$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c
        • API String ID: 3711049222-3655650028
        • Opcode ID: ce7491ea83a93ace60378b6a12e016ac7e535f534d77b9e1c70096a15a50aaf4
        • Instruction ID: e46ca88aa109b43e27aec8b6a938c7d3a2479aed8afdb75dc57d6c012635a851
        • Opcode Fuzzy Hash: ce7491ea83a93ace60378b6a12e016ac7e535f534d77b9e1c70096a15a50aaf4
        • Instruction Fuzzy Hash: A11186B2F041156FE720AF66DE04FAD3BE8EB04714F900185F999FA180D7B059418B91
        APIs
        • DirectXLoadString.DSETUP32(00001391,?,DirectXDeviceDriverSetupA()), ref: 733F4208
        • DirectXSetupCallback.DSETUP32(0000000A,00000010,?,00000000,00000000), ref: 733F421D
        • DestroyWindow.USER32(00000000), ref: 733F422D
        • GetLastError.KERNEL32(00000000), ref: 733F4238
          • Part of subcall function 733F64D5: __wstrtime.LIBCMT ref: 733F6506
          • Part of subcall function 733F64D5: __wstrtime.LIBCMT ref: 733F650F
          • Part of subcall function 733F64D5: _strrchr.LIBCMT ref: 733F6555
        Strings
        • DirectXDeviceDriverSetupA, xrefs: 733F4244
        • DestroyWindow(), xrefs: 733F423F
        • e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c, xrefs: 733F424E
        • DirectXDeviceDriverSetupA(), xrefs: 733F41DD
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: Direct__wstrtime$CallbackDestroyErrorLastLoadSetupStringWindow_strrchr
        • String ID: DestroyWindow()$DirectXDeviceDriverSetupA$DirectXDeviceDriverSetupA()$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c
        • API String ID: 3711049222-1816451749
        • Opcode ID: 867718d8bae4079a6ca6848d5532d85a207d21774c00539a8e7ed98b9bac32dd
        • Instruction ID: 29d03ed00c50dea65c9e24d301e7f8c88efb30d1e4e4a59a3b0ca3c816eb827f
        • Opcode Fuzzy Hash: 867718d8bae4079a6ca6848d5532d85a207d21774c00539a8e7ed98b9bac32dd
        • Instruction Fuzzy Hash: 841186B2F04115AFE720AF65DE04FAE3BA8EB04714F900195F999F6180D7B05A418B91
        APIs
        • GetModuleHandleA.KERNEL32(KERNEL32.DLL,00E86140,0000000C,00E78F20,00000000,00000000,?,00E7988D,?,?,?,00000000), ref: 00E78E18
        • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 00E78E41
        • GetProcAddress.KERNEL32(?,DecodePointer), ref: 00E78E51
        • InterlockedIncrement.KERNEL32(00E885D0), ref: 00E78E73
        • ___addlocaleref.LIBCMT ref: 00E78E9A
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: AddressProc$HandleIncrementInterlockedModule___addlocaleref
        • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
        • API String ID: 1389861978-2843748187
        • Opcode ID: 02db9278bce29733b10f8e0d58975bf6f7701412ec77cafdc4c20545515b5f5d
        • Instruction ID: 23e19afdb74d2d3160f1d0a31319623adf21d100d8a4d8396f0a382ec6316ef4
        • Opcode Fuzzy Hash: 02db9278bce29733b10f8e0d58975bf6f7701412ec77cafdc4c20545515b5f5d
        • Instruction Fuzzy Hash: 28119E709407019EE720EF7ADD06B5ABBE0AF40304F00992DE59DB3291DBB49940CF11
        APIs
        • GetModuleHandleA.KERNEL32(KERNEL32.DLL,6CE6B4B8,0000000C,6CE61467,00000000,00000000,?,?,6CE5FCAF,6CE57D8D,?,?,6CE5770E,00066BDC), ref: 6CE6135F
        • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 6CE61388
        • GetProcAddress.KERNEL32(?,DecodePointer), ref: 6CE61398
        • InterlockedIncrement.KERNEL32(6CE6D950), ref: 6CE613BA
        • ___addlocaleref.LIBCMT ref: 6CE613E1
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: AddressProc$HandleIncrementInterlockedModule___addlocaleref
        • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
        • API String ID: 1389861978-2843748187
        • Opcode ID: 0b54328f4285f7b2cbd73442b9dcf890a88741ee667d356fb5455df208802ead
        • Instruction ID: ea8dd96e8edb23570783f8a188c2ceb8467de0ba71610e2bffe1e002592ff673
        • Opcode Fuzzy Hash: 0b54328f4285f7b2cbd73442b9dcf890a88741ee667d356fb5455df208802ead
        • Instruction Fuzzy Hash: E11148719907419FE710DF6AC805B9ABBF0AF44318F60491EE4AAD7F90DB75D914CB20
        APIs
        • GetCPInfo.KERNEL32(?,00000000,?,00000000,00000000,00000000,?,?,?,00E80F03,00000001,?,00000000,?,?,?), ref: 00E8138E
        • GetCPInfo.KERNEL32(?,00000001,?,00E80F03,00000001,?), ref: 00E813A7
        • MultiByteToWideChar.KERNEL32(?,00000001,?,00E80F03,00000000,00000000,?,00E80F03,00000001,?,00000000,?,?,?,?,00000000), ref: 00E8140B
        • _memset.LIBCMT ref: 00E81443
        • MultiByteToWideChar.KERNEL32(?,00000001,?,00E80F03,?,00000000,?,?,?,?,?,?,?,00E80F03,00000001,?), ref: 00E8145A
        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,?,?,00000000,00000000,?,?,?,?,?,?,?,00E80F03), ref: 00E81475
        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,00E80F03), ref: 00E8149B
        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,00E80F03), ref: 00E814C0
        • __freea.LIBCMT ref: 00E814E2
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: ByteCharMultiWide$Info$__freea_memset
        • String ID:
        • API String ID: 1700608584-0
        • Opcode ID: 39db62e2894d418a789a411a0845a2f2a9acddfb91426812d0a721b8a0240926
        • Instruction ID: 7cb1d0331144c44212f9ed1b80a7bdf864502a661147a77ba7f01916af0a4b7c
        • Opcode Fuzzy Hash: 39db62e2894d418a789a411a0845a2f2a9acddfb91426812d0a721b8a0240926
        • Instruction Fuzzy Hash: 6D518B71900119AFDF21AF99DC808EEBBBEEF08368B1551A9F52CB7160D7319D46CB60
        APIs
        • GetCPInfo.KERNEL32(?,00000000,?,00000000,00000000,00000000,?,?,?,6CE69B1F,00000001,?,00000000,?,?,?), ref: 6CE6A01E
        • GetCPInfo.KERNEL32(?,00000001,?,6CE69B1F,00000001,?), ref: 6CE6A037
        • MultiByteToWideChar.KERNEL32(?,00000001,?,6CE69B1F,00000000,00000000,?,6CE69B1F,00000001,?,00000000,?,?,?,?,00000000), ref: 6CE6A09B
        • _memset.LIBCMT ref: 6CE6A0D3
        • MultiByteToWideChar.KERNEL32(?,00000001,?,6CE69B1F,?,00000000,?,?,?,?,?,?,?,6CE69B1F,00000001,?), ref: 6CE6A0EA
        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,?,?,00000000,00000000,?,?,?,?,?,?,?,6CE69B1F), ref: 6CE6A105
        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,6CE69B1F), ref: 6CE6A12B
        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,6CE69B1F), ref: 6CE6A150
        • __freea.LIBCMT ref: 6CE6A172
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: ByteCharMultiWide$Info$__freea_memset
        • String ID:
        • API String ID: 1700608584-0
        • Opcode ID: 884bba4d6cf5f73fd22c8f4f8eb81509212d697d3359f7c5cb47b11238fe113e
        • Instruction ID: db95d8ebb5dc0f343f0f0ce78999eedfcb9a56ea9283c08ec2b52fd540180a77
        • Opcode Fuzzy Hash: 884bba4d6cf5f73fd22c8f4f8eb81509212d697d3359f7c5cb47b11238fe113e
        • Instruction Fuzzy Hash: 97517FB2D91129AFDF009F96CC809EEBBB9EF0935CF304129E524A7A50D7319D45CB60
        APIs
        • GetStringTypeW.KERNEL32(00000001,00E72A18,00000001,?,?,?,00000000,?,?,?,00E80F03,00000001,?,00000000,?,?), ref: 00E80D43
        • GetLastError.KERNEL32(?,00E80F03,00000001,?,00000000,?,?,?,?,00000000,?,00000001,00000000,00000000,00000008,?), ref: 00E80D55
        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,?,00000000,?,?,?,00E80F03,00000001,?,00000000), ref: 00E80DBA
        • _memset.LIBCMT ref: 00E80E0F
        • MultiByteToWideChar.KERNEL32(00000000,00000001,?,00000000,00000000,00000000,?,?,00000000,?,00000001,00000000,00000000,00000008,?,00000000), ref: 00E80E24
        • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00E80E32
        • __freea.LIBCMT ref: 00E80E3C
        • ___ansicp.LIBCMT ref: 00E80E66
        • GetStringTypeA.KERNEL32(?,?,?,?,?,?,?,00000000,?,?,?,00E80F03,00000001,?,00000000,?), ref: 00E80EA7
          • Part of subcall function 00E81343: GetCPInfo.KERNEL32(?,00000000,?,00000000,00000000,00000000,?,?,?,00E80F03,00000001,?,00000000,?,?,?), ref: 00E8138E
          • Part of subcall function 00E81343: GetCPInfo.KERNEL32(?,00000001,?,00E80F03,00000001,?), ref: 00E813A7
          • Part of subcall function 00E81343: _memset.LIBCMT ref: 00E81443
          • Part of subcall function 00E81343: MultiByteToWideChar.KERNEL32(?,00000001,?,00E80F03,?,00000000,?,?,?,?,?,?,?,00E80F03,00000001,?), ref: 00E8145A
          • Part of subcall function 00E81343: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,?,?,00000000,00000000,?,?,?,?,?,?,?,00E80F03), ref: 00E81475
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: ByteCharMultiWide$StringType$Info_memset$ErrorLast___ansicp__freea
        • String ID:
        • API String ID: 3793715485-0
        • Opcode ID: db62defd2f13f099eacc9484c3a7544f2a9f51dd6fb6d44352b3c05ca7d12622
        • Instruction ID: 76595fd5411c23c8a511dec6a7d4500833ab7ea68cb5c8155846bdd2bd0c802b
        • Opcode Fuzzy Hash: db62defd2f13f099eacc9484c3a7544f2a9f51dd6fb6d44352b3c05ca7d12622
        • Instruction Fuzzy Hash: 0B51AE7150020AEFDF20AF99DC819AF7BA9EB08354B15582AF91DF7160D730DD98CBA1
        APIs
        • GetStringTypeW.KERNEL32(00000001,6CE54E80,00000001,?,?,?,00000000,?,?,?,6CE69B1F,00000001,?,00000000,?,?), ref: 6CE6995F
        • GetLastError.KERNEL32(?,6CE69B1F,00000001,?,00000000,?,?,?,?,00000000,?,00000001,00000000,00000000,00000008,?), ref: 6CE69971
        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,?,00000000,?,?,?,6CE69B1F,00000001,?,00000000), ref: 6CE699D6
        • _memset.LIBCMT ref: 6CE69A2B
        • MultiByteToWideChar.KERNEL32(00000000,00000001,?,00000000,00000000,00000000,?,?,00000000,?,00000001,00000000,00000000,00000008,?,00000000), ref: 6CE69A40
        • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 6CE69A4E
        • __freea.LIBCMT ref: 6CE69A58
        • ___ansicp.LIBCMT ref: 6CE69A82
        • GetStringTypeA.KERNEL32(?,?,?,?,?,?,?,00000000,?,?,?,6CE69B1F,00000001,?,00000000,?), ref: 6CE69AC3
          • Part of subcall function 6CE69FD3: GetCPInfo.KERNEL32(?,00000000,?,00000000,00000000,00000000,?,?,?,6CE69B1F,00000001,?,00000000,?,?,?), ref: 6CE6A01E
          • Part of subcall function 6CE69FD3: GetCPInfo.KERNEL32(?,00000001,?,6CE69B1F,00000001,?), ref: 6CE6A037
          • Part of subcall function 6CE69FD3: _memset.LIBCMT ref: 6CE6A0D3
          • Part of subcall function 6CE69FD3: MultiByteToWideChar.KERNEL32(?,00000001,?,6CE69B1F,?,00000000,?,?,?,?,?,?,?,6CE69B1F,00000001,?), ref: 6CE6A0EA
          • Part of subcall function 6CE69FD3: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,?,?,00000000,00000000,?,?,?,?,?,?,?,6CE69B1F), ref: 6CE6A105
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: ByteCharMultiWide$StringType$Info_memset$ErrorLast___ansicp__freea
        • String ID:
        • API String ID: 3793715485-0
        • Opcode ID: 3877199f8a1749d6190580f1fc378149c856ec4571ef38f735b461890aa1331a
        • Instruction ID: ddc63c77f5820642b99fdec43bb10c5c323ed708bd570812ab9b414c228c741c
        • Opcode Fuzzy Hash: 3877199f8a1749d6190580f1fc378149c856ec4571ef38f735b461890aa1331a
        • Instruction Fuzzy Hash: 75518F7166010AAFDF009F96CC809AE7BF9EB053ACB30452AF915D7E50D735C965CB90
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: String___crt$InfoType_memset
        • String ID: $.Zl
        • API String ID: 406800760-3184658009
        • Opcode ID: b5b17c840243abb29132166ff987ae18bc7c590722d645145db1a0efdaa9b702
        • Instruction ID: 7f97e34bc2f9e6cfbfd8d9616de06980ab898acd103f5525fcb40840d1f2c3b6
        • Opcode Fuzzy Hash: b5b17c840243abb29132166ff987ae18bc7c590722d645145db1a0efdaa9b702
        • Instruction Fuzzy Hash: 9541077125179C9EDB21CB25CC84BFBBBFC9B02708F2444ECD59A86983D271AA498F10
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: _strnlen
        • String ID: , $Invalid parameger.$MakeForceCopyList$MakeForceCopyList(): Unable to get file name.$Unable to allocate memory block.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\inline.h
        • API String ID: 263284996-911860730
        • Opcode ID: 07081831f133288d06cfcab91cacc016a82e98ad555b503d4eab92be6cdbe24c
        • Instruction ID: d2937566886a75c54aa21d127676f8193f8000cc7d2e581ff297aeb3f1167524
        • Opcode Fuzzy Hash: 07081831f133288d06cfcab91cacc016a82e98ad555b503d4eab92be6cdbe24c
        • Instruction Fuzzy Hash: E43125F1944345BEE710CF258C44FDA7BF8DB52318FB04829E9449AF80EB37D92586A8
        APIs
        • _realloc.LIBCMT ref: 6CE5AEE6
        • GetPrivateProfileSectionNamesA.KERNEL32(00000000,-00000258,?), ref: 6CE5AEF8
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563C2
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563CB
          • Part of subcall function 6CE56391: _strrchr.LIBCMT ref: 6CE56411
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: __wstrtime$NamesPrivateProfileSection_realloc_strrchr
        • String ID: GetSectionNamesFromInf$GetSectionNamesFromInf(): Unable to get section names from %s.$Unable to find %s$e:\bt\382730\setup\deliverables\dsetup\dsetup32\inline.h$realloc()
        • API String ID: 14898424-1451593648
        • Opcode ID: bfab799b4139b26642934e8443b4fc0a1faf356b0d8acf40d8e29918202bf8ac
        • Instruction ID: 1d4945cbb2931fff9014551cc28fe63f52f7148f6a965e09c323614e60158b32
        • Opcode Fuzzy Hash: bfab799b4139b26642934e8443b4fc0a1faf356b0d8acf40d8e29918202bf8ac
        • Instruction Fuzzy Hash: 0B11C8712481047FE7101FA59CC1CA63BBDEF5536CBB0092DF954A5B80EB3398744574
        APIs
        • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 6CE56FD8
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: DirectorySystem
        • String ID: DXGetFileVersion() failed.$FRunningOnLH$GetSystemDirectory()$\ntkrnlpa.exe$e:\bt\382730\setup\deliverables\dsetup\dsetup32\inline.h
        • API String ID: 2188284642-910728970
        • Opcode ID: 810bd0d54947beb0866db85aeef04fe079289fb5cd2643fc37bfdf9efd80301a
        • Instruction ID: 99d959cd224e15b166306cbcc8699399e9b581a2d6361420c69450ea864e6f1a
        • Opcode Fuzzy Hash: 810bd0d54947beb0866db85aeef04fe079289fb5cd2643fc37bfdf9efd80301a
        • Instruction Fuzzy Hash: 3D213675B15104ABDB10CEB58C40FDB33FC8B4A308FF04469B145E2680DB32DAB98B20
        APIs
        • ___initconout.LIBCMT ref: 6CE6A6EC
          • Part of subcall function 6CE6B2C3: CreateFileA.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6CE6A6F1,?,?,?,6CE66CEC,?), ref: 6CE6B2D6
        • WriteConsoleW.KERNEL32(FFFFFFFE,ll,00000001,?,00000000,?,?,?,6CE66CEC,?), ref: 6CE6A70D
        • GetLastError.KERNEL32(?,?,6CE66CEC,?), ref: 6CE6A720
        • GetConsoleOutputCP.KERNEL32(00000000,ll,00000001,?,00000005,00000000,00000000,?,?,?,6CE66CEC,?), ref: 6CE6A740
        • WideCharToMultiByte.KERNEL32(00000000,?,?,6CE66CEC,?), ref: 6CE6A747
        • WriteConsoleA.KERNEL32(FFFFFFFE,?,00000000,?,00000000,?,?,6CE66CEC,?), ref: 6CE6A763
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: Console$Write$ByteCharCreateErrorFileLastMultiOutputWide___initconout
        • String ID: ll
        • API String ID: 3734994816-1174952143
        • Opcode ID: f4b555df3a9e023d83810a2733386ff27db4255e5427f3b6b6c727e29073c6e6
        • Instruction ID: 9e1e1ccc2497cfd783950a3f9d3c940bf034392c925b929cff7f43e3a91b0401
        • Opcode Fuzzy Hash: f4b555df3a9e023d83810a2733386ff27db4255e5427f3b6b6c727e29073c6e6
        • Instruction Fuzzy Hash: 91216271AA1614AEDF048FA2CD44DFF7B79EB02318B600618F51187AC0DB719545CBE0
        APIs
        • GetVersionExA.KERNEL32(?), ref: 6CE5695B
        • LoadLibraryA.KERNEL32(ntdll.dll), ref: 6CE56979
        • GetProcAddress.KERNEL32(00000000,NtQueryInformationProcess), ref: 6CE5698C
        • GetCurrentProcess.KERNEL32(0000001A,00000000,00000004,00000000), ref: 6CE569AC
        • FreeLibrary.KERNEL32(00000000), ref: 6CE569CD
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: Library$AddressCurrentFreeLoadProcProcessVersion
        • String ID: NtQueryInformationProcess$ntdll.dll
        • API String ID: 3451282406-2906145389
        • Opcode ID: 7051f96e260e1ae556d65912e2db7771414aac7a5c44b77af110ddf48f61e5fe
        • Instruction ID: c8e6cbc9fd7f3afb72bcf9cabc67004f0ff6a064cf1e96763bcf9ff2aa059fc5
        • Opcode Fuzzy Hash: 7051f96e260e1ae556d65912e2db7771414aac7a5c44b77af110ddf48f61e5fe
        • Instruction Fuzzy Hash: 27210671A01215DBDB108F7AC809BAA77F8AB0632DFF002A5E519D27C0DB32C985CF11
        APIs
        • LoadStringA.USER32(00000064,?,00000104), ref: 00E745BD
        • GetLastError.KERNEL32(00000000), ref: 00E745C8
        • MessageBoxA.USER32(00000000,?,?,?), ref: 00E74609
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorLastLoadMessageString
        • String ID: DSetupCallback$DirectX Setup$LoadString()$e:\bt\382730\setup\deliverables\dxsetup\dxsetup.cpp
        • API String ID: 2128103774-4186389697
        • Opcode ID: f1baac9d9878dc582e9780e93d23bcc606ee45a83ecab13288d23a598060e040
        • Instruction ID: 312ce46af164dffe7eaf27c6b7acff8ad8aaa860bff811f2b950d101f800cae3
        • Opcode Fuzzy Hash: f1baac9d9878dc582e9780e93d23bcc606ee45a83ecab13288d23a598060e040
        • Instruction Fuzzy Hash: 6E11A3F1610308BFCB10DB69AC41DFE77ACEB89704F549065BA4DF2081EB718985AB61
        APIs
        • GetParent.USER32 ref: 00E755CC
        • PostMessageA.USER32(00000000,?,0000046B,00000000), ref: 00E755D3
        • CreateThread.KERNEL32(00000000,00000000,Function_0000554D,?,00000000,?), ref: 00E755E6
        • GetLastError.KERNEL32(00000000,?,00000000,?), ref: 00E755F4
        Strings
        • CDXWSetup::Install, xrefs: 00E75600
        • CreateThread(), xrefs: 00E755FB
        • e:\bt\382730\setup\deliverables\dxsetup\psheets.cpp, xrefs: 00E7560A
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: CreateErrorLastMessageParentPostThread
        • String ID: CDXWSetup::Install$CreateThread()$e:\bt\382730\setup\deliverables\dxsetup\psheets.cpp
        • API String ID: 3016392610-3077047923
        • Opcode ID: 54a5b5eaee92ca530e8e00e37549da7a4cb943a74aa45853e44d9867fb99dfdc
        • Instruction ID: 7da8df17886f9b2d9d0bf83fec1b42fa59f15934a1893fd47bcb4b1171292a71
        • Opcode Fuzzy Hash: 54a5b5eaee92ca530e8e00e37549da7a4cb943a74aa45853e44d9867fb99dfdc
        • Instruction Fuzzy Hash: 4DF02B737503407FC320A7AA9C0EC373A6DDBC6B117509858F60EF2040E6E089418670
        APIs
          • Part of subcall function 6CE567A1: GetFileVersionInfoSizeA.VERSION(6CE56892,?,\ntkrnlpa.exe,00000104,00000000,?,?,6CE56892,?,?,?,00000000), ref: 6CE567B2
          • Part of subcall function 6CE567A1: GetLastError.KERNEL32(6CE56892,6CE56892,?,\ntkrnlpa.exe,00000104,00000000,?,?,6CE56892,?,?,?,00000000), ref: 6CE567C9
        • VerQueryValueW.VERSION(00000000,\VarFileInfo\Translation,?,?,?), ref: 6CE59558
        • GetLastError.KERNEL32(Unable to get Translation valie.,00000000,\VarFileInfo\Translation,?,?,?), ref: 6CE59566
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563C2
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563CB
          • Part of subcall function 6CE56391: _strrchr.LIBCMT ref: 6CE56411
        Strings
        • Unable to get Translation valie., xrefs: 6CE59561
        • \VarFileInfo\Translation, xrefs: 6CE59552
        • VerQueryValue(), xrefs: 6CE5956D
        • GetLangCodePage, xrefs: 6CE59572
        • e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h, xrefs: 6CE5957C
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorLast__wstrtime$FileInfoQuerySizeValueVersion_strrchr
        • String ID: GetLangCodePage$Unable to get Translation valie.$VerQueryValue()$\VarFileInfo\Translation$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
        • API String ID: 2263350259-635172172
        • Opcode ID: 14c4d8c496b9e07f207066c62b214cf3405212c269059d6aee24f2364b543c36
        • Instruction ID: beab53eef8dd0e73721147f8dd6732c733dfcd8bde99e8965b503611162c59cd
        • Opcode Fuzzy Hash: 14c4d8c496b9e07f207066c62b214cf3405212c269059d6aee24f2364b543c36
        • Instruction Fuzzy Hash: BBF0AF72600214BF97019A5ACC44CDB3BBCDFDA2587F00125F905DBA00EB32DE2686B0
        APIs
        • GetStartupInfoA.KERNEL32(?), ref: 733F8195
          • Part of subcall function 733F813A: __calloc_impl.LIBCMT ref: 733F814F
        • GetFileType.KERNEL32(00000024), ref: 733F82A3
        • ___crtInitCritSecAndSpinCount.LIBCMT ref: 733F82D7
        • GetStdHandle.KERNEL32(-000000F6), ref: 733F832E
        • GetFileType.KERNEL32(00000000), ref: 733F8340
        • ___crtInitCritSecAndSpinCount.LIBCMT ref: 733F836E
        • SetHandleCount.KERNEL32 ref: 733F8399
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: Count$CritFileHandleInitSpinType___crt$InfoStartup__calloc_impl
        • String ID:
        • API String ID: 3691444693-0
        • Opcode ID: b863bed7fef583f2dfee33c940a45ea3b9ece829e428eabb8bef3a71c5f6fbd0
        • Instruction ID: d12bb5c65ed3f89ecdeb8c4bbb38833400dd2b9e38b6e2ed55cabdba83cc3675
        • Opcode Fuzzy Hash: b863bed7fef583f2dfee33c940a45ea3b9ece829e428eabb8bef3a71c5f6fbd0
        • Instruction Fuzzy Hash: F561F236A047439FD7398B68C944B097BE4AB05324FA8865AD46BBF2E0C734D406C751
        APIs
        • GetStartupInfoA.KERNEL32(?), ref: 00E78A7A
          • Part of subcall function 00E7E40D: __calloc_impl.LIBCMT ref: 00E7E422
        • GetFileType.KERNEL32(00000024), ref: 00E78B88
        • ___crtInitCritSecAndSpinCount.LIBCMT ref: 00E78BBC
        • GetStdHandle.KERNEL32(-000000F6), ref: 00E78C13
        • GetFileType.KERNEL32(00000000), ref: 00E78C25
        • ___crtInitCritSecAndSpinCount.LIBCMT ref: 00E78C53
        • SetHandleCount.KERNEL32 ref: 00E78C7E
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: Count$CritFileHandleInitSpinType___crt$InfoStartup__calloc_impl
        • String ID:
        • API String ID: 3691444693-0
        • Opcode ID: 335f048c5678c564b8f23410658bb0f9df30cf7862a94fc5f60a78c5dea1b0fd
        • Instruction ID: ffa77a697909286a7e7b935e476dd7240fb581a5e27f4371ede25d7f062cf2c2
        • Opcode Fuzzy Hash: 335f048c5678c564b8f23410658bb0f9df30cf7862a94fc5f60a78c5dea1b0fd
        • Instruction Fuzzy Hash: 8E6169755453418FC724CB28C99C759BBE0AF26728F28D699D56DFB2E0CB30D849CB22
        APIs
        • GetStartupInfoA.KERNEL32(?), ref: 6CE6196C
          • Part of subcall function 6CE61911: __calloc_impl.LIBCMT ref: 6CE61926
        • GetFileType.KERNEL32(00000024), ref: 6CE61A7A
        • ___crtInitCritSecAndSpinCount.LIBCMT ref: 6CE61AAE
        • GetStdHandle.KERNEL32(-000000F6), ref: 6CE61B05
        • GetFileType.KERNEL32(00000000), ref: 6CE61B17
        • ___crtInitCritSecAndSpinCount.LIBCMT ref: 6CE61B45
        • SetHandleCount.KERNEL32 ref: 6CE61B70
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: Count$CritFileHandleInitSpinType___crt$InfoStartup__calloc_impl
        • String ID:
        • API String ID: 3691444693-0
        • Opcode ID: 8dacf771798049ec7549aab72fa1be29377ace7c4fd47f29a72b1ab07393b29e
        • Instruction ID: 0d940c15dab52ebd94d6a32ce354287032d1df2271916ceb4009c1c1111ea28d
        • Opcode Fuzzy Hash: 8dacf771798049ec7549aab72fa1be29377ace7c4fd47f29a72b1ab07393b29e
        • Instruction Fuzzy Hash: AA610432AA5791CFDB12CBBAC8847597BF0AB13328F388659D4619BEE1D730D446CB11
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: String___crt$InfoType_memset
        • String ID:
        • API String ID: 406800760-3916222277
        • Opcode ID: 1624239c6317744829bbbd9a10f772e6c74aa3ac88cb150821165004568adcd9
        • Instruction ID: c1f058e417c08cff94f6e01f42bbd9c09bae30ecb63d9aca92bcdeb930e2bb9e
        • Opcode Fuzzy Hash: 1624239c6317744829bbbd9a10f772e6c74aa3ac88cb150821165004568adcd9
        • Instruction Fuzzy Hash: 2341047650075D5FEB328B24DC88BFB7BFCAB05308F5844ECD58B8618AD2719A468F10
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: String___crt$InfoType_memset
        • String ID:
        • API String ID: 406800760-3916222277
        • Opcode ID: 4a5336d90b896eb1cd79dbcfea8b3353f4ece044f5a9026b0da52eeb2cccd7b4
        • Instruction ID: 6eacb9f707d9970098a233bde712c3b6720aebfcda99e8ddd358895e799403ae
        • Opcode Fuzzy Hash: 4a5336d90b896eb1cd79dbcfea8b3353f4ece044f5a9026b0da52eeb2cccd7b4
        • Instruction Fuzzy Hash: 2841187150079C9EDB368B248C89FFBBBE89F05708F24D4E8E58EA6082D7719A459F50
        APIs
        • CharLowerA.USER32(?), ref: 6CE5BA17
        • _strrchr.LIBCMT ref: 6CE5BA31
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563C2
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563CB
          • Part of subcall function 6CE56391: _strrchr.LIBCMT ref: 6CE56411
        Strings
        • \directx\setup\, xrefs: 6CE5BA1D
        • CSetup::CheckProgramFiles, xrefs: 6CE5BA5A
        • e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp, xrefs: 6CE5BA64
        • Unable to create path string, %s%s., xrefs: 6CE5BA53
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: __wstrtime_strrchr$CharLower
        • String ID: CSetup::CheckProgramFiles$Unable to create path string, %s%s.$\directx\setup\$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
        • API String ID: 3410477431-2052294242
        • Opcode ID: 838d5d25b0ba5286b5538ee7ddfbbdc5252a5cf1a49543c78de4b18764282bbe
        • Instruction ID: 10226a9710c05d7eeb120feb221b9cf0d51a8bdb02bf8e4a7134ef20a9952cc3
        • Opcode Fuzzy Hash: 838d5d25b0ba5286b5538ee7ddfbbdc5252a5cf1a49543c78de4b18764282bbe
        • Instruction Fuzzy Hash: 59F09C7F68870175F21455779C44DA716BCCBD226DBF1043AB919D1F42FD27D4214174
        APIs
        • TlsGetValue.KERNEL32(734059B8,?,733F7A86,00000000,734003F0,00000314,734059B8,00000000,?,?,?,?,733FCB75,734059B8,Microsoft Visual C++ Runtime Library,00012010), ref: 733F7A26
        • TlsGetValue.KERNEL32(00000006,?,733F7A86,00000000,734003F0,00000314,734059B8,00000000,?,?,?,?,733FCB75,734059B8,Microsoft Visual C++ Runtime Library,00012010), ref: 733F7A3D
        • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,733F7A86,00000000,734003F0,00000314,734059B8,00000000,?,?,?,?,733FCB75,734059B8,Microsoft Visual C++ Runtime Library,00012010), ref: 733F7A52
        • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 733F7A62
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: Value$AddressHandleModuleProc
        • String ID: EncodePointer$KERNEL32.DLL
        • API String ID: 1929421221-3682587211
        • Opcode ID: 1304345022432e14db1103744ef58b75f3867c2f36dc38faf8f34cab8e673d1d
        • Instruction ID: 38e3a85ed5000d45ed2606a61c66d62f1b9e3fa3df9dc87784650aa5524ad61f
        • Opcode Fuzzy Hash: 1304345022432e14db1103744ef58b75f3867c2f36dc38faf8f34cab8e673d1d
        • Instruction Fuzzy Hash: 9EF03C31600117EFDF20AF76DD04F553FECDB402957954261F82DD6390DB36D5518A60
        APIs
        • TlsGetValue.KERNEL32(?,?,733F7B21), ref: 733F7A9F
        • TlsGetValue.KERNEL32(00000006,?,733F7B21), ref: 733F7AB6
        • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,733F7B21), ref: 733F7ACB
        • GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 733F7ADB
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: Value$AddressHandleModuleProc
        • String ID: DecodePointer$KERNEL32.DLL
        • API String ID: 1929421221-629428536
        • Opcode ID: 3c785a28337d7849631ad10ca916b50aebecd12996527d526bb3901916a6e634
        • Instruction ID: ef7deb398ae39fe6281334df746e0b68814714cb271a82e4000a8264265bd886
        • Opcode Fuzzy Hash: 3c785a28337d7849631ad10ca916b50aebecd12996527d526bb3901916a6e634
        • Instruction Fuzzy Hash: 9FF09C31600117FF9F21EB67DE04F563BEDDB402D17954220F82DD7290D735D5008A60
        APIs
        • TlsGetValue.KERNEL32(00E89768,?,00E78D16,00000000,00E7E017,00000314,00E89768,00000000,?,?,?,?,00E78325,00E89768,Microsoft Visual C++ Runtime Library,00012010), ref: 00E78CB6
        • TlsGetValue.KERNEL32(00000005,?,00E78D16,00000000,00E7E017,00000314,00E89768,00000000,?,?,?,?,00E78325,00E89768,Microsoft Visual C++ Runtime Library,00012010), ref: 00E78CCD
        • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,00E78D16,00000000,00E7E017,00000314,00E89768,00000000,?,?,?,?,00E78325,00E89768,Microsoft Visual C++ Runtime Library,00012010), ref: 00E78CE2
        • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 00E78CF2
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: Value$AddressHandleModuleProc
        • String ID: EncodePointer$KERNEL32.DLL
        • API String ID: 1929421221-3682587211
        • Opcode ID: 1ab8396c844c904b284464597ff0b6efc652ebf8e5dcb670b57ca5621d24c5c9
        • Instruction ID: 35d663139d3c131ae035db48147c4e5e0542a7877cd85be1580b458067368eb5
        • Opcode Fuzzy Hash: 1ab8396c844c904b284464597ff0b6efc652ebf8e5dcb670b57ca5621d24c5c9
        • Instruction Fuzzy Hash: 8BF03630641316AFDB119B6AEE0CD967B699B507A87149060BD1CF61A0DF31DC458B71
        APIs
        • TlsGetValue.KERNEL32(?,?,00E78DB1,?,00E7988D,?,?,?,00000000), ref: 00E78D2F
        • TlsGetValue.KERNEL32(00000005,?,00E78DB1,?,00E7988D,?,?,?,00000000), ref: 00E78D46
        • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,00E78DB1,?,00E7988D,?,?,?,00000000), ref: 00E78D5B
        • GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 00E78D6B
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: Value$AddressHandleModuleProc
        • String ID: DecodePointer$KERNEL32.DLL
        • API String ID: 1929421221-629428536
        • Opcode ID: 495c2f54739a7649659d4ee8b096926c4d2774079679849fe7dc8248ca4225e9
        • Instruction ID: b7f36d00197f1437bff0cb7da748e5ec0028012221e66a3658438a29b039f6dd
        • Opcode Fuzzy Hash: 495c2f54739a7649659d4ee8b096926c4d2774079679849fe7dc8248ca4225e9
        • Instruction Fuzzy Hash: 93F09630280206AF8B209B7AEE0CD953B6C9B113943049121FA1CF21F0DF31CC41DB50
        APIs
        • TlsGetValue.KERNEL32(6CE6808E,?,6CE68118,6CE6808E,00000014,6CE649D9,00000000,00000FA0,6CE6B5E8,0000000C,6CE64A3F,6CE57D8D,00066BCC,?,6CE6186F,00000004), ref: 6CE611FD
        • TlsGetValue.KERNEL32(00000007,?,6CE68118,6CE6808E,00000014,6CE649D9,00000000,00000FA0,6CE6B5E8,0000000C,6CE64A3F,6CE57D8D,00066BCC,?,6CE6186F,00000004), ref: 6CE61214
        • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,6CE68118,6CE6808E,00000014,6CE649D9,00000000,00000FA0,6CE6B5E8,0000000C,6CE64A3F,6CE57D8D,00066BCC,?,6CE6186F,00000004), ref: 6CE61229
        • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 6CE61239
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: Value$AddressHandleModuleProc
        • String ID: EncodePointer$KERNEL32.DLL
        • API String ID: 1929421221-3682587211
        • Opcode ID: 1d25da63f3b95899c43550c5470071ee6cab3c06b3e5b0617881b3ddec5a0615
        • Instruction ID: 77175417ff9efb7e0b917dc4718455df513f93a9127ef77bb681120d6b4a0169
        • Opcode Fuzzy Hash: 1d25da63f3b95899c43550c5470071ee6cab3c06b3e5b0617881b3ddec5a0615
        • Instruction Fuzzy Hash: 51F03031291145ABDF019FE7EC449AA3FB8EB412687718521F828D3A50DB31D911EA61
        APIs
        • TlsGetValue.KERNEL32(6CE57D8D,?,6CE641C6,?,6CE6418C,6CE57D8D,?,?,6CE5FCAF,6CE57D8D,?,?,6CE5770E,00066BDC), ref: 6CE61276
        • TlsGetValue.KERNEL32(00000007,?,6CE641C6,?,6CE6418C,6CE57D8D,?,?,6CE5FCAF,6CE57D8D,?,?,6CE5770E,00066BDC), ref: 6CE6128D
        • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,6CE641C6,?,6CE6418C,6CE57D8D,?,?,6CE5FCAF,6CE57D8D,?,?,6CE5770E,00066BDC), ref: 6CE612A2
        • GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 6CE612B2
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: Value$AddressHandleModuleProc
        • String ID: DecodePointer$KERNEL32.DLL
        • API String ID: 1929421221-629428536
        • Opcode ID: 4c6eb22033a1c720c90f8dbf4e830509f3330258cf2a36a8965c26aed7e32f34
        • Instruction ID: d5ee3e0ab0d218ecc0b7dc033b36a8a831c8518b5f6b61e58436db8e2a2f26a6
        • Opcode Fuzzy Hash: 4c6eb22033a1c720c90f8dbf4e830509f3330258cf2a36a8965c26aed7e32f34
        • Instruction Fuzzy Hash: 61F05B35791149ABEF015FEBCC44DA63BB8EF4126C7704921F828D3A50DB31D911BA60
        APIs
        • LoadLibraryA.KERNEL32(?), ref: 00E75AB5
        • GetLastError.KERNEL32(Unable to load %s.,?), ref: 00E75ACA
          • Part of subcall function 00E7390A: __wstrtime.LIBCMT ref: 00E7393B
          • Part of subcall function 00E7390A: __wstrtime.LIBCMT ref: 00E73944
          • Part of subcall function 00E7390A: _strrchr.LIBCMT ref: 00E7398A
        Strings
        • LoadLibrary(), xrefs: 00E75AD1
        • Unable to load %s., xrefs: 00E75AC5
        • CDllLoader::LoadLibraryA, xrefs: 00E75AD6
        • e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h, xrefs: 00E75AE0
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: __wstrtime$ErrorLastLibraryLoad_strrchr
        • String ID: CDllLoader::LoadLibraryA$LoadLibrary()$Unable to load %s.$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
        • API String ID: 108046663-2531695590
        • Opcode ID: 2ad17c1be7b0a70e93d68a6ab6e5239af2eb8a51c388a8db224285534c9e717a
        • Instruction ID: 76fa66c5cb8123ba345e828391b7c30e27c144fed9f4970387c753bfc6250121
        • Opcode Fuzzy Hash: 2ad17c1be7b0a70e93d68a6ab6e5239af2eb8a51c388a8db224285534c9e717a
        • Instruction Fuzzy Hash: 7FF0E5B2680309BFDB10AFA9DC07C963E98EF94792700A561FA4EF5190E7F1C55086A1
        APIs
        • LoadStringA.USER32(?,?,00000000,00000258), ref: 6CE59CEA
        • GetLastError.KERNEL32(Unable to load string, ResID = %d.,?,?,6CE59E86,?,?,00000258,00000000,?,?), ref: 6CE59CFE
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563C2
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563CB
          • Part of subcall function 6CE56391: _strrchr.LIBCMT ref: 6CE56411
        Strings
        • CSetup::XLoadString, xrefs: 6CE59D0A
        • Unable to load string, ResID = %d., xrefs: 6CE59CF9
        • e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp, xrefs: 6CE59D14
        • LoadString(), xrefs: 6CE59D05
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: __wstrtime$ErrorLastLoadString_strrchr
        • String ID: CSetup::XLoadString$LoadString()$Unable to load string, ResID = %d.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
        • API String ID: 2420349584-1423309346
        • Opcode ID: 527b0bd49e6106c3ee1455cf598aab7e1d6a50130558c67f1748d9b1d41c920b
        • Instruction ID: d001fd1909818d2c16622b21b36befdcb62e646315ac4d864041c67862059213
        • Opcode Fuzzy Hash: 527b0bd49e6106c3ee1455cf598aab7e1d6a50130558c67f1748d9b1d41c920b
        • Instruction Fuzzy Hash: 5FE0D837500115BBCF121ED1CC08CCE3F39EB18391BE44415FA0495A10D633D83097D0
        APIs
        • DialogBoxParamA.USER32(?,00001B58,?,6CE579F6,00000000), ref: 6CE5F1EF
        • GetLastError.KERNEL32(Unable to open EULA dialog box.), ref: 6CE5F1FF
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563C2
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563CB
          • Part of subcall function 6CE56391: _strrchr.LIBCMT ref: 6CE56411
        Strings
        • DialogBox(), xrefs: 6CE5F206
        • e:\bt\382730\setup\deliverables\dsetup\dsetup32\setupapi.cpp, xrefs: 6CE5F212
        • Unable to open EULA dialog box., xrefs: 6CE5F1FA
        • DirectXSetupShowEULA, xrefs: 6CE5F20B
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: __wstrtime$DialogErrorLastParam_strrchr
        • String ID: DialogBox()$DirectXSetupShowEULA$Unable to open EULA dialog box.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setupapi.cpp
        • API String ID: 573082458-4027609811
        • Opcode ID: 109af5482276bd66dd780ff04b6fe68e3ac54d66b907250f8371adcf7f527351
        • Instruction ID: 74691963931f2da4e279aed405f2bd52e60c686645c66b004d7f30b1628d6e7e
        • Opcode Fuzzy Hash: 109af5482276bd66dd780ff04b6fe68e3ac54d66b907250f8371adcf7f527351
        • Instruction Fuzzy Hash: 06E02677688204BBE7105ED6AC09F553B399790724FF10A02F314EADD0D723B8309660
        APIs
          • Part of subcall function 733FDBF5: SetFilePointer.KERNEL32(00000000,00000000,00000002,00000000,00000000,00BFBBEF,733FFD67,733FFD67,?,733FDE82,00BFBBEF,00000000,00000000,00000002,00000000,00000000), ref: 733FDC37
          • Part of subcall function 733FDBF5: GetLastError.KERNEL32(?,733FDE82,00BFBBEF,00000000,00000000,00000002,00000000,00000000,00000002), ref: 733FDC44
          • Part of subcall function 733FDBF5: __dosmaperr.LIBCMT ref: 733FDC4F
        • GetProcessHeap.KERNEL32(00000008,00001000,?,?,?,?,?,00000000,00000109,00000000,?,?,733FFB2C,00000109,00000000), ref: 73401537
        • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,00000000,00000109,00000000,?,?,733FFB2C,00000109,00000000), ref: 7340153E
        • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,00000109,00000000,?,?,733FFB2C), ref: 734015BA
        • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000,00000109,00000000,?,?,733FFB2C,00000109), ref: 734015C1
        • SetEndOfFile.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,00000109,00000000,?,?,733FFB2C), ref: 7340161C
        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,00000109,00000000,?,?,733FFB2C,00000109), ref: 73401649
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: Heap$ErrorFileLastProcess$AllocFreePointer__dosmaperr
        • String ID:
        • API String ID: 3789379547-0
        • Opcode ID: 51db46b197a90b97d9b058011357a0e7ade4737ab89970f7bc4d4f5e8dae87e8
        • Instruction ID: b08d7d685be2cd0b92bcba6feba267727327f6faab209538fd8ed393843f853a
        • Opcode Fuzzy Hash: 51db46b197a90b97d9b058011357a0e7ade4737ab89970f7bc4d4f5e8dae87e8
        • Instruction Fuzzy Hash: 6541B576E00246AFEF252FF8CC4579D3BB6EB00360F5446B5F927AA3D0E63589418B54
        APIs
          • Part of subcall function 6CE68251: SetFilePointer.KERNEL32(00000000,00000000,00000002,00000000,00000000,00BFBBEF,6CE692B8,6CE692B8,?,6CE66AD7,00BFBBEF,00000000,00000000,00000002,00000000,00000000), ref: 6CE68293
          • Part of subcall function 6CE68251: GetLastError.KERNEL32(?,6CE66AD7,00BFBBEF,00000000,00000000,00000002,00000000,00000000,00000002), ref: 6CE682A0
          • Part of subcall function 6CE68251: __dosmaperr.LIBCMT ref: 6CE682AB
        • GetProcessHeap.KERNEL32(00000008,00001000,?,?,?,?,?,00000000,00000109,00000000,?,?,6CE6907D,00000109,6CE57D8D), ref: 6CE6AC50
        • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,00000000,00000109,00000000,?,?,6CE6907D,00000109,6CE57D8D), ref: 6CE6AC57
        • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,00000109,00000000,?,?,6CE6907D), ref: 6CE6ACD3
        • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000,00000109,00000000,?,?,6CE6907D,00000109), ref: 6CE6ACDA
        • SetEndOfFile.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,00000109,00000000,?,?,6CE6907D), ref: 6CE6AD35
        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,00000109,00000000,?,?,6CE6907D,00000109), ref: 6CE6AD62
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: Heap$ErrorFileLastProcess$AllocFreePointer__dosmaperr
        • String ID:
        • API String ID: 3789379547-0
        • Opcode ID: 17d58a2a4a9e842a481665d6feb39cb95bf8a2ce8ed4b046ab00271dfb5b387e
        • Instruction ID: 9bece32d26abcdac60847fa16a3ad20b5f5c962ab1c176d6332e79437da5dac1
        • Opcode Fuzzy Hash: 17d58a2a4a9e842a481665d6feb39cb95bf8a2ce8ed4b046ab00271dfb5b387e
        • Instruction Fuzzy Hash: A841CE72EE0528AFDF101FBACC4469D3A75EB0172CF31462AF835A7EA0E73589458791
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 28b6d0390f383c6f1990089af87418e20bf0989549eb9d5c1016b1470d90b921
        • Instruction ID: 8518a752c7bb3850f0effbd56927452971d6ea0c918a9fabef0f6dd86da86733
        • Opcode Fuzzy Hash: 28b6d0390f383c6f1990089af87418e20bf0989549eb9d5c1016b1470d90b921
        • Instruction Fuzzy Hash: 2F31D2B24F4A004AC7218E7BC80169677F4AF4237CB344A0EF4B687F91DF25A5468B90
        APIs
        • ___initconout.LIBCMT ref: 734012BF
          • Part of subcall function 73402314: CreateFileA.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,734012C4,?,?,?,733FE097,?), ref: 73402327
        • WriteConsoleW.KERNEL32(FFFFFFFE,733FE097,00000001,?,00000000,?,?,?,733FE097,?), ref: 734012E0
        • GetLastError.KERNEL32(?,?,733FE097,?), ref: 734012F3
        • GetConsoleOutputCP.KERNEL32(00000000,733FE097,00000001,?,00000005,00000000,00000000,?,?,?,733FE097,?), ref: 73401313
        • WideCharToMultiByte.KERNEL32(00000000,?,?,733FE097,?), ref: 7340131A
        • WriteConsoleA.KERNEL32(FFFFFFFE,?,00000000,?,00000000,?,?,733FE097,?), ref: 73401336
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: Console$Write$ByteCharCreateErrorFileLastMultiOutputWide___initconout
        • String ID:
        • API String ID: 3734994816-0
        • Opcode ID: 614dbf7c0dc30743d344e4d7e32d12ccf6260243a3fe877fcc0c7ecdd177388e
        • Instruction ID: f68a6a20a4d00e90cd5ca30cb4528c12a070f0b68a6c340a909d1b06ab7c98f7
        • Opcode Fuzzy Hash: 614dbf7c0dc30743d344e4d7e32d12ccf6260243a3fe877fcc0c7ecdd177388e
        • Instruction Fuzzy Hash: 8621F67AB00115ABD718FBA2CA04FEF37BDEB05714F6002A8F616E62C0E7709545CB94
        APIs
        • ___initconout.LIBCMT ref: 00E82010
          • Part of subcall function 00E82C72: CreateFileA.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00E82015,?,?,?,00E7F195,?), ref: 00E82C85
        • WriteConsoleW.KERNEL32(FFFFFFFE,00E7F195,00000001,?,00000000,?,?,?,00E7F195,?), ref: 00E82031
        • GetLastError.KERNEL32(?,?,00E7F195,?), ref: 00E82044
        • GetConsoleOutputCP.KERNEL32(00000000,00E7F195,00000001,?,00000005,00000000,00000000,?,?,?,00E7F195,?), ref: 00E82064
        • WideCharToMultiByte.KERNEL32(00000000,?,?,00E7F195,?), ref: 00E8206B
        • WriteConsoleA.KERNEL32(FFFFFFFE,?,00000000,?,00000000,?,?,00E7F195,?), ref: 00E82087
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: Console$Write$ByteCharCreateErrorFileLastMultiOutputWide___initconout
        • String ID:
        • API String ID: 3734994816-0
        • Opcode ID: eec4bddc0c6b0ccfadbebd566bb84375810405d076e1ff7c76511aff88e02d19
        • Instruction ID: 76412232ad816c588db60fe27545351e18196c2388de4ebd8418e4fff73df131
        • Opcode Fuzzy Hash: eec4bddc0c6b0ccfadbebd566bb84375810405d076e1ff7c76511aff88e02d19
        • Instruction Fuzzy Hash: 03219074500204AEDB20EFA6DD089FA3BA9FF05314B50025DFB5EBA1D0DB719989DBA1
        APIs
        • LoadImageA.USER32(00E768CF,00001B5B,00000000,00000000,00000000,00002000), ref: 00E76D1A
        • CreateCompatibleDC.GDI32(00000000), ref: 00E76D28
        • SelectObject.GDI32(00000000), ref: 00E76D3C
        • LoadImageA.USER32(00E768CF,00001B5C,00000000,00000000,00000000,00002000), ref: 00E76D50
        • CreateCompatibleDC.GDI32(00000000), ref: 00E76D59
        • SelectObject.GDI32(00000000), ref: 00E76D67
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: CompatibleCreateImageLoadObjectSelect
        • String ID:
        • API String ID: 301843087-0
        • Opcode ID: 46490785a474383717b68335b58a03e53b3d29d0c78fff9addc003a08f566502
        • Instruction ID: bc18364fa4b343651bc0e5b97da15c58cf76cf522f6355ff58af664513ccb04f
        • Opcode Fuzzy Hash: 46490785a474383717b68335b58a03e53b3d29d0c78fff9addc003a08f566502
        • Instruction Fuzzy Hash: C3F0F9B19003447EEB109F67AC89E777F6EE7C5760B048027FB08A7161DA769845DB60
        APIs
        • DeleteObject.GDI32(00000000), ref: 00E76D89
        • DeleteObject.GDI32(00000000), ref: 00E76D9B
        • DeleteObject.GDI32(00000000), ref: 00E76DAD
        • DeleteDC.GDI32(00000000), ref: 00E76DC5
        • DeleteDC.GDI32(00000000), ref: 00E76DD7
        • DeleteDC.GDI32(00000000), ref: 00E76DE9
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: Delete$Object
        • String ID:
        • API String ID: 3217310620-0
        • Opcode ID: d24c5879c748d330ca60e9adee6115896111782d51db22890e8508f9cc4a6287
        • Instruction ID: 99bc4a95d0815b7d47106b7537ba6f0e0fdbc3b527ebb631f534d34533809f10
        • Opcode Fuzzy Hash: d24c5879c748d330ca60e9adee6115896111782d51db22890e8508f9cc4a6287
        • Instruction Fuzzy Hash: 050196B1E306149F8A11AF6FAC84869B7EEE78471432C9907E208F3225D7B69C488B50
        APIs
        • CloseHandle.KERNEL32(?,00000000,00E76927,?,?,?,?,?,?,00000000,00000000,?), ref: 00E76272
        • GetLastError.KERNEL32(00000000,?,?,?,?,?,?,00000000,00000000,?), ref: 00E7627D
          • Part of subcall function 00E7390A: __wstrtime.LIBCMT ref: 00E7393B
          • Part of subcall function 00E7390A: __wstrtime.LIBCMT ref: 00E73944
          • Part of subcall function 00E7390A: _strrchr.LIBCMT ref: 00E7398A
        Strings
        • CDXWSetup::~CDXWSetup, xrefs: 00E76289
        • e:\bt\382730\setup\deliverables\dxsetup\psheets.cpp, xrefs: 00E76290
        • ~CDXWSetup(), xrefs: 00E7625D
        • CloseHandle(), xrefs: 00E76284
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: __wstrtime$CloseErrorHandleLast_strrchr
        • String ID: CDXWSetup::~CDXWSetup$CloseHandle()$e:\bt\382730\setup\deliverables\dxsetup\psheets.cpp$~CDXWSetup()
        • API String ID: 4205222315-3347362006
        • Opcode ID: a32582b6bfef4ee4e3d35ed45aa2376ba62803b37ca0bf7112039b822dfc7f74
        • Instruction ID: 40694c828fb13bddc25363e3bcf7d51115a46fb1db01496dd42c2056a71c5390
        • Opcode Fuzzy Hash: a32582b6bfef4ee4e3d35ed45aa2376ba62803b37ca0bf7112039b822dfc7f74
        • Instruction Fuzzy Hash: 1FE02B72701F516BD63876346C0AE2B179CAF40B14305E84CFA0CB7182DA60DC40C3E1
        APIs
          • Part of subcall function 6CE6066E: __getptd.LIBCMT ref: 6CE60681
        • __stricmp_l.LIBCMT ref: 6CE694B8
        • ___crtLCMapStringA.LIBCMT ref: 6CE69511
        • ___crtLCMapStringA.LIBCMT ref: 6CE6959A
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: String___crt$__getptd__stricmp_l
        • String ID: V<l$V<l
        • API String ID: 2420264727-2464314983
        • Opcode ID: 9bfd4013d8a1680e5bb27d3c5b408378f0e765a01aaa5cef8dde96e3a88c048b
        • Instruction ID: 3bbe436e16033b735f96a1b2aa0990c25c3d71bcef02820e33a1b7baf30a36bb
        • Opcode Fuzzy Hash: 9bfd4013d8a1680e5bb27d3c5b408378f0e765a01aaa5cef8dde96e3a88c048b
        • Instruction Fuzzy Hash: 54513EB08A42A99FDB119B5BC494BFD7BB4EB0232DF344189E0B15BED1D7308646DB60
        APIs
        • ___free_lconv_mon.LIBCMT ref: 733FD101
        • ___free_lconv_num.LIBCMT ref: 733FD122
          • Part of subcall function 733F6F02: ___sbh_find_block.LIBCMT ref: 733F6F2B
          • Part of subcall function 733F6F02: HeapFree.KERNEL32(00000000,00000000,734026A0,0000000C,733FADB5,00000000,734027E8,0000000C,733FADF4,00000000,-0000000F,?,733F8098,00000004,73402788,0000000C), ref: 733F6F6A
          • Part of subcall function 733F6F02: GetLastError.KERNEL32(?,733F8098,00000004,73402788,0000000C,733FDAD8,00000000,00000000,00000000,00000000,00000000,?,733F7C67,00000001,00000214), ref: 733F6F7B
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorFreeHeapLast___free_lconv_mon___free_lconv_num___sbh_find_block
        • String ID: M@s$F@s$M@s
        • API String ID: 4074146912-202371523
        • Opcode ID: aa6e83958f9dfd48ecc7268d27b185bd485fd453a33e77372c04c37664a10a60
        • Instruction ID: 87fb56dd047c3c4e905fdc1567854ba36381233c64808f36560e37056d69d3ab
        • Opcode Fuzzy Hash: aa6e83958f9dfd48ecc7268d27b185bd485fd453a33e77372c04c37664a10a60
        • Instruction Fuzzy Hash: 45316073604703AFE7716F68DD88F5677AAAB00310FA4493EE14AC71A4CB31A842CA25
        APIs
        • ___free_lconv_mon.LIBCMT ref: 6CE65CA0
        • ___free_lconv_num.LIBCMT ref: 6CE65CC1
          • Part of subcall function 6CE6037B: ___sbh_find_block.LIBCMT ref: 6CE603A4
          • Part of subcall function 6CE6037B: HeapFree.KERNEL32(00000000,6CE57D8D,6CE6B418,0000000C,6CE64A00,00000000,6CE6B5E8,0000000C,6CE64A3F,6CE57D8D,00066BCC,?,6CE6186F,00000004,6CE6B500,0000000C), ref: 6CE603E3
          • Part of subcall function 6CE6037B: GetLastError.KERNEL32(?,6CE6186F,00000004,6CE6B500,0000000C,6CE681A1,6CE57D8D,00066BDB,00000000,00000000,00000000,?,6CE6143E,00000001,00000214), ref: 6CE603F4
        • ___free_lc_time.LIBCMT ref: 6CE65D46
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: ErrorFreeHeapLast___free_lc_time___free_lconv_mon___free_lconv_num___sbh_find_block
        • String ID: (l$hl
        • API String ID: 1256667415-216743782
        • Opcode ID: e1859346d89bd9cb8369a46fc312bd6d49318bc9d020833b08cfbd8bc02b2cb1
        • Instruction ID: c3e515d1169457afbeb53784ef59d6c98b297e9967eeb526986a1619c5d410eb
        • Opcode Fuzzy Hash: e1859346d89bd9cb8369a46fc312bd6d49318bc9d020833b08cfbd8bc02b2cb1
        • Instruction Fuzzy Hash: 8D3193322E67419FE7115F77D8C4B967BB6AB0031DF30092EE1159BF61CB30A844CA59
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: __wstrtime$_strrchr
        • String ID: GetSectionNamesFromInf() failed.$Invalid buffer.$IsSectionInInf$e:\bt\382730\setup\deliverables\dsetup\dsetup32\inline.h
        • API String ID: 4138713405-2443459792
        • Opcode ID: 83c34c61b82f9c8d5c5325f3c07ee9deff6f734579d89799730843dcf9febbe6
        • Instruction ID: d283956d29b8bcf3c03ac5f0fe3daea81f11f8a02c5101f64b8542f254601b4c
        • Opcode Fuzzy Hash: 83c34c61b82f9c8d5c5325f3c07ee9deff6f734579d89799730843dcf9febbe6
        • Instruction Fuzzy Hash: F5115BB1D88108FADB105E659CC2CEEB7BC9B0132CFF4081DF110B2A80E673AA794274
        APIs
        • _strnlen.LIBCMT ref: 6CE5DD66
        • _strnlen.LIBCMT ref: 6CE5DD7E
        • _strrchr.LIBCMT ref: 6CE5DD22
          • Part of subcall function 6CE566CC: CompareStringA.KERNEL32(00000409,00000001,6CE56892,000000FF,?,000000FF,?,6CE56723,00000001,inf,6CE56892,?,6CE567C5,6CE56892,6CE56892,?), ref: 6CE566E2
        Strings
        • dxxpdbg, xrefs: 6CE5DD2D
        • Changing source media for file %s\%s to %s\%s, xrefs: 6CE5DDA0
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: _strnlen$CompareString_strrchr
        • String ID: Changing source media for file %s\%s to %s\%s$dxxpdbg
        • API String ID: 895441675-2375301040
        • Opcode ID: 13c6cf9c9341332f3b8c3dba7e458c8a9faaa86b8206b050c647349de96e58b8
        • Instruction ID: 4326014a00c0d85dcabe78ae6528054b0560e024232f74646f05bd00511001a0
        • Opcode Fuzzy Hash: 13c6cf9c9341332f3b8c3dba7e458c8a9faaa86b8206b050c647349de96e58b8
        • Instruction Fuzzy Hash: 02115C76548201AEE7019A219D40EAB2778DB8236CFB40A6CD805D6B81EF37C534C730
        APIs
        • FreeLibrary.KERNEL32(?,?,00E762AB,00000000,00E76927,?,?,?,?,?,?,00000000,00000000,?), ref: 00E751B3
        • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,00000000,?), ref: 00E751BD
          • Part of subcall function 00E7390A: __wstrtime.LIBCMT ref: 00E7393B
          • Part of subcall function 00E7390A: __wstrtime.LIBCMT ref: 00E73944
          • Part of subcall function 00E7390A: _strrchr.LIBCMT ref: 00E7398A
        Strings
        • e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h, xrefs: 00E751D9
        • FreeLibrary(), xrefs: 00E751CA
        • CDllLoader::FreeLibrary, xrefs: 00E751CF
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: __wstrtime$ErrorFreeLastLibrary_strrchr
        • String ID: CDllLoader::FreeLibrary$FreeLibrary()$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
        • API String ID: 2808663981-1330908120
        • Opcode ID: d3f967c3df28c962d7587f4f1da9283f183576cfad0af8aa2e7ca4077fd03460
        • Instruction ID: 7584d3d28597c1b3449a9e0cbeb8efdb0fe1a795a659b7d9a19a8776dffd44d4
        • Opcode Fuzzy Hash: d3f967c3df28c962d7587f4f1da9283f183576cfad0af8aa2e7ca4077fd03460
        • Instruction Fuzzy Hash: 93E0D8727507121BE7606A7D7C0AF6225C89B40B57F549498B84CF20C0E9D0C9414150
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: _memset$__fileno__locking_memcpy_s
        • String ID:
        • API String ID: 2792269882-0
        • Opcode ID: e5c4a98e0dd5c029622459a431dffb8e21ca16eeedef59267bf75a4a5bd1fa90
        • Instruction ID: 342520bd8082a27d843e3cbc41dbef6fa04e6661d4779c2df23a4f43cb5b2b82
        • Opcode Fuzzy Hash: e5c4a98e0dd5c029622459a431dffb8e21ca16eeedef59267bf75a4a5bd1fa90
        • Instruction Fuzzy Hash: 6C41E2319A1258EFCB10CFAAC84468EBBB4EF5132CF308559E824A3E90D7709A45CF54
        APIs
        • GetSystemTimeAsFileTime.KERNEL32(00000000), ref: 733F8A74
        • GetCurrentProcessId.KERNEL32 ref: 733F8A80
        • GetCurrentThreadId.KERNEL32 ref: 733F8A88
        • GetTickCount.KERNEL32 ref: 733F8A90
        • QueryPerformanceCounter.KERNEL32(?), ref: 733F8A9C
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
        • String ID:
        • API String ID: 1445889803-0
        • Opcode ID: 9bff3aa40ee3c47786f8216c64c364e575e47a01f3de05a037aa5f63e3d35004
        • Instruction ID: 4a53f71f938004c26db4ab84cc40e9d29b2c49b58a443d911e6a55a9a0ffbcec
        • Opcode Fuzzy Hash: 9bff3aa40ee3c47786f8216c64c364e575e47a01f3de05a037aa5f63e3d35004
        • Instruction Fuzzy Hash: 3F011273D001269BCB30AFBADA0879EB7F8FB48255FA60555D51AF7354DB349A408B80
        APIs
        • GetSystemTimeAsFileTime.KERNEL32(00000000), ref: 00E795C5
        • GetCurrentProcessId.KERNEL32 ref: 00E795D1
        • GetCurrentThreadId.KERNEL32 ref: 00E795D9
        • GetTickCount.KERNEL32 ref: 00E795E1
        • QueryPerformanceCounter.KERNEL32(?), ref: 00E795ED
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
        • String ID:
        • API String ID: 1445889803-0
        • Opcode ID: 7aa89562a39cbe46023109803fc8c1c5fe9209fe3f90f1f35e370655d34bedd4
        • Instruction ID: 7e4fd15825873eaed65f9038e904e41640015597fcb2a5415f0af07141f15449
        • Opcode Fuzzy Hash: 7aa89562a39cbe46023109803fc8c1c5fe9209fe3f90f1f35e370655d34bedd4
        • Instruction Fuzzy Hash: 53015272C002649FDB20DBF9E9486DAB7F4FF48355F960991D919FB110EA309948CB90
        APIs
        • GetSystemTimeAsFileTime.KERNEL32(00000000), ref: 6CE6224B
        • GetCurrentProcessId.KERNEL32 ref: 6CE62257
        • GetCurrentThreadId.KERNEL32 ref: 6CE6225F
        • GetTickCount.KERNEL32 ref: 6CE62267
        • QueryPerformanceCounter.KERNEL32(?), ref: 6CE62273
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
        • String ID:
        • API String ID: 1445889803-0
        • Opcode ID: 47e2ba4b606568bc7c0995fbb05428a8e4ea912fc5d1a573d947f5a38c5c199f
        • Instruction ID: 0761cdff85aae6855d94365024d25a896d50532216000e1d4564df6ac30caca8
        • Opcode Fuzzy Hash: 47e2ba4b606568bc7c0995fbb05428a8e4ea912fc5d1a573d947f5a38c5c199f
        • Instruction Fuzzy Hash: 9E011A7AE502289BCF109FFAC5486AEB7F8FB59355FA64951E811E7604DB309A40CB80
        APIs
        • GetDlgItem.USER32(?,00000BB9), ref: 00E752EC
        • SendMessageA.USER32(00000000,00000401,00000000,?), ref: 00E7530A
        • SendMessageA.USER32(00000000,00000402,00000000,00000000), ref: 00E75316
        • SendMessageA.USER32(00000000,00000404,00000001,00000000), ref: 00E75322
        • ShowWindow.USER32(00000000,00000001,?,00000BB9), ref: 00E75327
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: MessageSend$ItemShowWindow
        • String ID:
        • API String ID: 1207805008-0
        • Opcode ID: 3cf61237faa07b6901a8f0edfd9dfbccc4479f15c166425b8cdeb6fb44b5d08b
        • Instruction ID: 2a6b75663a829533043991b122bcc71a7c0fce17e7ad044872b62c323e040049
        • Opcode Fuzzy Hash: 3cf61237faa07b6901a8f0edfd9dfbccc4479f15c166425b8cdeb6fb44b5d08b
        • Instruction Fuzzy Hash: 60F039752803247AE620561A9C4AF6B3E29D7C2FA1F10405AFB08B90D1CAF56846E5A9
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: __itow
        • String ID: $#$.
        • API String ID: 3482036329-1065809056
        • Opcode ID: 56066d10032ee87c95818d6ca8ca6c169763495ceab291f839d46b669efebc59
        • Instruction ID: 730de3823f0adedcfea00f770093311d9468b98f7b8faf55ae5a9aec2da6f58f
        • Opcode Fuzzy Hash: 56066d10032ee87c95818d6ca8ca6c169763495ceab291f839d46b669efebc59
        • Instruction Fuzzy Hash: 4521F2315042899FDB15DF6CDA06BEE7FE89F09304F280499EC88F7281D7719A16C7A5
        APIs
        • GetKeyboardType.USER32(00000000), ref: 733F4987
        • GetKeyboardType.USER32(00000001), ref: 733F4997
        Strings
        • distinction98 failed GetKeyboardType, xrefs: 733F498E
        • distinction98 failed generally, xrefs: 733F49AB
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: KeyboardType
        • String ID: distinction98 failed GetKeyboardType$distinction98 failed generally
        • API String ID: 1620330385-80016554
        • Opcode ID: dd9aacdad0ab36dc8b6ff3884f398ecd514cb20bdad86efbb3fcd2375e44bf10
        • Instruction ID: 3f25d50364c2ef84474b22996a11e65f02c33165f3c418d9444dcfd4878633c8
        • Opcode Fuzzy Hash: dd9aacdad0ab36dc8b6ff3884f398ecd514cb20bdad86efbb3fcd2375e44bf10
        • Instruction Fuzzy Hash: 5FE01263B2C1332AFB6561B97C04BAE05D98785121F990667E55BD6181E54098820791
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: String___crt$__freea_strnlen
        • String ID:
        • API String ID: 2812305112-0
        • Opcode ID: 59671bd831f43a202d392ec88ba530d76d51ae17330a1fe8f87361da667e65e6
        • Instruction ID: 6a5e1d85b3e0d727b6f688d17ba7ee861bf9489c6aea33aa6dc7f5886a6be293
        • Opcode Fuzzy Hash: 59671bd831f43a202d392ec88ba530d76d51ae17330a1fe8f87361da667e65e6
        • Instruction Fuzzy Hash: F8417971A08104AFEF146F64CC81DAE3BB6DF45324F24E069F45DBB251D6308E81D761
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: __locking$__fileno__lseeki64
        • String ID:
        • API String ID: 3501863086-0
        • Opcode ID: 97400eaf3d1901e0acd60e3ded08a5c647c1e61fdfe0f6fb822c31800f425ec6
        • Instruction ID: f890cd55741d47bc7fb4589110aee11ded8dde7ec97f675fb2b39ed2d9dfccfe
        • Opcode Fuzzy Hash: 97400eaf3d1901e0acd60e3ded08a5c647c1e61fdfe0f6fb822c31800f425ec6
        • Instruction Fuzzy Hash: B4411C715007009FC738AF29C84596677E8EF85378B14EAADE8BEB7290E734D9428B51
        APIs
        • _memset.LIBCMT ref: 733FE6B8
        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,?,?,00000000,?,?,?,?,?,?,?,?,00000000), ref: 733FE74B
        • GetLastError.KERNEL32 ref: 733FE769
        • _memset.LIBCMT ref: 733FE78B
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: _memset$ByteCharErrorLastMultiWide
        • String ID:
        • API String ID: 773584764-0
        • Opcode ID: 2db01cdd9cf1346fdaba78050051b8811c393412e9cd3ca92eb3bd51a89eff0e
        • Instruction ID: da3146eb5455693a46d1bd6d476973149783df764bda5957c120e648f9125caf
        • Opcode Fuzzy Hash: 2db01cdd9cf1346fdaba78050051b8811c393412e9cd3ca92eb3bd51a89eff0e
        • Instruction Fuzzy Hash: DE41167290024BAFDB319F58CD80B9E7B79EB41310BC90369F4275B1E0DB309D428BA1
        APIs
        • _memset.LIBCMT ref: 00E7F7B6
        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,?,?,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00E7F849
        • GetLastError.KERNEL32(?,?,00000000), ref: 00E7F867
        • _memset.LIBCMT ref: 00E7F889
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: _memset$ByteCharErrorLastMultiWide
        • String ID:
        • API String ID: 773584764-0
        • Opcode ID: 01c8d1593ccd7cf245c0cfb5a8d7f9ebb5b1cb0b7ca33d89334f4c40be010557
        • Instruction ID: 407c1295d3415a22c891b76b2c667601522ec50e51447bfc234c865fa228d6bf
        • Opcode Fuzzy Hash: 01c8d1593ccd7cf245c0cfb5a8d7f9ebb5b1cb0b7ca33d89334f4c40be010557
        • Instruction Fuzzy Hash: 0E411772910145AFDB28AF68D8C08AD3BB4EB41328B14E17AF42C7B191D7309D41D7A3
        APIs
        • _memset.LIBCMT ref: 6CE68552
        • WideCharToMultiByte.KERNEL32(680779C0,00000000,?,00000001,?,6CE562C9,00000000,?,?,?,?,?,6CE562C9,?,?,00000000), ref: 6CE685E5
        • GetLastError.KERNEL32 ref: 6CE68603
        • _memset.LIBCMT ref: 6CE68625
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: _memset$ByteCharErrorLastMultiWide
        • String ID:
        • API String ID: 773584764-0
        • Opcode ID: 7d3f4186fe60fd9db1f9b18cbe75284e36165ce2101fca7a9dbd07274d293d76
        • Instruction ID: 50c6332371497b0c819c6fce831b98963d6e42bd3c5aabe23107b1af63edd649
        • Opcode Fuzzy Hash: 7d3f4186fe60fd9db1f9b18cbe75284e36165ce2101fca7a9dbd07274d293d76
        • Instruction Fuzzy Hash: 1841D4729E0145AFCB309F5AC89089D7B74AB4332CB71426FE5219BF90DB318D458B66
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: __locking$__fileno__lseeki64
        • String ID:
        • API String ID: 3501863086-0
        • Opcode ID: 2f71666564d204ef73d222301f22cb37c2fde710a415ad268730ef45ee9f673c
        • Instruction ID: ff5ff4a0ead331c7b22c77c3399d57d9b791b9e46f9c5b440626d381272d1cfb
        • Opcode Fuzzy Hash: 2f71666564d204ef73d222301f22cb37c2fde710a415ad268730ef45ee9f673c
        • Instruction Fuzzy Hash: 6E41C075A007019FE7288F68C880B6A77F4EF41324B14C6BDE86A9B7E0E634E9018B44
        APIs
        • __mtinitlocknum.LIBCMT ref: 733FF48A
          • Part of subcall function 733FAD11: __FF_MSGBANNER.LIBCMT ref: 733FAD2D
        • ___crtInitCritSecAndSpinCount.LIBCMT ref: 733FF502
        • EnterCriticalSection.KERNEL32(00000115,734029D0,00000018,733FF9A1,00000109,00000000,00000000), ref: 733FF529
        • LeaveCriticalSection.KERNEL32(00000115), ref: 733FF536
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: CriticalSection$CountCritEnterInitLeaveSpin___crt__mtinitlocknum
        • String ID:
        • API String ID: 2663194512-0
        • Opcode ID: 9d8bbd54951fc560d83bfba9b9a143aaa19173ef8c06035992185e7d11fad8f4
        • Instruction ID: 4025af6822e4ca6cbc8b565350c6e0fab5443d6ad8e03412c6ea5c2b9f6d1d4b
        • Opcode Fuzzy Hash: 9d8bbd54951fc560d83bfba9b9a143aaa19173ef8c06035992185e7d11fad8f4
        • Instruction Fuzzy Hash: 1E416471E057078BE7359F79D948369BBFAAF01328FA8825DE96AAA1D0C77494418B00
        APIs
        • __mtinitlocknum.LIBCMT ref: 00E7FC4B
          • Part of subcall function 00E7DA99: __FF_MSGBANNER.LIBCMT ref: 00E7DAB5
        • ___crtInitCritSecAndSpinCount.LIBCMT ref: 00E7FCC3
        • EnterCriticalSection.KERNEL32(00000115,00E86428,00000018,00E80162,00000109,00000000,00000000), ref: 00E7FCEA
        • LeaveCriticalSection.KERNEL32(00000115), ref: 00E7FCF7
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: CriticalSection$CountCritEnterInitLeaveSpin___crt__mtinitlocknum
        • String ID:
        • API String ID: 2663194512-0
        • Opcode ID: 16760ab435aff70a006447108e3e4fa406d9ff96d084105361bf2998f9e4f1b6
        • Instruction ID: a6f4a53e4b007348ecc8781f9db632a6e14a3aeb6b0c1421c825a825d1317ebc
        • Opcode Fuzzy Hash: 16760ab435aff70a006447108e3e4fa406d9ff96d084105361bf2998f9e4f1b6
        • Instruction Fuzzy Hash: A34137319047068EDB34DFA8D8497ADBBE0AF01328F24E22DD66DBB1D1C7709945CB14
        APIs
        • __mtinitlocknum.LIBCMT ref: 6CE689DB
          • Part of subcall function 6CE6495C: __FF_MSGBANNER.LIBCMT ref: 6CE64978
        • ___crtInitCritSecAndSpinCount.LIBCMT ref: 6CE68A53
        • EnterCriticalSection.KERNEL32(00000115,6CE6B7A0,00000018,6CE68EF2,00000109,00000000,00000000), ref: 6CE68A7A
        • LeaveCriticalSection.KERNEL32(00000115), ref: 6CE68A87
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: CriticalSection$CountCritEnterInitLeaveSpin___crt__mtinitlocknum
        • String ID:
        • API String ID: 2663194512-0
        • Opcode ID: dccd5426b79152e1c3bccb29e469146ca10d2d2ee400b5f5a38d91fa65ecc063
        • Instruction ID: ac2e13e5b972e9a36c3daaca1cd36b1bdd3ff3ffa33bfbef24005316d24c983a
        • Opcode Fuzzy Hash: dccd5426b79152e1c3bccb29e469146ca10d2d2ee400b5f5a38d91fa65ecc063
        • Instruction Fuzzy Hash: 5A41F371AA43428ADB24CF6AC84878DBBF0AF0332CF38921ED565A7ED1C7749585CB15
        APIs
        • __getptd.LIBCMT ref: 733FD630
          • Part of subcall function 733F7CB1: __amsg_exit.LIBCMT ref: 733F7CC1
        • __amsg_exit.LIBCMT ref: 733FD650
        • InterlockedDecrement.KERNEL32(?), ref: 733FD67D
        • InterlockedIncrement.KERNEL32(01081238), ref: 733FD6A8
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd
        • String ID:
        • API String ID: 2662827482-0
        • Opcode ID: 1b4fe84244e89261d1935b9cece6aeda0b3ef1cd42904a0b0a84cac375084c3a
        • Instruction ID: d0ca4a4877d58e39b28393c014c66afeab6960d27ec6446dd715ae56042fd13b
        • Opcode Fuzzy Hash: 1b4fe84244e89261d1935b9cece6aeda0b3ef1cd42904a0b0a84cac375084c3a
        • Instruction Fuzzy Hash: 4A016D33E00B23ABEB35BB66990874D77B4AB00755FE60145E81AA7684CB246843DFD5
        APIs
        • __getptd.LIBCMT ref: 00E7BCD1
          • Part of subcall function 00E78F41: __amsg_exit.LIBCMT ref: 00E78F51
        • __amsg_exit.LIBCMT ref: 00E7BCF1
        • InterlockedDecrement.KERNEL32(?), ref: 00E7BD1E
        • InterlockedIncrement.KERNEL32(00FA1238), ref: 00E7BD49
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd
        • String ID:
        • API String ID: 2662827482-0
        • Opcode ID: b8d581198afcdfe6f4433f35cf0ed6919c0ef8ce6632850c1d0bd51a31988d04
        • Instruction ID: edf41cff972208f870d028a3170ee12864d44cba97a60507473f54319ea341c7
        • Opcode Fuzzy Hash: b8d581198afcdfe6f4433f35cf0ed6919c0ef8ce6632850c1d0bd51a31988d04
        • Instruction Fuzzy Hash: 2E01A132902B129FC735AF268906B6D73A0AB40724F45A155EC1C77291CF30AD41CBD6
        APIs
        • __getptd.LIBCMT ref: 6CE657C8
          • Part of subcall function 6CE61488: __amsg_exit.LIBCMT ref: 6CE61498
        • __amsg_exit.LIBCMT ref: 6CE657E8
        • InterlockedDecrement.KERNEL32(?), ref: 6CE65815
        • InterlockedIncrement.KERNEL32(02B41238), ref: 6CE65840
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd
        • String ID:
        • API String ID: 2662827482-0
        • Opcode ID: afa6b8283281e80385b2d1f87fbf366c03d6fffd9d2364562d1c594edc6336bc
        • Instruction ID: 8c4bac4bb12add49f922ccc28410bf5fea479122708a1e5cbdab7d5a0d20df62
        • Opcode Fuzzy Hash: afa6b8283281e80385b2d1f87fbf366c03d6fffd9d2364562d1c594edc6336bc
        • Instruction Fuzzy Hash: 6B01A135BA2712DBDB01DB6785047AE7B70AF0572CF300119D810A7F81C724AA41CBD5
        APIs
        • GetLastError.KERNEL32(00000000,?,733F9C8A,733F7462,e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c,00000000,?,GetRegistryDXVersion,e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c,00000000), ref: 733F7C34
        • ___set_flsgetvalue.LIBCMT ref: 733F7C3C
          • Part of subcall function 733F7B06: TlsGetValue.KERNEL32(733F7C41), ref: 733F7B0C
          • Part of subcall function 733F7B06: TlsSetValue.KERNEL32(00000000), ref: 733F7B29
        • TlsGetValue.KERNEL32 ref: 733F7C4D
        • SetLastError.KERNEL32(00000000), ref: 733F7CA1
          • Part of subcall function 733FDAC2: __calloc_impl.LIBCMT ref: 733FDAD3
          • Part of subcall function 733FDAC2: Sleep.KERNEL32(00000000,?,00000000,00000000,?,733F7C67,00000001,00000214), ref: 733FDAEA
          • Part of subcall function 733F7A8D: TlsGetValue.KERNEL32(?,?,733F7B21), ref: 733F7A9F
          • Part of subcall function 733F7A8D: TlsGetValue.KERNEL32(00000006,?,733F7B21), ref: 733F7AB6
          • Part of subcall function 733F7B77: GetModuleHandleA.KERNEL32(KERNEL32.DLL,73402740,0000000C,733F7C90,00000000,00000000), ref: 733F7B88
          • Part of subcall function 733F7B77: GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 733F7BB1
          • Part of subcall function 733F7B77: GetProcAddress.KERNEL32(?,DecodePointer), ref: 733F7BC1
          • Part of subcall function 733F7B77: InterlockedIncrement.KERNEL32(734047D8), ref: 733F7BE3
          • Part of subcall function 733F7B77: ___addlocaleref.LIBCMT ref: 733F7C0A
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: Value$AddressErrorLastProc$HandleIncrementInterlockedModuleSleep___addlocaleref___set_flsgetvalue__calloc_impl
        • String ID:
        • API String ID: 2909133767-0
        • Opcode ID: e47d8c0f27302ae31ced3b384a2842b06265955fff8202b904b3311e585d70c1
        • Instruction ID: 0752c852c1f1e94b58da0aa89110c8e98c44872a716600302b7402a5641206c3
        • Opcode Fuzzy Hash: e47d8c0f27302ae31ced3b384a2842b06265955fff8202b904b3311e585d70c1
        • Instruction Fuzzy Hash: 8EF02833A017236BE7363677AE08F5A3AA9DF407F3BA50224F419F22D0DE14C80246D4
        APIs
        • GetLastError.KERNEL32(?,?,00E78F49,?,00E779B9,?,?,00E7988D,?,?,?,00000000), ref: 00E78EC4
        • ___set_flsgetvalue.LIBCMT ref: 00E78ECC
          • Part of subcall function 00E78D96: TlsGetValue.KERNEL32(00E78ED1,?,00E7988D,?,?,?,00000000), ref: 00E78D9C
          • Part of subcall function 00E78D96: TlsSetValue.KERNEL32(00000000,00E7988D,?,?,?,00000000), ref: 00E78DB9
        • TlsGetValue.KERNEL32(?,00E7988D,?,?,?,00000000), ref: 00E78EDD
        • SetLastError.KERNEL32(00000000,?,00E7988D,?,?,?,00000000), ref: 00E78F31
          • Part of subcall function 00E7E453: __calloc_impl.LIBCMT ref: 00E7E464
          • Part of subcall function 00E7E453: Sleep.KERNEL32(00000000,?,?,00000000), ref: 00E7E47B
          • Part of subcall function 00E78D1D: TlsGetValue.KERNEL32(?,?,00E78DB1,?,00E7988D,?,?,?,00000000), ref: 00E78D2F
          • Part of subcall function 00E78D1D: TlsGetValue.KERNEL32(00000005,?,00E78DB1,?,00E7988D,?,?,?,00000000), ref: 00E78D46
          • Part of subcall function 00E78E07: GetModuleHandleA.KERNEL32(KERNEL32.DLL,00E86140,0000000C,00E78F20,00000000,00000000,?,00E7988D,?,?,?,00000000), ref: 00E78E18
          • Part of subcall function 00E78E07: GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 00E78E41
          • Part of subcall function 00E78E07: GetProcAddress.KERNEL32(?,DecodePointer), ref: 00E78E51
          • Part of subcall function 00E78E07: InterlockedIncrement.KERNEL32(00E885D0), ref: 00E78E73
          • Part of subcall function 00E78E07: ___addlocaleref.LIBCMT ref: 00E78E9A
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: Value$AddressErrorLastProc$HandleIncrementInterlockedModuleSleep___addlocaleref___set_flsgetvalue__calloc_impl
        • String ID:
        • API String ID: 2909133767-0
        • Opcode ID: c0b2cafa45a232e0ff0ded2ac320f0ec5a85aa7f6a460b08cd838f2840d95446
        • Instruction ID: f1d607a8b082fd77b45f24391fe5ed7da46468859ff6ebcb1b8de46dc7b0ab65
        • Opcode Fuzzy Hash: c0b2cafa45a232e0ff0ded2ac320f0ec5a85aa7f6a460b08cd838f2840d95446
        • Instruction Fuzzy Hash: 61F0F4326467215EC3362765BD0EA6A3A95DFA0BB1B159125FA2CB61A1CF118C4147D0
        APIs
        • GetLastError.KERNEL32(00066BDB,6CE57D8D,6CE633DE,6CE64192,?,?,6CE5FCAF,6CE57D8D,?,?,6CE5770E,00066BDC,?,?,00000000), ref: 6CE6140B
        • ___set_flsgetvalue.LIBCMT ref: 6CE61413
          • Part of subcall function 6CE612DD: TlsGetValue.KERNEL32(6CE61418,?,?,6CE5FCAF,6CE57D8D,?,?,6CE5770E,00066BDC,?,?,00000000,?,?,6CE577A6,SETUP_AGREEMENT_ENG), ref: 6CE612E3
          • Part of subcall function 6CE612DD: TlsSetValue.KERNEL32(00000000,?,6CE5FCAF,6CE57D8D,?,?,6CE5770E,00066BDC,?,?,00000000,?,?,6CE577A6,SETUP_AGREEMENT_ENG,000012F1), ref: 6CE61300
        • TlsGetValue.KERNEL32(?,?,6CE5FCAF,6CE57D8D,?,?,6CE5770E,00066BDC,?,?,00000000,?,?,6CE577A6,SETUP_AGREEMENT_ENG,000012F1), ref: 6CE61424
        • SetLastError.KERNEL32(00000000,?,?,6CE5FCAF,6CE57D8D,?,?,6CE5770E,00066BDC,?,?,00000000,?,?,6CE577A6,SETUP_AGREEMENT_ENG), ref: 6CE61478
          • Part of subcall function 6CE6818B: __calloc_impl.LIBCMT ref: 6CE6819C
          • Part of subcall function 6CE6818B: Sleep.KERNEL32(00000000,00066BDB,6CE57D8D), ref: 6CE681B3
          • Part of subcall function 6CE61264: TlsGetValue.KERNEL32(6CE57D8D,?,6CE641C6,?,6CE6418C,6CE57D8D,?,?,6CE5FCAF,6CE57D8D,?,?,6CE5770E,00066BDC), ref: 6CE61276
          • Part of subcall function 6CE61264: TlsGetValue.KERNEL32(00000007,?,6CE641C6,?,6CE6418C,6CE57D8D,?,?,6CE5FCAF,6CE57D8D,?,?,6CE5770E,00066BDC), ref: 6CE6128D
          • Part of subcall function 6CE6134E: GetModuleHandleA.KERNEL32(KERNEL32.DLL,6CE6B4B8,0000000C,6CE61467,00000000,00000000,?,?,6CE5FCAF,6CE57D8D,?,?,6CE5770E,00066BDC), ref: 6CE6135F
          • Part of subcall function 6CE6134E: GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 6CE61388
          • Part of subcall function 6CE6134E: GetProcAddress.KERNEL32(?,DecodePointer), ref: 6CE61398
          • Part of subcall function 6CE6134E: InterlockedIncrement.KERNEL32(6CE6D950), ref: 6CE613BA
          • Part of subcall function 6CE6134E: ___addlocaleref.LIBCMT ref: 6CE613E1
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: Value$AddressErrorLastProc$HandleIncrementInterlockedModuleSleep___addlocaleref___set_flsgetvalue__calloc_impl
        • String ID:
        • API String ID: 2909133767-0
        • Opcode ID: 5d1136b875f9f1f3b34ab8daa6a66a37cb14dbb2f4db35b915605a34341828ab
        • Instruction ID: 659974948b08a65425d3fecc9bef1caa16cc2f6cd09bf15c39a18d76f3b73174
        • Opcode Fuzzy Hash: 5d1136b875f9f1f3b34ab8daa6a66a37cb14dbb2f4db35b915605a34341828ab
        • Instruction Fuzzy Hash: 6DF0F4326A566167DA272BF79C08AEA3B70DF42679B754219E511D3ED0CF11CC0256C0
        APIs
        • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 733F3D38
        • TranslateMessage.USER32(?), ref: 733F3D46
        • DispatchMessageA.USER32(?), ref: 733F3D50
        • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 733F3D5E
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: Message$DispatchPeekTranslate
        • String ID:
        • API String ID: 4217535847-0
        • Opcode ID: d3284b2251cb81fd84aad8f33c01f7c32ffd8435ef429c9a9799b32ffdded531
        • Instruction ID: 9935a9e837a3dc051ade8a34a6aeab3b36c208a532e3ab42d1dbde38d829a7e2
        • Opcode Fuzzy Hash: d3284b2251cb81fd84aad8f33c01f7c32ffd8435ef429c9a9799b32ffdded531
        • Instruction Fuzzy Hash: EBF01C73D0112B678B30BAE79C4CEDB7FBCDE866A07944121B50AD2104E629D106C7B0
        APIs
        • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 6CE59D48
        • TranslateMessage.USER32(?), ref: 6CE59D56
        • DispatchMessageA.USER32(?), ref: 6CE59D60
        • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 6CE59D6E
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: Message$DispatchPeekTranslate
        • String ID:
        • API String ID: 4217535847-0
        • Opcode ID: 94cef47cf48f02d4f37e7b86bff21e39989106b7722e87b2287c4790fa06a0c1
        • Instruction ID: f484509a552220c773a6aaaadce1bc00437da8d50fb205c2231705d644bf9422
        • Opcode Fuzzy Hash: 94cef47cf48f02d4f37e7b86bff21e39989106b7722e87b2287c4790fa06a0c1
        • Instruction Fuzzy Hash: C0F01CB6A0212AB78F20AAE78C0CCCBBFBCDE872A57904521B519D2504E666D117C7B0
        APIs
        • GetLastError.KERNEL32 ref: 6CE5E32A
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563C2
          • Part of subcall function 6CE56391: __wstrtime.LIBCMT ref: 6CE563CB
          • Part of subcall function 6CE56391: _strrchr.LIBCMT ref: 6CE56411
        Strings
        • SPFILENOTIFY_DELETEERROR: %s, error = %d., xrefs: 6CE5E34D
        • e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp, xrefs: 6CE5E360
        • CabCallback, xrefs: 6CE5E356
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: __wstrtime$ErrorLast_strrchr
        • String ID: CabCallback$SPFILENOTIFY_DELETEERROR: %s, error = %d.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
        • API String ID: 205445871-2425475416
        • Opcode ID: 0a6f4d4b9b94870fb24a527d71872fea7117776dc18c5cbe511f266317c9c7c8
        • Instruction ID: 8858616d9e8212251838081354b1c10e31c3a0b3f2ea227225c55e505c3e1e8c
        • Opcode Fuzzy Hash: 0a6f4d4b9b94870fb24a527d71872fea7117776dc18c5cbe511f266317c9c7c8
        • Instruction Fuzzy Hash: 9EE0D83E344106A9E610C5559E42FEA33309B5770DFF00956E103E8ACADAD781718111
        APIs
        • LeaveCriticalSection.KERNEL32(-00000020,`"?s,733F7572,00000000,733F7561,734051A8,733F2260,00000000,e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c), ref: 733FC2DB
          • Part of subcall function 733FACF5: LeaveCriticalSection.KERNEL32(?,733FB6EE,00000004,733FB6DE,73402808,0000000C,733FB753,00000000,00000001,00000000,00000000,?,733FAD5E,00000018,734027E8,0000000C), ref: 733FAD04
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: CriticalLeaveSection
        • String ID: ^@s$`"?s$E@s
        • API String ID: 3988221542-3820915204
        • Opcode ID: 605a7278440af4878f5c4c6cef129a38140650cf46359f8bfdf892485f3930fb
        • Instruction ID: 8a6870bd603b388d4580074cd843321b60572332163669b971f0b2c9534e15e7
        • Opcode Fuzzy Hash: 605a7278440af4878f5c4c6cef129a38140650cf46359f8bfdf892485f3930fb
        • Instruction Fuzzy Hash: EBD02E3BB8030B67EF3C04FABC4AB0A371CE1848603E9081AF94DC2388ED26F080050C
        APIs
        • InterlockedDecrement.KERNEL32(?), ref: 733F7D8A
        • ___removelocaleref.LIBCMT ref: 733F7DC6
          • Part of subcall function 733F6F02: ___sbh_find_block.LIBCMT ref: 733F6F2B
          • Part of subcall function 733F6F02: HeapFree.KERNEL32(00000000,00000000,734026A0,0000000C,733FADB5,00000000,734027E8,0000000C,733FADF4,00000000,-0000000F,?,733F8098,00000004,73402788,0000000C), ref: 733F6F6A
          • Part of subcall function 733F6F02: GetLastError.KERNEL32(?,733F8098,00000004,73402788,0000000C,733FDAD8,00000000,00000000,00000000,00000000,00000000,?,733F7C67,00000001,00000214), ref: 733F6F7B
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: DecrementErrorFreeHeapInterlockedLast___removelocaleref___sbh_find_block
        • String ID: @@s
        • API String ID: 1099687001-3365507681
        • Opcode ID: 2affd70087298da7adec0a19da93fd0e6daa42bfbde2693393a525b84d7e3016
        • Instruction ID: 5f30eb0aedc4bf447166b7521954f8c5c51e82c54429bea2e6867a85623cd0e3
        • Opcode Fuzzy Hash: 2affd70087298da7adec0a19da93fd0e6daa42bfbde2693393a525b84d7e3016
        • Instruction Fuzzy Hash: 3C317072B04B036BE6349B79AE45F2A73F86F04792BE44A0DF447D76D0DE34E4429628
        APIs
          • Part of subcall function 6CE6066E: __getptd.LIBCMT ref: 6CE60681
        • __isleadbyte_l.LIBCMT ref: 6CE67A03
        • ___crtLCMapStringA.LIBCMT ref: 6CE67A50
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: String___crt__getptd__isleadbyte_l
        • String ID: V<l
        • API String ID: 4030240610-1521814027
        • Opcode ID: 7ae7c3d9a27ed50ae935aed60504f148e3926959a4f646f464362ce4ce06f274
        • Instruction ID: 80fe1e37a29e45a73cb6f28aaa8bd16bb78752479bb76f36c072634cd71e4f63
        • Opcode Fuzzy Hash: 7ae7c3d9a27ed50ae935aed60504f148e3926959a4f646f464362ce4ce06f274
        • Instruction Fuzzy Hash: E331E931968289AFDF01CBA6C845FEE7FB49F0231CF244099E565DBA82D730C646CB91
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: __fltout2
        • String ID: -
        • API String ID: 3994888974-2547889144
        • Opcode ID: 77587bfb17b9f180caadf19170b8ef646af851668f11b20b81dc000aeff2a4d7
        • Instruction ID: c2c8cc9022514739bab4e15569c8f79f73da9afebf81c6212cc80a939bb3e2fc
        • Opcode Fuzzy Hash: 77587bfb17b9f180caadf19170b8ef646af851668f11b20b81dc000aeff2a4d7
        • Instruction Fuzzy Hash: 6B21D672A00119AFCF18BF78CC818EF7B69EB48720704952DF42EF3190DA31DA148761
        APIs
        • ___initmbctable.LIBCMT ref: 733F8719
          • Part of subcall function 733FDA9F: __setmbcp.LIBCMT ref: 733FDAAA
        • GetModuleFileNameA.KERNEL32(00000000,C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe,00000104,?,?,?,733F687F), ref: 733F8730
        Strings
        • C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe, xrefs: 733F8723, 733F8728
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: FileModuleName___initmbctable__setmbcp
        • String ID: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
        • API String ID: 2741541922-2796865217
        • Opcode ID: eae6a54c6135f71458fdf3be3bce78f700c6cc8eb30e69bfe237c512547dece7
        • Instruction ID: b044f97abcb068103e2994c7753b4a1a4431768d8ea6ff9ae371b8f6ff1de904
        • Opcode Fuzzy Hash: eae6a54c6135f71458fdf3be3bce78f700c6cc8eb30e69bfe237c512547dece7
        • Instruction Fuzzy Hash: 5D21EB72E0015ABFCB25DB798D80B8E7BBAEB443687A006E9F519F7284D3305D05CB50
        APIs
        • ___initmbctable.LIBCMT ref: 00E7887E
          • Part of subcall function 00E7C140: __setmbcp.LIBCMT ref: 00E7C14B
        • GetModuleFileNameA.KERNEL32(00000000,C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe,00000104), ref: 00E78895
        Strings
        • C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe, xrefs: 00E78888, 00E7888D
        Memory Dump Source
        • Source File: 00000013.00000002.4384897272.0000000000E71000.00000020.00000001.01000000.00000014.sdmp, Offset: 00E70000, based on PE: true
        • Associated: 00000013.00000002.4384822002.0000000000E70000.00000002.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4384971350.0000000000E88000.00000004.00000001.01000000.00000014.sdmpDownload File
        • Associated: 00000013.00000002.4385041714.0000000000E8C000.00000002.00000001.01000000.00000014.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_e70000_DXSETUP.jbxd
        Similarity
        • API ID: FileModuleName___initmbctable__setmbcp
        • String ID: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
        • API String ID: 2741541922-2796865217
        • Opcode ID: 58ff22bdfa602afe62280857dccce5cdbf15e01d3c19149f11eddf3bcd276cc5
        • Instruction ID: 80daf87f72e5eaef7aa4098367078e092863cfa77d5ad62fb77cbdf8edc85a66
        • Opcode Fuzzy Hash: 58ff22bdfa602afe62280857dccce5cdbf15e01d3c19149f11eddf3bcd276cc5
        • Instruction Fuzzy Hash: 84210531D00118AFDB10DFA69D848AE7BB9EB90338B5452A5E62CF3252DA305E44C751
        APIs
        • ___initmbctable.LIBCMT ref: 6CE61EF0
          • Part of subcall function 6CE65C37: __setmbcp.LIBCMT ref: 6CE65C42
        • GetModuleFileNameA.KERNEL32(00000000,C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe,00000104,?,?,?,6CE5F326), ref: 6CE61F07
        Strings
        • C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe, xrefs: 6CE61EFA, 6CE61EFF
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: FileModuleName___initmbctable__setmbcp
        • String ID: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
        • API String ID: 2741541922-2796865217
        • Opcode ID: 920d13bcc08842ab237b728baaa38290ba1981f4c9e43a5ed8ac40bc8c69f56d
        • Instruction ID: d0a262544c95f81a2ef0e8feec958e7f8f0d841ef9db8ccd178e623327ddc014
        • Opcode Fuzzy Hash: 920d13bcc08842ab237b728baaa38290ba1981f4c9e43a5ed8ac40bc8c69f56d
        • Instruction Fuzzy Hash: F121C671E51158AFCB11DAA7CC818DE7BB8EF413787340669E524E3A81D3309A45CB91
        APIs
        • GetUserDefaultUILanguage.KERNEL32(?,00000004,ENG,?,?,?,6CE57E1D,?), ref: 6CE57957
        • GetSystemDefaultUILanguage.KERNEL32(?,00000000,?,?,?,6CE57E1D,?), ref: 6CE579A2
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: DefaultLanguage$SystemUser
        • String ID: ENG
        • API String ID: 384301227-257040513
        • Opcode ID: f0548d2baebac3d35ce13e5d30b1cdabb1381896ffd7feb00f1fc43e7dd07f42
        • Instruction ID: e8a4124c11663d47c610528204a9d63cfb6cc0ee90732e6c09f23ff986901aef
        • Opcode Fuzzy Hash: f0548d2baebac3d35ce13e5d30b1cdabb1381896ffd7feb00f1fc43e7dd07f42
        • Instruction Fuzzy Hash: 0D115CA3A311146BDB865F21CC01A5E7A7BEB80718BB2D029E241CB640E673C6729151
        APIs
        • DeleteCriticalSection.KERNEL32(0000000C,00000000,?,733F68D9), ref: 733F83E0
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: CriticalDeleteSection
        • String ID: `n@s$`o@s
        • API String ID: 166494926-3274682572
        • Opcode ID: d7006eb89577e313b3d89128dac6d42d8e4540eda34a45284f0ce516daf7c941
        • Instruction ID: 21fc307c5de846a7cfc566657c764d59b73cda0139030066017e04c0d20f33a4
        • Opcode Fuzzy Hash: d7006eb89577e313b3d89128dac6d42d8e4540eda34a45284f0ce516daf7c941
        • Instruction Fuzzy Hash: 52F0EC3BA00117A7D3384A19D440745F7E9EF84370FB6442BD95EA7160EB38E84587D4
        APIs
        • _strrchr.LIBCMT ref: 6CE58306
          • Part of subcall function 6CE566CC: CompareStringA.KERNEL32(00000409,00000001,6CE56892,000000FF,?,000000FF,?,6CE56723,00000001,inf,6CE56892,?,6CE567C5,6CE56892,6CE56892,?), ref: 6CE566E2
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.4387158669.000000006CE51000.00000020.00000001.01000000.00000016.sdmp, Offset: 6CE50000, based on PE: true
        • Associated: 00000013.00000002.4386993597.000000006CE50000.00000002.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387242144.000000006CE6D000.00000004.00000001.01000000.00000016.sdmpDownload File
        • Associated: 00000013.00000002.4387282662.000000006CE71000.00000002.00000001.01000000.00000016.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_6ce50000_DXSETUP.jbxd
        Similarity
        • API ID: CompareString_strrchr
        • String ID: ini$png
        • API String ID: 987711976-1989627829
        • Opcode ID: acf957a8da29fd14a8d8a0c813e7f4ec27fc8a126122de8c7be3161e25785d3d
        • Instruction ID: 74e1d341ba7c0962caf26fdc38e794fa54dd73a948c5b1eb03846cd5ff1de2bf
        • Opcode Fuzzy Hash: acf957a8da29fd14a8d8a0c813e7f4ec27fc8a126122de8c7be3161e25785d3d
        • Instruction Fuzzy Hash: 87E026321D825376621016B25C00DC72ABCCF127ECFF00436AA04D1E80EF13C535C0A4
        Strings
        • DirectXSetupIsJapanNec == 1, xrefs: 733F5DA9
        • DirectXSetupIsJapanNec == 0, xrefs: 733F5DB8
        Memory Dump Source
        • Source File: 00000013.00000002.4387601363.00000000733F1000.00000020.00000001.01000000.00000015.sdmp, Offset: 733F0000, based on PE: true
        • Associated: 00000013.00000002.4387530441.00000000733F0000.00000002.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387726530.0000000073404000.00000004.00000001.01000000.00000015.sdmpDownload File
        • Associated: 00000013.00000002.4387794457.0000000073407000.00000002.00000001.01000000.00000015.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_733f0000_DXSETUP.jbxd
        Similarity
        • API ID: KeyboardType
        • String ID: DirectXSetupIsJapanNec == 0$DirectXSetupIsJapanNec == 1
        • API String ID: 1620330385-1182196344
        • Opcode ID: 64b24ba0783f2768c495f0be8d5bfdbf66d0b2fd7c0e60566491d1a78ffed35d
        • Instruction ID: 15753e063ab0f0442cf365e3c0905798408309ef39585ac3b333a6a425acbeda
        • Opcode Fuzzy Hash: 64b24ba0783f2768c495f0be8d5bfdbf66d0b2fd7c0e60566491d1a78ffed35d
        • Instruction Fuzzy Hash: 72C01292B97313ABBB3061F41F01BAA208A8D800833E91836BCA3C0281EF10C00266A1
        APIs
        • KiUserExceptionDispatcher.NTDLL ref: 06AA392D
        Memory Dump Source
        • Source File: 0000001F.00000003.4432319571.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_31_3_6aa0000_rundll32.jbxd
        Similarity
        • API ID: DispatcherExceptionUser
        • String ID:
        • API String ID: 6842923-0
        • Opcode ID: 8e3abe41a14ba80bb295a99466560193958039185c5b8c3bccc1b80a598dca6d
        • Instruction ID: 0fe053e154b8b4128fb8677ce7042c02aeaaa7ec2066bd279ae397b1b3bc4c75
        • Opcode Fuzzy Hash: 8e3abe41a14ba80bb295a99466560193958039185c5b8c3bccc1b80a598dca6d
        • Instruction Fuzzy Hash: CFE0DF762122046FD705ABB5E90C96B3BAEEFDC226715002BFB06CB200EA348C038B54
        APIs
        • KiUserExceptionDispatcher.NTDLL ref: 06AA392D
        Memory Dump Source
        • Source File: 0000001F.00000003.4432319571.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_31_3_6aa0000_rundll32.jbxd
        Similarity
        • API ID: DispatcherExceptionUser
        • String ID:
        • API String ID: 6842923-0
        • Opcode ID: efd5efc9b20438290febda82138fbab9c41c27079a67f128f86cd1f14c3fee82
        • Instruction ID: 7ea844ec2be0f5fb5f899a0eae80b4b0ff898e485cc4e8778c2ca96698a6f6ca
        • Opcode Fuzzy Hash: efd5efc9b20438290febda82138fbab9c41c27079a67f128f86cd1f14c3fee82
        • Instruction Fuzzy Hash: 58E08C762122046B87046BB6E80D82B7BAEEACC221310412AFA07C7200D9309C028AA4
        Memory Dump Source
        • Source File: 0000001F.00000002.4437150149.0000000002CFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CFD000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_31_2_2cfd000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: f1d424d8a2c14d7a1514da1d35c7798d882d9ad3489a9e1c4eb5b6fc301694f5
        • Instruction ID: 485cea68d72b2b32b3fd27bf5563d21144b69a2f99118fcd35442507ffb6f275
        • Opcode Fuzzy Hash: f1d424d8a2c14d7a1514da1d35c7798d882d9ad3489a9e1c4eb5b6fc301694f5
        • Instruction Fuzzy Hash: E9212571504244DFDB85DF14D9C0F2ABF65FB88314F20C56ADA0A4F25AC33AD456CBA2
        Memory Dump Source
        • Source File: 0000001F.00000002.4437150149.0000000002CFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CFD000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_31_2_2cfd000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a996b1983543c5beebe690202e7c9c6d8fa4abb51b24ded49f3361ae76a63bf0
        • Instruction ID: c8fe038e2003df766b2cd47d29a89f9bd516bb01f7edcedf27788b4a055a9b3e
        • Opcode Fuzzy Hash: a996b1983543c5beebe690202e7c9c6d8fa4abb51b24ded49f3361ae76a63bf0
        • Instruction Fuzzy Hash: 26110076404280CFCB46CF10D9C4B16BF72FB84324F24C6AAD9094F61AC33AD55ACBA2
        Memory Dump Source
        • Source File: 0000001F.00000002.4437150149.0000000002CFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CFD000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_31_2_2cfd000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: c0c4d6ab6919e2f5d6a23965c8166db203e5db3cf520d20e72b6170bc33573ba
        • Instruction ID: 22e0e34c20b3826d258c71d5d73623d0e79eae875e130dfa3618cb74fdc57a23
        • Opcode Fuzzy Hash: c0c4d6ab6919e2f5d6a23965c8166db203e5db3cf520d20e72b6170bc33573ba
        • Instruction Fuzzy Hash: B1014C7100E3C09FD7528B258894B52BFB4EF53224F1DC1DBD9888F2A7C2699949C7B2
        Memory Dump Source
        • Source File: 0000001F.00000002.4437150149.0000000002CFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CFD000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_31_2_2cfd000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: ea58525f5e8b721fa4cd1f83011d0f3925507f9532a039fa3ca51292927ed74c
        • Instruction ID: fc8d728d9eab6b0fd2d5ea38671c3e07df7f21d1f837dc2fde9b0f6977acc076
        • Opcode Fuzzy Hash: ea58525f5e8b721fa4cd1f83011d0f3925507f9532a039fa3ca51292927ed74c
        • Instruction Fuzzy Hash: 5B012B700043009EE7A08A26CDC4B67BF98EF82324F18C52AEE4A4B646C3799941C6F1
        Strings
        Memory Dump Source
        • Source File: 00000020.00000002.4618964183.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_32_2_1920000_InstallChainer.jbxd
        Similarity
        • API ID:
        • String ID: LR]q
        • API String ID: 0-3081347316
        • Opcode ID: 02c57ad899a812680fd8cf365cd7c020606026386b0dcd728a6f9aee9715390d
        • Instruction ID: b37ed703ec2b42154dc10b210049d0fe51ebdf09a3e285ece9ce08d5296c1cba
        • Opcode Fuzzy Hash: 02c57ad899a812680fd8cf365cd7c020606026386b0dcd728a6f9aee9715390d
        • Instruction Fuzzy Hash: E0D18E30A00226CFDB14DF68C854BAEBBB6FF89300F25C5A9E109AB265DB35DD45CB51
        Strings
        Memory Dump Source
        • Source File: 00000020.00000002.4618964183.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_32_2_1920000_InstallChainer.jbxd
        Similarity
        • API ID:
        • String ID: LR]q
        • API String ID: 0-3081347316
        • Opcode ID: c0e2f40a7b3c2c433f069989dd8ad71c09cb5bd2bd07b56df3679ef82ef0ad6a
        • Instruction ID: 546d92780bcfadb64947b0b74327f30d7a945da90584beafbfe6b38b5b4c7fb8
        • Opcode Fuzzy Hash: c0e2f40a7b3c2c433f069989dd8ad71c09cb5bd2bd07b56df3679ef82ef0ad6a
        • Instruction Fuzzy Hash: 81719A30A00226CFDB14DF68C944BAEB7B6BF89304F24C4A9D109AB269DB35DD95CB51
        Memory Dump Source
        • Source File: 00000020.00000002.4618964183.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_32_2_1920000_InstallChainer.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 38b8351687362d3ad4d085eaa105af3209ba2647f3fed18593850a00efceb8d2
        • Instruction ID: 7f424088c75fe2695dcc314db9666d48b2bb72cc632701b65afd82d97cec31d0
        • Opcode Fuzzy Hash: 38b8351687362d3ad4d085eaa105af3209ba2647f3fed18593850a00efceb8d2
        • Instruction Fuzzy Hash: E551E331A002568FCB14DB69C840AEDBBFAFF89310F19C0A9D04CAB265DB35ED56CB51
        Memory Dump Source
        • Source File: 00000020.00000002.4618964183.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_32_2_1920000_InstallChainer.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: f44a2420f93a23c284c554d8ed2fd9f291561f200a4e08ddaf8c877969553d09
        • Instruction ID: 143204ce639098ccc703e79c243c7cd48a2b1af751fbb0ebb90f1e3e43455d06
        • Opcode Fuzzy Hash: f44a2420f93a23c284c554d8ed2fd9f291561f200a4e08ddaf8c877969553d09
        • Instruction Fuzzy Hash: F63187B89002488FCB14DFA9C484B9EFBF5FF89310F108869E559AB354C738A845CFA5
        Memory Dump Source
        • Source File: 00000020.00000002.4618964183.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_32_2_1920000_InstallChainer.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 8e947df97e2f438786b20d6f64b031178cfbe641b41e43a93a4f6e758b1669b9
        • Instruction ID: e645fbf3b752d5c9e283d98fd6b8e33ee6cd4111ad7e2e5b9b6ea690c8422db6
        • Opcode Fuzzy Hash: 8e947df97e2f438786b20d6f64b031178cfbe641b41e43a93a4f6e758b1669b9
        • Instruction Fuzzy Hash: 7D11AF367002155F8729DB3D9894A6ABBFAEF85610314897AE44ECB24CEF34DC158792
        Memory Dump Source
        • Source File: 00000020.00000002.4618964183.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_32_2_1920000_InstallChainer.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 34fb5266de0dd933fc49a04c64bfe56435e2b16de611603fdefba82a8910f5d6
        • Instruction ID: 4321b978eb7f6f9dab0d5f00f54a6f4407dff492ef0f3c16eea3c90f7224ab54
        • Opcode Fuzzy Hash: 34fb5266de0dd933fc49a04c64bfe56435e2b16de611603fdefba82a8910f5d6
        • Instruction Fuzzy Hash: F721DD217043D25FC7179B7C98506A9BFF99F8712030445FAC4C9CB29ADA249817C752
        Memory Dump Source
        • Source File: 00000020.00000002.4618964183.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_32_2_1920000_InstallChainer.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 981811e85a1340344ad584f1db96c5bd11da6feaf02e7916f910d759b84cba52
        • Instruction ID: d3243c695062933a12449382f65ccd0c82b50cd1e81e44db88af8cef63a90698
        • Opcode Fuzzy Hash: 981811e85a1340344ad584f1db96c5bd11da6feaf02e7916f910d759b84cba52
        • Instruction Fuzzy Hash: E32143B5C002198FCB50CFA9D880AEEFBF4FF89310F14816AD808AB245C334A905CFA1
        Memory Dump Source
        • Source File: 00000020.00000002.4618964183.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_32_2_1920000_InstallChainer.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 9c9b7a20941cabf9b7472a8c22426e56e4a2779c7d7b3f15570433a8e1ba77e1
        • Instruction ID: bcc13800067e6666da13c5fa5865e3369cefbeefbd9b7f09f7731dec3824a02f
        • Opcode Fuzzy Hash: 9c9b7a20941cabf9b7472a8c22426e56e4a2779c7d7b3f15570433a8e1ba77e1
        • Instruction Fuzzy Hash: 952134B5C002198FCB10DF99D884ADEFBF5FF88314F14816AE908BB249D734A944CBA4
        Memory Dump Source
        • Source File: 00000020.00000002.4618964183.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_32_2_1920000_InstallChainer.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 29d40a55bcd4c0fffe244814eb800e19c69af21b6950942ddc0b13f04081e380
        • Instruction ID: 425750f8505fd0679216e3ec9407416bf89850dc2edcb09d5ee7cf1f5f136f59
        • Opcode Fuzzy Hash: 29d40a55bcd4c0fffe244814eb800e19c69af21b6950942ddc0b13f04081e380
        • Instruction Fuzzy Hash: 022112B5D042499FCB10DF9AC584ADEFBF4FB88324F10842AE918A7300C378A955CFA5
        Memory Dump Source
        • Source File: 00000020.00000002.4618964183.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_32_2_1920000_InstallChainer.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 6cc378916c0da70600186f3bdea79a12e8fa96a5c06eaf053be05a8789898345
        • Instruction ID: 58bc2fd47cf9b71a2a575a9a3ed18f99bbbdd1f84ef0047426cb43cc72077375
        • Opcode Fuzzy Hash: 6cc378916c0da70600186f3bdea79a12e8fa96a5c06eaf053be05a8789898345
        • Instruction Fuzzy Hash: 7621E0B5D002598FCB20DF9AC484ADEFBF4FB88314F10852AE959A7200C379A945CFA5
        Memory Dump Source
        • Source File: 00000020.00000002.4618964183.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_32_2_1920000_InstallChainer.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 1661dcb8abe60644ba51d727ecb55eb55877b956994550a5d43f0e78505827bf
        • Instruction ID: 2747cb5fd218660bc5a82246ff0b95817490dba018b767bb8be51858adf7f128
        • Opcode Fuzzy Hash: 1661dcb8abe60644ba51d727ecb55eb55877b956994550a5d43f0e78505827bf
        • Instruction Fuzzy Hash: C91110B48002598FCB20DF9AC548BEEBBF8EB49314F20845AD959A7250C7396944CFA1
        Memory Dump Source
        • Source File: 00000020.00000002.4618964183.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_32_2_1920000_InstallChainer.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 1dcf5507e49e4adb5117ba91f3da27f4f9d29b13d6ba97cb04041700fb3bf8ba
        • Instruction ID: 38a695e33bc87f68996e201da304edaf752ddf8c91c0ad1fd8865851b0e330c0
        • Opcode Fuzzy Hash: 1dcf5507e49e4adb5117ba91f3da27f4f9d29b13d6ba97cb04041700fb3bf8ba
        • Instruction Fuzzy Hash: 5F1122B48006498FCB20DF9AC544BDEFBF4EB49310F208469D969A3200C338A940CFA1
        Strings
        Memory Dump Source
        • Source File: 00000021.00000003.4487981258.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_33_3_6910000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: $]q$$]q
        • API String ID: 0-127220927
        • Opcode ID: 4b897e97e91481250ea0aa8e533b5a5ca173a16e46f381153678c0e70b72a157
        • Instruction ID: 5736b54b9212610895522ab50d0cf05f1a1d7e5738ea41889f1035427579061a
        • Opcode Fuzzy Hash: 4b897e97e91481250ea0aa8e533b5a5ca173a16e46f381153678c0e70b72a157
        • Instruction Fuzzy Hash: A751F331B0020DAFCB55DF78C8409AEBBFABFC8250B24842BD519DB764DA318C06C791
        Strings
        Memory Dump Source
        • Source File: 00000021.00000003.4487981258.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_33_3_6910000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: (aq
        • API String ID: 0-600464949
        • Opcode ID: 31eb6f133c4ff6c58f994430cee68a41be90c1604580f472ba093d88aa764e7d
        • Instruction ID: 75624fd26e9521a8b4daa1005761f3c997420be061859c97aa92e87ee864b67a
        • Opcode Fuzzy Hash: 31eb6f133c4ff6c58f994430cee68a41be90c1604580f472ba093d88aa764e7d
        • Instruction Fuzzy Hash: 0B71C731F002189FDB48DBB5C8546AEB7ABAFC8300F248429E606DF7A4DE759D46C791
        Strings
        Memory Dump Source
        • Source File: 00000021.00000003.4487981258.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_33_3_6910000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: (aq
        • API String ID: 0-600464949
        • Opcode ID: da67dfc5812f1256aeb92e65912487ffaff70aba842f043c79fb8ed8cbf1af24
        • Instruction ID: 067527ade39d9dd143a66ff441deab356dece63ec0dcdf85a4f7472fe4957f22
        • Opcode Fuzzy Hash: da67dfc5812f1256aeb92e65912487ffaff70aba842f043c79fb8ed8cbf1af24
        • Instruction Fuzzy Hash: E4410F31B001085BD798E76998607AF77AB9FC4311F20442EDA06EF780CE359D4687E1
        Strings
        Memory Dump Source
        • Source File: 00000021.00000003.4487981258.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_33_3_6910000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: (aq
        • API String ID: 0-600464949
        • Opcode ID: 1c7a8d36dd9c528f235340a67ecd6294d368c05bc751f9ae9ca80edf5fb10252
        • Instruction ID: ab5118e2c0de0faad81305a5660753074ada0fbf6e33e8e8c400b88fbfef944a
        • Opcode Fuzzy Hash: 1c7a8d36dd9c528f235340a67ecd6294d368c05bc751f9ae9ca80edf5fb10252
        • Instruction Fuzzy Hash: 9931F720B0934C6FD79A967558247BF3FB69BC6200F24849AD602EF782CE754C0983A2
        Memory Dump Source
        • Source File: 00000021.00000003.4487981258.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_33_3_6910000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 92a7771ba4e123853644606c91e2aa3fc503587f361fc0d17de7fa16675622ce
        • Instruction ID: 6dc12f39faa540591cc63f9ac028803ae83a38437b22103536704044eb40d63a
        • Opcode Fuzzy Hash: 92a7771ba4e123853644606c91e2aa3fc503587f361fc0d17de7fa16675622ce
        • Instruction Fuzzy Hash: F7616834B012158FC755EB28D89096EBBF9EF89300B3581A6E415CF7A2DB34DD86C791
        Memory Dump Source
        • Source File: 00000021.00000003.4487981258.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_33_3_6910000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: c72df8796d5c139c2142fb2dbf50a53f01d69563609a5669726e1c78b24dce10
        • Instruction ID: 8a3f60ab3f7de6d0defb71dc58534d8794d4935c57c95e9c448a31216a4cb0d0
        • Opcode Fuzzy Hash: c72df8796d5c139c2142fb2dbf50a53f01d69563609a5669726e1c78b24dce10
        • Instruction Fuzzy Hash: 61312C32F002185BDB64DA258C446FEBBEEDFC4650F24842EDA06DB754DA309D09C7A1
        Memory Dump Source
        • Source File: 00000021.00000003.4487981258.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_33_3_6910000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 5911a196138951740b17bdbd605ec98c850457b02bb9c9d6b505f34260d93817
        • Instruction ID: f301b945fa03fe8503e73317cb68618ffec6b6611b4fda845a8f526c3b44d1dc
        • Opcode Fuzzy Hash: 5911a196138951740b17bdbd605ec98c850457b02bb9c9d6b505f34260d93817
        • Instruction Fuzzy Hash: 6B41FC35B101189FCB54DF68D88099EBBB6FF8C714B24816AE905EB360DB31DD46CB90
        Memory Dump Source
        • Source File: 00000021.00000003.4487981258.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_33_3_6910000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 39ccbffbc71a8a208bbb0494f994b9fe8f75db201262acac490621fd0bf3dc43
        • Instruction ID: c213c9955cad8277e2d55d27f9bcaf1da2ba7929c99fa4861e0423be4015334e
        • Opcode Fuzzy Hash: 39ccbffbc71a8a208bbb0494f994b9fe8f75db201262acac490621fd0bf3dc43
        • Instruction Fuzzy Hash: 7511E732F01218ABDB649A758D54AFFBBDF9BC8250F14402BDA06DB344DE708D0687B2
        Memory Dump Source
        • Source File: 00000021.00000003.4487981258.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_33_3_6910000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 82eee17f4f23e33e6af20dc6988f7147da1b6851453cd684307449975de9fa72
        • Instruction ID: 413704e259b6579775292ed9e02d745f20c32f1125156c9d80b3b98e84cdeb90
        • Opcode Fuzzy Hash: 82eee17f4f23e33e6af20dc6988f7147da1b6851453cd684307449975de9fa72
        • Instruction Fuzzy Hash: A511E72470A3983FC76696259850B6B3F5E5F82210F2540AAEE448F752DE24890582A5
        Memory Dump Source
        • Source File: 00000021.00000003.4487981258.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_33_3_6910000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 3493c14d257187d0138a13a21b6d698bbefe62279a5f10901f2fdd7cef7581a4
        • Instruction ID: b6eefb46a1b5f42687939ca203e4f76ff18136a38a4a2129556e718e44871151
        • Opcode Fuzzy Hash: 3493c14d257187d0138a13a21b6d698bbefe62279a5f10901f2fdd7cef7581a4
        • Instruction Fuzzy Hash: 6A11C62064F39C2FCB5792385C2199E7F799F8210072549D6E559CFA52C9058C4AC3B6
        Memory Dump Source
        • Source File: 00000021.00000003.4487981258.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_33_3_6910000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: d84ed7ffe22fec81a3eb2cba0295882de09b33a399bda0c66da67640fc8341ce
        • Instruction ID: a6371c58982fb45e8d3b29dbd3f76654868a85d988b485b2cbaa02cd844906bd
        • Opcode Fuzzy Hash: d84ed7ffe22fec81a3eb2cba0295882de09b33a399bda0c66da67640fc8341ce
        • Instruction Fuzzy Hash: 41210B75A102189FCB54DF69D88599EBBF5EF8C710F10812AE815EB320DB319941CFA0
        Memory Dump Source
        • Source File: 00000021.00000003.4487981258.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_33_3_6910000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 561ceeaa59ec3becf3e2b3ab4918e3cb462573c54af4bd51b6e65d362382032e
        • Instruction ID: 3f87e8eec38ff8d7551adcb1eab7f8ce898d66362a2be9484000afbef89af7f7
        • Opcode Fuzzy Hash: 561ceeaa59ec3becf3e2b3ab4918e3cb462573c54af4bd51b6e65d362382032e
        • Instruction Fuzzy Hash: F7014935B0A3683BCB9A96791C6462F6F5E5FC6210F35447BEA29CFB11DD248C04C2A5
        Memory Dump Source
        • Source File: 00000021.00000003.4487981258.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_33_3_6910000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 092e88fd7cc6453ce87c6e6048fce28ec91900828fbf4d6d975da33b1b1b6936
        • Instruction ID: 2a92822792256cbca41c8ad728bcb06585a9b31beb1f2c3370702c09d22bdeb4
        • Opcode Fuzzy Hash: 092e88fd7cc6453ce87c6e6048fce28ec91900828fbf4d6d975da33b1b1b6936
        • Instruction Fuzzy Hash: 842124B4D042099FDB10DFAAC884AEEFBF4FF89314F10802AD51967250CB78A945CFA1
        Memory Dump Source
        • Source File: 00000021.00000003.4487981258.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_33_3_6910000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: e2642c6a1d5d2c95d3e5d665e2c64aa1901469175295baeb22b7f236c28a5b99
        • Instruction ID: 39dcb55a9d62e36b7708f82e86e4a4b7e98945defd28f93a6d8ea8ecf1240015
        • Opcode Fuzzy Hash: e2642c6a1d5d2c95d3e5d665e2c64aa1901469175295baeb22b7f236c28a5b99
        • Instruction Fuzzy Hash: 601106B5D042099FDB10DFAAC884AEEFBF4FF48314F10841AD51967240CB78A945CFA1
        Memory Dump Source
        • Source File: 00000021.00000003.4487981258.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_33_3_6910000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 7b1b28a8487427a94f4925ac82b0b3a2ccdf8b2571dc43b7a4d4bab6fb105ada
        • Instruction ID: 437baf4c202fa526a32d15bfb87117629fb0ed1132c85b4bd1d0c96ae81e80e8
        • Opcode Fuzzy Hash: 7b1b28a8487427a94f4925ac82b0b3a2ccdf8b2571dc43b7a4d4bab6fb105ada
        • Instruction Fuzzy Hash: 9E01473028530CAFE3949764D861B7A7BE5EB41300F74085BE789CFAC1CA259884C762
        Memory Dump Source
        • Source File: 00000021.00000003.4487981258.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_33_3_6910000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 95e19e902db9566b3277a569ce3d0bcfc039faf0bd4130285fa9d0ec2778bb49
        • Instruction ID: ea9125f0ea463f3206fb6148a1c2d50dcea3e823dfe946c8217174a616aa9acc
        • Opcode Fuzzy Hash: 95e19e902db9566b3277a569ce3d0bcfc039faf0bd4130285fa9d0ec2778bb49
        • Instruction Fuzzy Hash: 90118F71601104AFCB08DF65D464AA97BB7EF8C324F14401BE60AE7390CF759C49CBA2
        Memory Dump Source
        • Source File: 00000021.00000003.4487981258.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_33_3_6910000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 205a98774d7047b35b3a0118492e2b2aed2de4481348548dea7204cf98f85542
        • Instruction ID: ee426605730c3c45ca455d18d3d921bf3cbd3fa3fd971cbaa268c9ac0c8ba853
        • Opcode Fuzzy Hash: 205a98774d7047b35b3a0118492e2b2aed2de4481348548dea7204cf98f85542
        • Instruction Fuzzy Hash: 8801A731A0010DABD754DA699855BFF7AEB9BC8300F30446ED112EB780CE724D4487E1
        Memory Dump Source
        • Source File: 00000021.00000002.4490221967.000000000423D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0423D000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_33_2_423d000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: bbc6d9a863a64f77ad85d408bfffe5f6f7596a227bb536ffa5c078f9159568fe
        • Instruction ID: 6036749486246adc8ac5308a4b0f427af4710626bfa0cfe0fd9c8bff9de1656c
        • Opcode Fuzzy Hash: bbc6d9a863a64f77ad85d408bfffe5f6f7596a227bb536ffa5c078f9159568fe
        • Instruction Fuzzy Hash: 75012BB17283009ED7208F25DD84B67BFA8EF41721F18C42AED580B246C279A801CAB1
        Memory Dump Source
        • Source File: 00000021.00000002.4490221967.000000000423D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0423D000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_33_2_423d000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: b52c70d51550d14a0201bc554f148c58faa0c88a4f828ac23f59f64743184968
        • Instruction ID: 2eecaa3a127fc4665f816b3acac89962598a237a6171a0eb1accb883172c6dbe
        • Opcode Fuzzy Hash: b52c70d51550d14a0201bc554f148c58faa0c88a4f828ac23f59f64743184968
        • Instruction Fuzzy Hash: 3401407110D3C09ED7128B25D894B52BFB4EF53625F1981DBD9888F1A3C2695848C772
        Memory Dump Source
        • Source File: 00000021.00000003.4487981258.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_33_3_6910000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 32e54b5af1b3151f3d3426cc4f7e0e93f5540878f8d516d1ab0a76981691120d
        • Instruction ID: 2a5e84e5f88e8ef6b6ea52bd662f9bf66fcecb76a9d41a79993b6bd4f975461e
        • Opcode Fuzzy Hash: 32e54b5af1b3151f3d3426cc4f7e0e93f5540878f8d516d1ab0a76981691120d
        • Instruction Fuzzy Hash: 48F0F930A062455FC70D9B7D68B45163F9BDFC164871509AFC346CF1A1E9288805C3A2
        Memory Dump Source
        • Source File: 00000021.00000003.4487981258.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_33_3_6910000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 4d5c296349e00566a1bb4e7c89e7c808910d474312ea7de1b543273b639c6eb6
        • Instruction ID: 6bdcc42a1fb36d23df8994c3ce7345781c86a525e1b738a6380d1d5df04c575a
        • Opcode Fuzzy Hash: 4d5c296349e00566a1bb4e7c89e7c808910d474312ea7de1b543273b639c6eb6
        • Instruction Fuzzy Hash: 10F0BB30A461095ED70C9B7D65A56263FDFAFC455C715097E874A8F1A0F9248804C7E2
        Memory Dump Source
        • Source File: 00000021.00000003.4487981258.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_33_3_6910000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: c175a00d33d9352118454418c261b0493261d51f374479813b2066298898bd35
        • Instruction ID: 328e14fecb90a25d16ff2eb862f7f77650586c2cf3eeb371c63aecb2181665f5
        • Opcode Fuzzy Hash: c175a00d33d9352118454418c261b0493261d51f374479813b2066298898bd35
        • Instruction Fuzzy Hash: E3E0C2362092245FC325D66CE820CE67BEE8F4F22071002A7F586CB362DA569C8587F1
        Memory Dump Source
        • Source File: 00000021.00000003.4487981258.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_33_3_6910000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 7f0e5ef0dc83e498ef702d7df29f4f79a3a8132ffc0a13afa26831ecfdb727a4
        • Instruction ID: 03f3d836a296acedd8e280cccf0559389f48420a21a2fadc15eba7751a1c80e1
        • Opcode Fuzzy Hash: 7f0e5ef0dc83e498ef702d7df29f4f79a3a8132ffc0a13afa26831ecfdb727a4
        • Instruction Fuzzy Hash: A0E0C2321082585FC3069F14E8118D6BFBD9B4A1103150067F88187A62DE755E59DBE5
        Memory Dump Source
        • Source File: 00000021.00000003.4487981258.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_33_3_6910000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 22ff6b32d1c0cdb2e249b7dc461145231a31cb9c4695c6d6668843bd69d57189
        • Instruction ID: e85ba0c43ae60681e22ee78669b1fb37444288626334d17fecdc22ed49f68f78
        • Opcode Fuzzy Hash: 22ff6b32d1c0cdb2e249b7dc461145231a31cb9c4695c6d6668843bd69d57189
        • Instruction Fuzzy Hash: 2CD0A9313A01249FC308A22CE45097A37ADDF8A725B1008AAF60ACB320C992EC0442CA
        Memory Dump Source
        • Source File: 00000021.00000003.4487981258.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_33_3_6910000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a7af202b117e4f3de1d8568c6a0c864fa9f5a0cf43a40e36d941e8bc92542432
        • Instruction ID: 7e17a961a858ad1bcabc6003dfbf366e4edf79be739742aa63e60b67d6e52bf5
        • Opcode Fuzzy Hash: a7af202b117e4f3de1d8568c6a0c864fa9f5a0cf43a40e36d941e8bc92542432
        • Instruction Fuzzy Hash: BDD0A73221001C6F47446A19E84586A7B99EB842613618433FA02C7620DD715C5987EA
        Memory Dump Source
        • Source File: 00000021.00000003.4487981258.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_33_3_6910000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 687a0d92d77f36d1f2bd5dc3eadb2ea52cf1613adf99aa8c3604811a6446c403
        • Instruction ID: 5967e3a9d69b6c5dfaa7e71456ca8aa9ab2772bd87e349fd106aaa023dc0b169
        • Opcode Fuzzy Hash: 687a0d92d77f36d1f2bd5dc3eadb2ea52cf1613adf99aa8c3604811a6446c403
        • Instruction Fuzzy Hash: 8FD0222AA0F3B9398B8780782D1048A4B080FC2A18B2609F7E03CDFE0280174C44DAEA
        Memory Dump Source
        • Source File: 00000021.00000003.4487981258.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_33_3_6910000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 7784f43193e3c7fc0f43b008b539bb7d9a248a317ad4ef9507601bc99b1fd03d
        • Instruction ID: 04702d5392d7c5c29fd2d407ceae9d960ad59c222f1a0ed307119bba4cfd0b61
        • Opcode Fuzzy Hash: 7784f43193e3c7fc0f43b008b539bb7d9a248a317ad4ef9507601bc99b1fd03d
        • Instruction Fuzzy Hash: 46C08C20E9120CAEDEC12A66261933A325D9B81600F300C26BB0ECD904EC29D8444199
        Memory Dump Source
        • Source File: 00000021.00000003.4487981258.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_33_3_6910000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a3b64ad1ba440af1cee3369c50e00d5b3e667d85500157b255e41a9d6ae8c554
        • Instruction ID: 68a79cbcb1adb4087daa378110c5c46b0134c0b3163d1a2e246e798e1bdc1805
        • Opcode Fuzzy Hash: a3b64ad1ba440af1cee3369c50e00d5b3e667d85500157b255e41a9d6ae8c554
        • Instruction Fuzzy Hash: 89B012259850083656C4EA354CD08BA40979AC0200BD0CC106212D851C4C28C4081018
        Memory Dump Source
        • Source File: 00000021.00000003.4487981258.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_33_3_6910000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 7a119cb0b1d4a5acec86f5e160d38be0656182ee6fe2c9c7619a846cd9b13ee3
        • Instruction ID: db466cd87e01916a35bc0a1072b21165d5c7a1d18eda20a4606ef568bb640b17
        • Opcode Fuzzy Hash: 7a119cb0b1d4a5acec86f5e160d38be0656182ee6fe2c9c7619a846cd9b13ee3
        • Instruction Fuzzy Hash: DEC04C72A555019FD704DB109909AAA7BB1EBE4317F41C2BEA1054542487350415DA35
        Strings
        Memory Dump Source
        • Source File: 00000022.00000003.4495685920.0000000004690000.00000040.00000800.00020000.00000000.sdmp, Offset: 04690000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_3_4690000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: $]q$$]q
        • API String ID: 0-127220927
        • Opcode ID: da8fc5281ab2e22412a302e53ba5f925e4a3567d4fbfff7a48da02c9995c7e4d
        • Instruction ID: 8bbe1abd8c911336855e730ee058a860d6ef51ef0871fd1b8c7ef284dd65573c
        • Opcode Fuzzy Hash: da8fc5281ab2e22412a302e53ba5f925e4a3567d4fbfff7a48da02c9995c7e4d
        • Instruction Fuzzy Hash: F751D271B0020A9FDB15DF78D8505EE7BFAEFC9350B24812AD418DB364EA709D06C791
        Strings
        Memory Dump Source
        • Source File: 00000022.00000003.4495685920.0000000004690000.00000040.00000800.00020000.00000000.sdmp, Offset: 04690000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_3_4690000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: (aq
        • API String ID: 0-600464949
        • Opcode ID: ab1377e86140c2bd3ffc966a36bf0018a0fab03e174ac438f7148f4c248676ea
        • Instruction ID: 574d65969abe46e996b3fc9bcda0f0edac801f5b69dbbc491acdd62d4f15f84b
        • Opcode Fuzzy Hash: ab1377e86140c2bd3ffc966a36bf0018a0fab03e174ac438f7148f4c248676ea
        • Instruction Fuzzy Hash: 1E71A435B002159FEF04AFB5C8546AEB7EBAFC9310F248029D9069B3A4EE75EC42D751
        Strings
        Memory Dump Source
        • Source File: 00000022.00000003.4495685920.0000000004690000.00000040.00000800.00020000.00000000.sdmp, Offset: 04690000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_3_4690000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: (aq
        • API String ID: 0-600464949
        • Opcode ID: 7e4fecbbfb0c6328a454713322663fd887a48ec264f0a6cebe239900959fa0d1
        • Instruction ID: 43739c55ac371747162afd50ff9d0a2dfd441e745d1ef9c9cad8bf9cfb36f1d4
        • Opcode Fuzzy Hash: 7e4fecbbfb0c6328a454713322663fd887a48ec264f0a6cebe239900959fa0d1
        • Instruction Fuzzy Hash: 8051C730B04305AFEB04DB64D4587AE7BFADF89310F248469D506E7395EE756C06C791
        Strings
        Memory Dump Source
        • Source File: 00000022.00000003.4495685920.0000000004690000.00000040.00000800.00020000.00000000.sdmp, Offset: 04690000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_3_4690000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: (aq
        • API String ID: 0-600464949
        • Opcode ID: c90b56c0624b3c4ab3b672f1d558186dc5ebd71ee1458fb83177de042cbf38a7
        • Instruction ID: d9381e328d6842136a57ef8de0d3ccbae7e907679b76af4ef0c04d95be672c83
        • Opcode Fuzzy Hash: c90b56c0624b3c4ab3b672f1d558186dc5ebd71ee1458fb83177de042cbf38a7
        • Instruction Fuzzy Hash: 00216A327443146BEB156E2658687BE3FDFDBD5320F10806AED0987384FD749C429354
        Memory Dump Source
        • Source File: 00000022.00000003.4495685920.0000000004690000.00000040.00000800.00020000.00000000.sdmp, Offset: 04690000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_3_4690000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 05a0cbff8a7d08dfaf5a233e438d9f96e3226d631b0ec348fde08027b155fc2a
        • Instruction ID: 85efca7411048eeee3edf19cd322bc384b01b35ea4f3d89c2e14dfb88fa0968d
        • Opcode Fuzzy Hash: 05a0cbff8a7d08dfaf5a233e438d9f96e3226d631b0ec348fde08027b155fc2a
        • Instruction Fuzzy Hash: 2D614B357002119FDB14DB28D4A496EBBFAFF84714F2185A9E914CB362EB71EC42C781
        Memory Dump Source
        • Source File: 00000022.00000003.4495685920.0000000004690000.00000040.00000800.00020000.00000000.sdmp, Offset: 04690000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_3_4690000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: b21b1ec6972c26298940028c6f1494b7b96a0ae367027eea5011f8e3aa1c3d10
        • Instruction ID: f23920605cc254ed1491bd8e024f38c90827b4254f09e508deac9c9331a17a00
        • Opcode Fuzzy Hash: b21b1ec6972c26298940028c6f1494b7b96a0ae367027eea5011f8e3aa1c3d10
        • Instruction Fuzzy Hash: 8D316836B00321A7EF149E299994AFEBBEEDFD5254F04403AD906C7345FEA4ED068391
        Memory Dump Source
        • Source File: 00000022.00000003.4495685920.0000000004690000.00000040.00000800.00020000.00000000.sdmp, Offset: 04690000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_3_4690000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 793882ecbbef477542d805067bfb7921fbc0c9b8fbe66aa1ab9925fa7d250cc3
        • Instruction ID: d61eaa4bdfd8dd62b83e92042b59b15ee4354fa216e10d75057d45aefc701c40
        • Opcode Fuzzy Hash: 793882ecbbef477542d805067bfb7921fbc0c9b8fbe66aa1ab9925fa7d250cc3
        • Instruction Fuzzy Hash: B331F4767003046BDF249E29D4A4A6E77DEAFD5664F04886AE90AC7344EE74EC028391
        Memory Dump Source
        • Source File: 00000022.00000003.4495685920.0000000004690000.00000040.00000800.00020000.00000000.sdmp, Offset: 04690000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_3_4690000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: f06f543d588242a2d8843ca99b115652912226e5f9680dc79044f257eb1c6619
        • Instruction ID: 4a3f692271bd16bf5ccfc537ed49185689f040e531638228149e083d5e2f2ef7
        • Opcode Fuzzy Hash: f06f543d588242a2d8843ca99b115652912226e5f9680dc79044f257eb1c6619
        • Instruction Fuzzy Hash: 5641F775B002149FCB54DF68D89099EBBF6FF88715B10816AE905EB361EB31EC42CB91
        Memory Dump Source
        • Source File: 00000022.00000003.4495685920.0000000004690000.00000040.00000800.00020000.00000000.sdmp, Offset: 04690000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_3_4690000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: e306be94abbf2e1730870e409928b4202a6bdc243e5a1f6b8390f72d8df7ae7a
        • Instruction ID: 1677b52124b9986a90520fb1fdf1435cd60574ad7a2fa964223e76a36e54c762
        • Opcode Fuzzy Hash: e306be94abbf2e1730870e409928b4202a6bdc243e5a1f6b8390f72d8df7ae7a
        • Instruction Fuzzy Hash: 8A112732B00315A7EF10DE658844AEEBBEEDF89250F04802AD907D7345FEB4ED068390
        Memory Dump Source
        • Source File: 00000022.00000003.4495685920.0000000004690000.00000040.00000800.00020000.00000000.sdmp, Offset: 04690000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_3_4690000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a4d31867e0a29c143304f4f82d621ba1bbbc4cbd0584fc5dfe49ff1ce80b5d45
        • Instruction ID: 23a07e37ed2e490473a6a1529dc7e47fad418ff794acee024c8f5afc7abfad62
        • Opcode Fuzzy Hash: a4d31867e0a29c143304f4f82d621ba1bbbc4cbd0584fc5dfe49ff1ce80b5d45
        • Instruction Fuzzy Hash: 841159723043502BE7159A789854BAE3FEECF82210F0404AEE909DB291FD299C01C3E5
        Memory Dump Source
        • Source File: 00000022.00000003.4495685920.0000000004690000.00000040.00000800.00020000.00000000.sdmp, Offset: 04690000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_3_4690000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 6cba6e160d45de13c50856a6af70f13da6c83884625f79774fa9865b0c2b142a
        • Instruction ID: bbc2e88a4fceeaa278e7a85bf021ee30097bed23cbe88e0722591a90a31e061c
        • Opcode Fuzzy Hash: 6cba6e160d45de13c50856a6af70f13da6c83884625f79774fa9865b0c2b142a
        • Instruction Fuzzy Hash: 1A113330A40205AFEB04EF54D458AEE7BFAEF8D324F244019D409A7394EF796C45CB94
        Memory Dump Source
        • Source File: 00000022.00000003.4495685920.0000000004690000.00000040.00000800.00020000.00000000.sdmp, Offset: 04690000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_3_4690000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 8066e8ebacb8ad50679538fa327e767a54bbc5cb870d617643ce8bd340a069c7
        • Instruction ID: 6659be1b078ed8e3c5c1bf6d12a7edd138585f4677a8544fe4390b4712e14f22
        • Opcode Fuzzy Hash: 8066e8ebacb8ad50679538fa327e767a54bbc5cb870d617643ce8bd340a069c7
        • Instruction Fuzzy Hash: BB211A75E102189FCB44DF69D88099EBBF6FF4C711B11816AE909AB320EB319842CB91
        Memory Dump Source
        • Source File: 00000022.00000003.4495685920.0000000004690000.00000040.00000800.00020000.00000000.sdmp, Offset: 04690000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_3_4690000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 5c9570e956d494fa26741a755df1fa5f578a58eb77299bacf65a6d06281a1926
        • Instruction ID: 68afe3e590e0ad27d45e5eebf546d36b806f2dbfc0ed208f47cfb52daf8602cf
        • Opcode Fuzzy Hash: 5c9570e956d494fa26741a755df1fa5f578a58eb77299bacf65a6d06281a1926
        • Instruction Fuzzy Hash: CC112134A40205AFEB04EF64D454AAD7BFBEF8D325F248019D40AA7394EFB96C45CB94
        Memory Dump Source
        • Source File: 00000022.00000003.4495685920.0000000004690000.00000040.00000800.00020000.00000000.sdmp, Offset: 04690000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_3_4690000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 7d0f824c7568ff73317f9235a512f39a360713d92fa248b1cb0412df7669f614
        • Instruction ID: 393999b8913904f686d454ef8f8d712a38534728a4b0500ac28585e4bab14725
        • Opcode Fuzzy Hash: 7d0f824c7568ff73317f9235a512f39a360713d92fa248b1cb0412df7669f614
        • Instruction Fuzzy Hash: 5C115131600315BFCB04DF64D85CAA9BBBAEF8C311F149019E50AA7354EF796D46DB90
        Memory Dump Source
        • Source File: 00000022.00000003.4495685920.0000000004690000.00000040.00000800.00020000.00000000.sdmp, Offset: 04690000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_3_4690000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: fbffd51516205e2bb8327c1a69877c5925f7ecb2e2aa7f1916faf71cae99cb12
        • Instruction ID: 58853c5e70a74a9d3025ba16e64da37fd004af582c5d550a5da3c32a60ae452d
        • Opcode Fuzzy Hash: fbffd51516205e2bb8327c1a69877c5925f7ecb2e2aa7f1916faf71cae99cb12
        • Instruction Fuzzy Hash: CD2113B0D002498EDB20DFAAC484AEEFBF4FF59314F10842ED419A7240C779A946CFA1
        Memory Dump Source
        • Source File: 00000022.00000003.4495685920.0000000004690000.00000040.00000800.00020000.00000000.sdmp, Offset: 04690000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_3_4690000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 5ac99c315c82b8511159ba83ad46694aa041e3ea790cb9849856742cd20a1dee
        • Instruction ID: 7dece2c41cc2f83d9a4662f7f19741f94e65ef47068fa5e4e43156a40da551f5
        • Opcode Fuzzy Hash: 5ac99c315c82b8511159ba83ad46694aa041e3ea790cb9849856742cd20a1dee
        • Instruction Fuzzy Hash: 1E1114B4D002098FDB10DFAAC884AEEFBF4FF49714F10842AD51967240DB78A946CFA1
        Memory Dump Source
        • Source File: 00000022.00000003.4495685920.0000000004690000.00000040.00000800.00020000.00000000.sdmp, Offset: 04690000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_3_4690000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: abc68da6606ab55726ea749335e1f5cf184ec8e8a09d1ae36e8d9a0b8536fa21
        • Instruction ID: b50af7b8239593fa8412b36cd3e87ee9d101e31c76e2da1f0ed6ee196c89f230
        • Opcode Fuzzy Hash: abc68da6606ab55726ea749335e1f5cf184ec8e8a09d1ae36e8d9a0b8536fa21
        • Instruction Fuzzy Hash: E5111F35600315BFDB04DF64D458AA97BBAEF8C321F149019E40AE7394EF796C45CB90
        Memory Dump Source
        • Source File: 00000022.00000003.4495685920.0000000004690000.00000040.00000800.00020000.00000000.sdmp, Offset: 04690000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_3_4690000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: c50ae96e32407e8f6baffc3181fdece4c8f1b6a910b228fe19f68edf6b2bd1ea
        • Instruction ID: f00a2e9fda1cb0f2735d41d6fb51e2939e37c09bf6483fff250b4a78c8633280
        • Opcode Fuzzy Hash: c50ae96e32407e8f6baffc3181fdece4c8f1b6a910b228fe19f68edf6b2bd1ea
        • Instruction Fuzzy Hash: 9B01D83060A3461FDB099F3899795663FEDDFC661471508BAC50ACF2A2F958DC04C792
        Memory Dump Source
        • Source File: 00000022.00000003.4495685920.0000000004690000.00000040.00000800.00020000.00000000.sdmp, Offset: 04690000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_3_4690000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: ba603dbb9cdeb949f70176f4f4da8daf739d3765018cf4eeaf5079fa1f629a68
        • Instruction ID: 71ffc2765e975a5f89e37e8311ce1add1d9a7ab8eec36d3ef58c8d84f2c239a3
        • Opcode Fuzzy Hash: ba603dbb9cdeb949f70176f4f4da8daf739d3765018cf4eeaf5079fa1f629a68
        • Instruction Fuzzy Hash: 1D012171B0010697FF18AA6886557EF7BFA9BC9704F20402DC102B7380EEB55C0697E0
        Memory Dump Source
        • Source File: 00000022.00000002.4496798714.0000000002A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A7D000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_2_2a7d000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 0a3c46ea38e35b339b4659b43bcab7a977c74a4506d238ce3f272d8abee3bae7
        • Instruction ID: 820472243084041d67412109bc6dad574ce0988f1f18129c6d4f9b4de33afcda
        • Opcode Fuzzy Hash: 0a3c46ea38e35b339b4659b43bcab7a977c74a4506d238ce3f272d8abee3bae7
        • Instruction Fuzzy Hash: 8C012B70104B409ED7208B25CDC4B67BF9CEF46324F18C42AED4A1B286C7799803C7B9
        Memory Dump Source
        • Source File: 00000022.00000002.4496798714.0000000002A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A7D000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_2_2a7d000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: b186238427e1d0e4e9f4825a32b5595745383dd5e652b58a44f2b702c75c3d3e
        • Instruction ID: 2cd4d752153b7a1dc1c9d34d7afb8a0aa1f7dc9c3fe725655f64be9121c63f69
        • Opcode Fuzzy Hash: b186238427e1d0e4e9f4825a32b5595745383dd5e652b58a44f2b702c75c3d3e
        • Instruction Fuzzy Hash: 6C015E7100E7C09ED7128B258C94B52BFB4EF57224F1D81DBD9889F2A3C3695849C776
        Memory Dump Source
        • Source File: 00000022.00000003.4495685920.0000000004690000.00000040.00000800.00020000.00000000.sdmp, Offset: 04690000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_3_4690000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 13cff497806187977ceaa79088a43563275323da7992070d0f4c3c37a1955692
        • Instruction ID: a2020b9ef8244587066dc7be98bf3973dda2136cb1fec326bacf46a133d9476c
        • Opcode Fuzzy Hash: 13cff497806187977ceaa79088a43563275323da7992070d0f4c3c37a1955692
        • Instruction Fuzzy Hash: D8F0F6306053021FDB0C9F38A5696263FDEEFC6624715087EC50BCF295F9689C01C781
        Memory Dump Source
        • Source File: 00000022.00000003.4495685920.0000000004690000.00000040.00000800.00020000.00000000.sdmp, Offset: 04690000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_3_4690000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: f3cc09087123d93b59023737f74e106039c0545339c38994d1385c404569ea77
        • Instruction ID: 4b00a47244a46b344dcdbd2abbaf61e72dec3aac10a1435d02147aeba3e4ff78
        • Opcode Fuzzy Hash: f3cc09087123d93b59023737f74e106039c0545339c38994d1385c404569ea77
        • Instruction Fuzzy Hash: 64D05EB7700130ABC708A65CE858BE93B99CB4D675F010056E70E8F3A1F9929CC383C4
        Memory Dump Source
        • Source File: 00000022.00000003.4495685920.0000000004690000.00000040.00000800.00020000.00000000.sdmp, Offset: 04690000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_3_4690000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 7527d89484f7e7efc54708de17c24d8e2f78dcfc9a27a523690a9a3ad9f5a6ab
        • Instruction ID: 060d2adc576a776c9c0bbfeba3ede0f53cd431b758d7ebc25d1d2d09b0e6ab73
        • Opcode Fuzzy Hash: 7527d89484f7e7efc54708de17c24d8e2f78dcfc9a27a523690a9a3ad9f5a6ab
        • Instruction Fuzzy Hash: 89D0C2327003145F8714DEB9941559A7BDECE40160B00046E940EC7240EE34A8408391
        Memory Dump Source
        • Source File: 00000022.00000003.4495685920.0000000004690000.00000040.00000800.00020000.00000000.sdmp, Offset: 04690000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_3_4690000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 5bfc5fbe1e79fc4749728d34bd1d3b9749f90e71849b3371888d6323a107b950
        • Instruction ID: a158c638d7ac6f4ae350df2480462967c960042cdf795e20c65e9d70c8fae125
        • Opcode Fuzzy Hash: 5bfc5fbe1e79fc4749728d34bd1d3b9749f90e71849b3371888d6323a107b950
        • Instruction Fuzzy Hash: DCD0A931390120ABD708A62CE454979339DDF8E728B0008AAFA0BCB330E992FC414289
        Memory Dump Source
        • Source File: 00000022.00000003.4495685920.0000000004690000.00000040.00000800.00020000.00000000.sdmp, Offset: 04690000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_3_4690000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 0c885714dace9e8e7bb21d72458682e7a9316f11cd60aec645147acb261c95fd
        • Instruction ID: 86e7c21429eeb0210c9c54fa18200b6a02f9ec5cc634400e8155a8c06e65bd4c
        • Opcode Fuzzy Hash: 0c885714dace9e8e7bb21d72458682e7a9316f11cd60aec645147acb261c95fd
        • Instruction Fuzzy Hash: E8E08C7408E3C4AEC706477088B0B40BFA0AF03315F1904DEC6498E0E3D19A589BC302
        Memory Dump Source
        • Source File: 00000022.00000003.4495685920.0000000004690000.00000040.00000800.00020000.00000000.sdmp, Offset: 04690000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_3_4690000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 7c77b122e956e958c247e93816b158ba29645b18e87f51e32628163d41604fcd
        • Instruction ID: 8b1126f9b07e619e5e11c5af184678f8b4cec635d056c16ae23d2cd7d7d775c8
        • Opcode Fuzzy Hash: 7c77b122e956e958c247e93816b158ba29645b18e87f51e32628163d41604fcd
        • Instruction Fuzzy Hash: 20D0A5B33951146FD70CDF50F4875957F99D755231B15405BF60547254DD710C51C3C5
        Memory Dump Source
        • Source File: 00000022.00000003.4495685920.0000000004690000.00000040.00000800.00020000.00000000.sdmp, Offset: 04690000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_3_4690000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 4b4bdf81d7b0250f6eb29a67f38db173df9c4991725cae3098ea3c12f8f04608
        • Instruction ID: d791568272bfa75833160a758ecdcdf9dcbfbabf4b27aa374ab7ff5bad151d71
        • Opcode Fuzzy Hash: 4b4bdf81d7b0250f6eb29a67f38db173df9c4991725cae3098ea3c12f8f04608
        • Instruction Fuzzy Hash: 7FD0A7327610186B96046A18D8C58BA7BDDEB853617208437F90293224EDB0BC05D399
        Memory Dump Source
        • Source File: 00000022.00000003.4495685920.0000000004690000.00000040.00000800.00020000.00000000.sdmp, Offset: 04690000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_3_4690000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 76e3582531d74c61694200b264afecac2454f988e6690a08c39041896a4c4e13
        • Instruction ID: 1181ccbf6191509fc2fe62acf624ae88c2b70c9beaf87a6f08d2ae41dfdac402
        • Opcode Fuzzy Hash: 76e3582531d74c61694200b264afecac2454f988e6690a08c39041896a4c4e13
        • Instruction Fuzzy Hash: A2D0A9202C030D29FF0825A124213B632CCAB41A28F60089DEA0C082D0B8E93C848198
        Memory Dump Source
        • Source File: 00000022.00000003.4495685920.0000000004690000.00000040.00000800.00020000.00000000.sdmp, Offset: 04690000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_3_4690000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 2a460d0c43b62c09648abf9b15fc42d3de963ca4f80521672b27a520c12cebbc
        • Instruction ID: 9198fab9e9b91d94a02741e94187efcc7116f0b92b11e4fb39c66f63a630164b
        • Opcode Fuzzy Hash: 2a460d0c43b62c09648abf9b15fc42d3de963ca4f80521672b27a520c12cebbc
        • Instruction Fuzzy Hash: 13C080724193C05FC706065408588D56F60DA3710174A8197C144CA167B1166457D326
        Strings
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: $]q$$]q
        • API String ID: 0-127220927
        • Opcode ID: 982f78f6736e4e1382aa4bee00172c1a6b18a6118e716285694ee4a7259e054c
        • Instruction ID: 0c06f4eb68917cd0420ccf316fa0d513cec0bec3370777a8235afe600e6985c7
        • Opcode Fuzzy Hash: 982f78f6736e4e1382aa4bee00172c1a6b18a6118e716285694ee4a7259e054c
        • Instruction Fuzzy Hash: 4F51C035B002098FCB15DF78D8516AE7BF6AFC9350B14847AD81ADB364DA30AD06C791
        Strings
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: (aq$LR]q
        • API String ID: 0-67906209
        • Opcode ID: c6e6eb1feb3d7299e3955fb31ede13c95218a2640c45b251b0c35eb14211b707
        • Instruction ID: 031d752ae1b5de7ee28825e6f52e92cfebfe227210cef29e9cfadfd340510165
        • Opcode Fuzzy Hash: c6e6eb1feb3d7299e3955fb31ede13c95218a2640c45b251b0c35eb14211b707
        • Instruction Fuzzy Hash: FF41D3347052155FEB09AB389854B7E3BAAEFC5304F1448BEE806DB395EE34AD068791
        Strings
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: (aq
        • API String ID: 0-600464949
        • Opcode ID: 4141feb101a79737b5d29de0bc6535b8f5e1d50f0f937cc4de036c2353dd80f0
        • Instruction ID: 32f0ebf7dbcf98a861b10de64d83d73793508582a34866cd2ec38b8ac3f65ee2
        • Opcode Fuzzy Hash: 4141feb101a79737b5d29de0bc6535b8f5e1d50f0f937cc4de036c2353dd80f0
        • Instruction Fuzzy Hash: 01718631B002159FDB089BB9C955A6EB7ABAFC8310F148439D507EB3A4DE74EC46C791
        Strings
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: (aq
        • API String ID: 0-600464949
        • Opcode ID: 85c54f5e83b8a8a2ea6efa271de11ba6a9b2e195ace81c56c8a9b2f92dc9bae2
        • Instruction ID: 176f7f573dd39c9b2c005a22b00edc2aaefc2fc9e7db0a0ba8bce6d770a22026
        • Opcode Fuzzy Hash: 85c54f5e83b8a8a2ea6efa271de11ba6a9b2e195ace81c56c8a9b2f92dc9bae2
        • Instruction Fuzzy Hash: 1151E230B05205AFEB099F68D8657AE7BB7EFC8314F14886AD506E7385CE346C06C791
        Strings
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: LR]q
        • API String ID: 0-3081347316
        • Opcode ID: e74797d0147cf6bc026d7300da2fd910cade8a788c4ed172f3db7d40655ae5e4
        • Instruction ID: 3fdcade8d05a26d11f56a06ba42cb5beb88de3fecf962625326c9d320a65a9b1
        • Opcode Fuzzy Hash: e74797d0147cf6bc026d7300da2fd910cade8a788c4ed172f3db7d40655ae5e4
        • Instruction Fuzzy Hash: 17219D75B012165FDB08EF249894BBE37AAEFC4219F1448BEE407CB295EB34B9068751
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 853963fed2dd0d4df83e7f9658585f41f1c06edaa81c4e24a703ff8cfbc75303
        • Instruction ID: 2121dffc9aca102164bedc491e637a1e67854fbff02f1248fc4dd9592a8e2b71
        • Opcode Fuzzy Hash: 853963fed2dd0d4df83e7f9658585f41f1c06edaa81c4e24a703ff8cfbc75303
        • Instruction Fuzzy Hash: 999105357002158FD715DF68D8949AEBBBAFF88314B1481B9D806DB3A1DB35EC46CB90
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 12bdd01e9050eaf7aa9b50a68c2784d80cbc5a649c51347a2ae12b0db7273a77
        • Instruction ID: 18c2657185ed91a8d47ee39c5cd848bf09ad100f546626d74088a59863caa8f4
        • Opcode Fuzzy Hash: 12bdd01e9050eaf7aa9b50a68c2784d80cbc5a649c51347a2ae12b0db7273a77
        • Instruction Fuzzy Hash: 62312832B052209BDB149E299990AFE7BDEDFC8254F04443BD907D7245EE34ED0AC791
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 46470cce5563f3542882106d8ffebd896ce9dce8e16f87aa049cf248983b5d3b
        • Instruction ID: c875ea9e7a16115955e6f42d1f85cfbeec3821f01dfe172220f438668290bc95
        • Opcode Fuzzy Hash: 46470cce5563f3542882106d8ffebd896ce9dce8e16f87aa049cf248983b5d3b
        • Instruction Fuzzy Hash: 9C41FC35B101159FCB54DF68D88099EBBB6FF88714B148179E906EB364DB31EC42CB91
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 44703adca4479196bf469681c1438ed04495f256753bd738d1d29749cdde33df
        • Instruction ID: 14cc92461bcb1b1eb356d3c61d7a99758a60c850da036ff7cc64e8a750bbd428
        • Opcode Fuzzy Hash: 44703adca4479196bf469681c1438ed04495f256753bd738d1d29749cdde33df
        • Instruction Fuzzy Hash: 2E110632F0121497DF149A798951AFEBBAEDBC8240F04843BD907D7245EE74ED068B91
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 532a4749c8c2bac12c853bc0a951ddb7dd18ba6bcd747d7a5633c4e5e75ed37b
        • Instruction ID: 14b487d5d97f1050f0cfafb0ea5bcdfbbb2c422fb1b361a6bcc7d83dff034a11
        • Opcode Fuzzy Hash: 532a4749c8c2bac12c853bc0a951ddb7dd18ba6bcd747d7a5633c4e5e75ed37b
        • Instruction Fuzzy Hash: 481129327452545FE3159B7D5850AAF7FAACF85210F04487FE60ADB281DE29AC09C3A5
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 9f5e2925ca2f01ebb2990eabd43a1e314c52a442c8ec41225263c9a1cecc7945
        • Instruction ID: 92e38b6abc07e19c9789f58bf54029b92e5656ef6a2bbcc07b51bcc1cb3a2107
        • Opcode Fuzzy Hash: 9f5e2925ca2f01ebb2990eabd43a1e314c52a442c8ec41225263c9a1cecc7945
        • Instruction Fuzzy Hash: 1F110424B5A2685BFB153B7869643FE2B8ECBC1214F0444BBC906CB286DD98FC4E4395
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: d51dd4ebadf1debf08917833c2fd706a734e8fdda2e41b0626a17a928904edad
        • Instruction ID: a2b9a02683c0b94e5813aacb8d24b0e7096e59d924eb2ff22625193450f515f9
        • Opcode Fuzzy Hash: d51dd4ebadf1debf08917833c2fd706a734e8fdda2e41b0626a17a928904edad
        • Instruction Fuzzy Hash: 1221D875E102199FCB44DF68D88099EBBB6FF8C710B10816AE905EB364DB31A946CF90
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 946b59aef762b29569ef6a7fca649de2aad03966d7a081d2bcf573eb2e0023fb
        • Instruction ID: 11e54dac5b821ac592e65ab0656de3951decc6274184b10ddd0f1e407739cc2b
        • Opcode Fuzzy Hash: 946b59aef762b29569ef6a7fca649de2aad03966d7a081d2bcf573eb2e0023fb
        • Instruction Fuzzy Hash: DD118131A02115AFCB04DF65D455AADBBB3EF8C310F14882AD40AA7354CF355C46CB91
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a7f063ae755923967c91724ec4cb2d3cbfd9de97613447a8fb68c6ec4b276cd0
        • Instruction ID: 9220f12205024d0f905e7132894d4633f33b2ff767d892c47498b0411b63dfe4
        • Opcode Fuzzy Hash: a7f063ae755923967c91724ec4cb2d3cbfd9de97613447a8fb68c6ec4b276cd0
        • Instruction Fuzzy Hash: C221F4B4D002098FDB10DFAAC985AEEFBF4FF49324F10842AD51967240C779A946CFA1
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: cac441c8e30463d88b42b6cbc66da4fb1b913a66f4f23c4af087612d9bfb6106
        • Instruction ID: cd6e78d8fc210ba96e13271e55da0be00210df8e6bac3527b3336019ba14c6dc
        • Opcode Fuzzy Hash: cac441c8e30463d88b42b6cbc66da4fb1b913a66f4f23c4af087612d9bfb6106
        • Instruction Fuzzy Hash: B51117B4D002098FDB10DFAAC881AEEFBF4FF48314F10842AD51967240C779A945CFA1
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 9f209da180270682036759d495eba5be3a71e5ad7e7617aceab2ec931886afac
        • Instruction ID: 8367e4da01df67d7f008f69dfb6c2acdabcf5b0da023f37597d84ce21e230cbf
        • Opcode Fuzzy Hash: 9f209da180270682036759d495eba5be3a71e5ad7e7617aceab2ec931886afac
        • Instruction Fuzzy Hash: FD118F71602114AFCB08DF65D455AAD7BB7EF8C320F14482AE40AE7390CF795C45CB91
        Memory Dump Source
        • Source File: 00000023.00000002.4504621947.00000000046DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 046DD000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_2_46dd000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 86df96ae59484d32e4c3dc35864522b3c99d87a5708502546a7f604c54fe6f81
        • Instruction ID: fdbe9d10822bc8564cc8f6d1b2524225f54b6b480480228a978d6d12088c835a
        • Opcode Fuzzy Hash: 86df96ae59484d32e4c3dc35864522b3c99d87a5708502546a7f604c54fe6f81
        • Instruction Fuzzy Hash: 77016D6140D3C49FD7128F259884752BFA4EF93224F0985DBE8888F293D2695C45C7B1
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 532267eacdb525dd8808923792384e1dc3d5da9433115af1d78802b437f6b02e
        • Instruction ID: f7161f4a711692d74ee52462244333905551a7be37ea508b26d11aa71a05ecd3
        • Opcode Fuzzy Hash: 532267eacdb525dd8808923792384e1dc3d5da9433115af1d78802b437f6b02e
        • Instruction Fuzzy Hash: 3001D4306072491FCB19AF7D68B622A3FADDFC1204B040DBFC94ACB255E9289C05C391
        Memory Dump Source
        • Source File: 00000023.00000002.4504621947.00000000046DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 046DD000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_2_46dd000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 6804217a9424ba48cfe71f71af434c010bf389a816dd35c3348c5a2b96a17e97
        • Instruction ID: b324da7a616faf8a5739818c066bee8e8e9b3cbe8c0b56df55636371999df631
        • Opcode Fuzzy Hash: 6804217a9424ba48cfe71f71af434c010bf389a816dd35c3348c5a2b96a17e97
        • Instruction Fuzzy Hash: 2001D0719043449ED7105E15DD84B57BF9CEFD5324F18C516DD480B246E279A846C6F1
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: e45490dc7b92b51d20d1e6b8ecb921525a0466247cc847a623b727d8d2aa76c9
        • Instruction ID: 612e749952b91baa09295dbda11128988745a2bdd6c203a155734444236580e7
        • Opcode Fuzzy Hash: e45490dc7b92b51d20d1e6b8ecb921525a0466247cc847a623b727d8d2aa76c9
        • Instruction Fuzzy Hash: D301A230F0021997EB18AA6885567EF7BF69BC8704F10857DC107B7381CE751C068B91
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 4019c963537108272844f26c2131bee58f7fadd19530c319def85e9ed09b8268
        • Instruction ID: 8e88e347cbd46a97743eee82f06941be091de25e1973eed3588c7ee9c42f9b6c
        • Opcode Fuzzy Hash: 4019c963537108272844f26c2131bee58f7fadd19530c319def85e9ed09b8268
        • Instruction Fuzzy Hash: 0EF050366563545FE3012B247D647A97F9DCB42214F0144FBD906CB053DA65E409C384
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 071a514ad0baa15f5abdb064b57243e56ba449351f975a8664b4c63c6ae226e3
        • Instruction ID: 47a1eabb98030adf60ba9c003f31d90122853b884b93748b8f0dc09b8e4684e0
        • Opcode Fuzzy Hash: 071a514ad0baa15f5abdb064b57243e56ba449351f975a8664b4c63c6ae226e3
        • Instruction Fuzzy Hash: 9DE022216453A90EE7063BA53A223F73F8C4F83261F1000F6E94A9A1A2C908A8859390
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 6b2e36c347de457a8268127a3c5cb3c5d2caf25c6dd38b523ecc006719c7a233
        • Instruction ID: c03d5560af3e73b7805f02f522afe630b07516d244139552b28f129eafd6e871
        • Opcode Fuzzy Hash: 6b2e36c347de457a8268127a3c5cb3c5d2caf25c6dd38b523ecc006719c7a233
        • Instruction Fuzzy Hash: 90F0B430A431051EDB1CAF7D65A622A3FAAEFC4614B040C7FCA4A8F294F9289C05C781
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 0f3397b1f3bc0e4fd2d83ee565065ad53dfd4649aa3fb0dadba6a419b7a0b638
        • Instruction ID: f6db0023e9605ef281fab3e44b672657391e5fd08656e6e037472ddc01b94ed8
        • Opcode Fuzzy Hash: 0f3397b1f3bc0e4fd2d83ee565065ad53dfd4649aa3fb0dadba6a419b7a0b638
        • Instruction Fuzzy Hash: B0E09B54B142D48EFF2567645A003F716CE4BC1214F0800BBC447C658AED98E8490395
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 69831dae7cc50f850701b836f8807389260a33fe15ab01f1d8bcc6847171a38f
        • Instruction ID: eb94700892e709d7a9c96cf4d10087a7ded7c3e45968ec24399f5f0394a9cd68
        • Opcode Fuzzy Hash: 69831dae7cc50f850701b836f8807389260a33fe15ab01f1d8bcc6847171a38f
        • Instruction Fuzzy Hash: DCE0C23A3411658FE3028B18F8649E83B62EF4A31470100A7C506CF2E3EE12E98B8785
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: f5308e94ada517f28216b5379712ef148bc914e8bc8a096be42183fafd08a0f3
        • Instruction ID: 88fb2b5da0cee238056873ce0ddd9c64e27814aa7b40382dd7563d679978af97
        • Opcode Fuzzy Hash: f5308e94ada517f28216b5379712ef148bc914e8bc8a096be42183fafd08a0f3
        • Instruction Fuzzy Hash: 90D02B327013145F8714DEFA94105DF7FEECE40160B00087ED41EC7280EE34E8408391
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 4b5827c5b834fc58366b8deeb6db9b5dc3e1aa5486b9843819c99b5e9531add5
        • Instruction ID: c35cc715767327ccc1fbaaca7f97cef2c43b6c41a1f71208e6a7842aaaf99285
        • Opcode Fuzzy Hash: 4b5827c5b834fc58366b8deeb6db9b5dc3e1aa5486b9843819c99b5e9531add5
        • Instruction Fuzzy Hash: 51E0BF3400E2C49EC7279B348865B51BF706F03315F6A84EFC65A8F4A3C56A645AC752
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: d38ce1837023cd89667d3135cb805e1ed6e1c832a7a3541fa2d7ad927c6b7e69
        • Instruction ID: dd3734f73fbf0b56de6f19cd11c7c59fbf80bc0ae5dd56f9311e896890a9b69f
        • Opcode Fuzzy Hash: d38ce1837023cd89667d3135cb805e1ed6e1c832a7a3541fa2d7ad927c6b7e69
        • Instruction Fuzzy Hash: 60D0A7313911205FD204521CD450D79379DDF49716B00087BF60AC7320C951EC044685
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: fd7abc105049f13c56abd3a33ee23aa4dd782a0a49ec54af94e8fe340fb8d087
        • Instruction ID: b07f7a7325d50a5f7ccc5a39b52d4e691f8c673842a163a1669b5922100cd0ff
        • Opcode Fuzzy Hash: fd7abc105049f13c56abd3a33ee23aa4dd782a0a49ec54af94e8fe340fb8d087
        • Instruction Fuzzy Hash: 67D02E3A3481844FC70ADF10F88A0AD3F77E749200304806BE802CB9A6CE304A9AC380
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 52876addf2a5a4b7fae87d9c8c5d90daea2ee900eb6da0c08b2b6b80aa76df67
        • Instruction ID: a40c06a4a7b06bcae08392159e52ed613e944679a9dbfce856ad9f13c63190ac
        • Opcode Fuzzy Hash: 52876addf2a5a4b7fae87d9c8c5d90daea2ee900eb6da0c08b2b6b80aa76df67
        • Instruction Fuzzy Hash: 7DD0A7327110186B52046A19F88686E7B99EB882A13104833FA06C3224DD70BC058395
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: f17cfb3409722ce83e4614c57bfb7f0d07d1be116d6383e339293fd3279c60e7
        • Instruction ID: ad8cca925521e14838963f4cc6b08a05e3d3e52fca60539762154ec119347166
        • Opcode Fuzzy Hash: f17cfb3409722ce83e4614c57bfb7f0d07d1be116d6383e339293fd3279c60e7
        • Instruction Fuzzy Hash: B2D0C9212C170819F7187BA1651677A368C5B81728F6004B9EA0E195D599A674908291
        Memory Dump Source
        • Source File: 00000023.00000003.4503048169.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_3_4960000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 61604d8afa8f15601e9736200b2c10e19028f790aad31efe56e4b2d8f4a2392f
        • Instruction ID: 68075f40bfff3bf1e8ce17d32b9afd1413765bfbd9086e39a68675476b532577
        • Opcode Fuzzy Hash: 61604d8afa8f15601e9736200b2c10e19028f790aad31efe56e4b2d8f4a2392f
        • Instruction Fuzzy Hash: 03C08CB2E902548BD7288A0405406EC63A0EBB0222F80C23BC60444804A23D002BCA14
        APIs
        • RegQueryValueExA.KERNEL32(?,00000000,?,?,00000000,?), ref: 04FD447F
        Memory Dump Source
        • Source File: 00000024.00000003.4536293693.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_3_4fd0000_rundll32.jbxd
        Similarity
        • API ID: QueryValue
        • String ID:
        • API String ID: 3660427363-0
        • Opcode ID: 36596f83106e5f6b07f940907ca6554e002960599679e98e75a93f671ed72c8f
        • Instruction ID: 028611d87de0cc18cdbb42288de3ed0651cd62bb941a259def571dccee9b0e91
        • Opcode Fuzzy Hash: 36596f83106e5f6b07f940907ca6554e002960599679e98e75a93f671ed72c8f
        • Instruction Fuzzy Hash: 44714E70D00259DFDB14CFA9C885B9EBBF2FF49314F188529E819A7291D774A882CF91
        APIs
        • RegQueryValueExA.KERNEL32(?,00000000,?,?,00000000,?), ref: 04FD447F
        Memory Dump Source
        • Source File: 00000024.00000003.4536293693.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_3_4fd0000_rundll32.jbxd
        Similarity
        • API ID: QueryValue
        • String ID:
        • API String ID: 3660427363-0
        • Opcode ID: 04719e10b7261bb64a6f2199c594d6c10292f03f2991e8cb9694a591037d28e0
        • Instruction ID: 925ef32c72ed1e46a97c18baaca99de0d1b1b88882384e00dcfbc4f315bca53f
        • Opcode Fuzzy Hash: 04719e10b7261bb64a6f2199c594d6c10292f03f2991e8cb9694a591037d28e0
        • Instruction Fuzzy Hash: EE712D70D00259DFDB14CFA9C885B9EBBF2FF49318F188529E819A7291D774A842CF91
        APIs
        • RegOpenKeyExA.KERNEL32(?,04F9A2B0,?,?,?), ref: 04FD422C
        Memory Dump Source
        • Source File: 00000024.00000003.4536293693.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_3_4fd0000_rundll32.jbxd
        Similarity
        • API ID: Open
        • String ID:
        • API String ID: 71445658-0
        • Opcode ID: d3059abd55ba89eecd670452c24f6d1752270c5a0fb7c88cab845b448709b160
        • Instruction ID: 80f9df6cea54e43f4e7092a209d5d01ce184cf0f45781daad3fed1042df97222
        • Opcode Fuzzy Hash: d3059abd55ba89eecd670452c24f6d1752270c5a0fb7c88cab845b448709b160
        • Instruction Fuzzy Hash: DA4157B1D002599FDB10CFA9D981B9DBFF2FF48304F188129E818AB294D774A842CB91
        APIs
        • RegOpenKeyExA.KERNEL32(?,04F9A2B0,?,?,?), ref: 04FD422C
        Memory Dump Source
        • Source File: 00000024.00000003.4536293693.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_3_4fd0000_rundll32.jbxd
        Similarity
        • API ID: Open
        • String ID:
        • API String ID: 71445658-0
        • Opcode ID: 2f59c2530805e1d24ff2c250c62cb597324347f664199cfdd9b7c7602001a271
        • Instruction ID: 7c4c72e946d25903461fe5b3a2a556aab37826c2c85f0e3ffbeca2ffd7cc3cbb
        • Opcode Fuzzy Hash: 2f59c2530805e1d24ff2c250c62cb597324347f664199cfdd9b7c7602001a271
        • Instruction Fuzzy Hash: E04136B1E002599FDF14CFA9D984B9EBBF2FF48314F148129E818AB254D774A846CB91
        APIs
        • RegCloseKey.KERNEL32(00000000), ref: 04FD45BF
        Memory Dump Source
        • Source File: 00000024.00000003.4536293693.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_3_4fd0000_rundll32.jbxd
        Similarity
        • API ID: Close
        • String ID:
        • API String ID: 3535843008-0
        • Opcode ID: cf63c7e0e7af7d72ca30b21f62267b14215809811a399b551f2423a39e772e72
        • Instruction ID: 5b45a5dd0d74ad2e1a606b72f7989da7b8dd5c183f71ca24236c75f7051a02cf
        • Opcode Fuzzy Hash: cf63c7e0e7af7d72ca30b21f62267b14215809811a399b551f2423a39e772e72
        • Instruction Fuzzy Hash: 491140B18002498FDB20CF9AC444BAEBBF4EB49324F24845AD918A3240D378A941CFA1
        APIs
        • RegCloseKey.KERNEL32(00000000), ref: 04FD45BF
        Memory Dump Source
        • Source File: 00000024.00000003.4536293693.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_3_4fd0000_rundll32.jbxd
        Similarity
        • API ID: Close
        • String ID:
        • API String ID: 3535843008-0
        • Opcode ID: a195bace4663cb58c0524f530c77ac536ca11ca9a40c79a34d5b1678a04dcece
        • Instruction ID: f13d16f46032e09bb6918090146b73814781dd8d35d251aecd5531df73811bc9
        • Opcode Fuzzy Hash: a195bace4663cb58c0524f530c77ac536ca11ca9a40c79a34d5b1678a04dcece
        • Instruction Fuzzy Hash: D01110B1C002498FCB20CF9AC585BDEBBF4EB49324F20845AD918A7240D778A945CFA1
        APIs
        • KiUserExceptionDispatcher.NTDLL ref: 04FD3D85
        Memory Dump Source
        • Source File: 00000024.00000003.4536293693.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_3_4fd0000_rundll32.jbxd
        Similarity
        • API ID: DispatcherExceptionUser
        • String ID:
        • API String ID: 6842923-0
        • Opcode ID: 751184b874966212c19fcdee02a16c724da66f927f854c5ad8a79c85df57a615
        • Instruction ID: 1d0e13a112fb3c9ee4bcb97b1d1df0002b3a05ef2ac3cfa55d11a81c95cd494b
        • Opcode Fuzzy Hash: 751184b874966212c19fcdee02a16c724da66f927f854c5ad8a79c85df57a615
        • Instruction Fuzzy Hash: 2DE0D171A45184BFC7169BB0F94D8BA7F7DDAD6111305845AE505C7541DD3C4D038761
        APIs
        • KiUserExceptionDispatcher.NTDLL ref: 04FD3D85
        Memory Dump Source
        • Source File: 00000024.00000003.4536293693.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_3_4fd0000_rundll32.jbxd
        Similarity
        • API ID: DispatcherExceptionUser
        • String ID:
        • API String ID: 6842923-0
        • Opcode ID: 9f332c39c82a153dca1a1341c99cd2236986f7e5e1d2cd733002d282f800205c
        • Instruction ID: 45125f516f6ec2dc8b5b350a267ae0328e7a36d17c200b8fb6f4b1067d200c3c
        • Opcode Fuzzy Hash: 9f332c39c82a153dca1a1341c99cd2236986f7e5e1d2cd733002d282f800205c
        • Instruction Fuzzy Hash: 57E0C272B00158AB87199B75F90CC7B77AEEAD9221300842AF906C3600DE3CAC0286B1
        Memory Dump Source
        • Source File: 00000024.00000002.4537601219.0000000004D4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D4D000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_4d4d000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: db71032ee9b145295e6592bdfba2be097d6f405193482a6d9a8ecb26ab499dbc
        • Instruction ID: e649070eff4a6b083d02e1747aa95b755fd702d23cc42411ab59dce2edae9696
        • Opcode Fuzzy Hash: db71032ee9b145295e6592bdfba2be097d6f405193482a6d9a8ecb26ab499dbc
        • Instruction Fuzzy Hash: B201D0716043449BD7204F15DD84B57BF99EFC5324F18C52AED480B146D279E841C6B1
        Memory Dump Source
        • Source File: 00000024.00000002.4537601219.0000000004D4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D4D000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_4d4d000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a66ae4f3f1aa82825cb3915fa93a4d947a6f02eaf7d68fa5c0b81a26a0177cc9
        • Instruction ID: 7fd686cbc041a8091170b5702824a9a7ee3820508412dc508c6224b7f2250979
        • Opcode Fuzzy Hash: a66ae4f3f1aa82825cb3915fa93a4d947a6f02eaf7d68fa5c0b81a26a0177cc9
        • Instruction Fuzzy Hash: 52015E7110E3C09FD7128B259994B52BFB4EF93224F1DC1DBE9888F2A3C2695849C772
        Strings
        Memory Dump Source
        • Source File: 00000025.00000003.4583296033.0000000004630000.00000040.00000800.00020000.00000000.sdmp, Offset: 04630000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_3_4630000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: (aq
        • API String ID: 0-600464949
        • Opcode ID: 8084d9e2fa264a4d842a8880a14dc2bdda3661d605b0ca67673eaea7452bc364
        • Instruction ID: 0c5c409e03884ad3911f943f2722ae13d7c15260f323e7e50e184dc907817b55
        • Opcode Fuzzy Hash: 8084d9e2fa264a4d842a8880a14dc2bdda3661d605b0ca67673eaea7452bc364
        • Instruction Fuzzy Hash: 8271C531B002189FEB049BB9C8546AEB7E7FFC9311F148029E506DB3A5EE35EC469791
        Strings
        Memory Dump Source
        • Source File: 00000025.00000003.4583296033.0000000004630000.00000040.00000800.00020000.00000000.sdmp, Offset: 04630000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_3_4630000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: (aq
        • API String ID: 0-600464949
        • Opcode ID: 0fd29bd423273ea3f78c8fbce287664d5b7317ca731b57b91695f940ae38a3be
        • Instruction ID: f0cc9d805bb526c04480be1723ffaf874e85be150af36aa6e33e36f07b80425c
        • Opcode Fuzzy Hash: 0fd29bd423273ea3f78c8fbce287664d5b7317ca731b57b91695f940ae38a3be
        • Instruction Fuzzy Hash: DA511B30B04248AFD704DB68D4647AE7FF6EF8A315F154069D405D7386EE34AC0AC791
        Memory Dump Source
        • Source File: 00000025.00000003.4583296033.0000000004630000.00000040.00000800.00020000.00000000.sdmp, Offset: 04630000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_3_4630000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 6744c6e38127a72c3f9e66d22de21d353b61792064886fd0debc0e4bed9fd6ad
        • Instruction ID: b1e5c5f0ebef958921e571587306cd7ea46e16c827299953f4157a24b26571e3
        • Opcode Fuzzy Hash: 6744c6e38127a72c3f9e66d22de21d353b61792064886fd0debc0e4bed9fd6ad
        • Instruction Fuzzy Hash: C43112313043509FDB15DF69D800AAABBEAFF85621F10802BE849CB391EB75EC45C791
        Memory Dump Source
        • Source File: 00000025.00000003.4583296033.0000000004630000.00000040.00000800.00020000.00000000.sdmp, Offset: 04630000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_3_4630000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: ee4614a3acb39f9d41823355e1cb5c62ca612bc1122720da265803db19272977
        • Instruction ID: 0da76ad55671f86e47927c0e58012b2bdeed37536971a13274c44fda97ed3676
        • Opcode Fuzzy Hash: ee4614a3acb39f9d41823355e1cb5c62ca612bc1122720da265803db19272977
        • Instruction Fuzzy Hash: F5212B32B002549BDB10DF75C984AEEBBEAEF89241F04803AD506D7346FE74DD069791
        Memory Dump Source
        • Source File: 00000025.00000003.4583296033.0000000004630000.00000040.00000800.00020000.00000000.sdmp, Offset: 04630000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_3_4630000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: acfe0a4f974faab940ed58f8b385e3f3fdcc2ab0a7390078dae30a89aca8f83b
        • Instruction ID: f6b2885160ca475af9d7d8c74d75a4bd91e6cc08358fdb2580bc149ffc7b5868
        • Opcode Fuzzy Hash: acfe0a4f974faab940ed58f8b385e3f3fdcc2ab0a7390078dae30a89aca8f83b
        • Instruction Fuzzy Hash: B601753060A38A1FCB095F78A9755667FADEEC621570509BAC949CF193F918D809C3D2
        Memory Dump Source
        • Source File: 00000025.00000003.4583296033.0000000004630000.00000040.00000800.00020000.00000000.sdmp, Offset: 04630000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_3_4630000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 44ac04c4656cb0b451b535bbb00f31c79acc7a56d90a6a4182ccc484bdee1372
        • Instruction ID: 964feed64463c9fb26b8a8d3bddb6af3da190a006274f7c75d39ff7b640a3e45
        • Opcode Fuzzy Hash: 44ac04c4656cb0b451b535bbb00f31c79acc7a56d90a6a4182ccc484bdee1372
        • Instruction Fuzzy Hash: 3B014231B001558BEB18AA68C5517EFBBF2EBC9305F15802ED002B7380EE75AC05CBD5
        Memory Dump Source
        • Source File: 00000025.00000003.4583296033.0000000004630000.00000040.00000800.00020000.00000000.sdmp, Offset: 04630000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_3_4630000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 67cea27cf5509a04e3e2b4563be5fd2be0b74acda4e6d21b1f8e3acd9bc98b4f
        • Instruction ID: bef46ac12d8aadcfd10a7caf485db41a5874448377681203493eed4dc158d755
        • Opcode Fuzzy Hash: 67cea27cf5509a04e3e2b4563be5fd2be0b74acda4e6d21b1f8e3acd9bc98b4f
        • Instruction Fuzzy Hash: BFF0C23070638A1EDB0C9F78E56565A7F9EFEC220430509BEC949CF192F9289805C7D2
        Memory Dump Source
        • Source File: 00000025.00000003.4583296033.0000000004630000.00000040.00000800.00020000.00000000.sdmp, Offset: 04630000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_3_4630000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 2ec6233c325766e3dc477cedc8cd8b083cb7ae44c57b36c64660e2cfc278b84c
        • Instruction ID: 9e3c1ed9bb44b1b0b2eef073ada350cf3f8b0ebe1110172b09767095b08a3d37
        • Opcode Fuzzy Hash: 2ec6233c325766e3dc477cedc8cd8b083cb7ae44c57b36c64660e2cfc278b84c
        • Instruction Fuzzy Hash: 11E092303106195FD724AA28E460A6E77EAFFC5216B400979E145D7240EF64FC0E97C6
        Memory Dump Source
        • Source File: 00000025.00000003.4583296033.0000000004630000.00000040.00000800.00020000.00000000.sdmp, Offset: 04630000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_3_4630000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 0e903668a882ec3ca50dbe408988e4a38176dc72ce072044ab1956760495ee1d
        • Instruction ID: dd157845b7c1d7fb6c0fb6da845ab4aadc0e61bae83125e44bdc3b76d02f3324
        • Opcode Fuzzy Hash: 0e903668a882ec3ca50dbe408988e4a38176dc72ce072044ab1956760495ee1d
        • Instruction Fuzzy Hash: B9D0A73231141C6B530C6A19D84686A7B99EB952613114437FA0283224ED70BC05D399
        Memory Dump Source
        • Source File: 00000025.00000003.4583296033.0000000004630000.00000040.00000800.00020000.00000000.sdmp, Offset: 04630000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_3_4630000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 46056306aec95609e26d9ab422990f5d7faa4eee9b6423d40e676070b5f3258a
        • Instruction ID: db737bb4ed6f95a4c79785ee3603650708421c448af9c6d3437e1beba56c00ce
        • Opcode Fuzzy Hash: 46056306aec95609e26d9ab422990f5d7faa4eee9b6423d40e676070b5f3258a
        • Instruction Fuzzy Hash: 2AD0C97251D3819FD212869889918AABB64AAA370534A82ABC1448A117A119945BD272